Faculty of Inforamation Technology and Communication Studies. Department of Information Technology Studies LEVEL 200

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

FACULTY OF INFORAMATION TECHNOLOGY

AND COMMUNICATION STUDIES.


DEPARTMENT OF INFORMATION TECHNOLOGY STUDIES
LEVEL 200
Name: IndexNumber:
Okyere Theophilus Kofi 10114725
Sowah Emmanuel 10118036
Keziah Nhyira Bosomtwe 10113830
Aaron Tetteh 10117661
Simon Kudjorji 10118068
Abdul-Majeed 10115557
Network Security
What is Network Security?

 Network Security protects your network and data from


breaches, intrusions and other threats. This is a complex
term that involves hardware and software solutions, as well
as processes, policies, and configurations pertaining to
network use, accessibility, and overall threat prevention
•Access control, virus and antivirus software, application security,
network analytic, many forms of network-related security.
firewalls, VPN encryption, and more are all part of network
security.
•Network Security tend to provide certain ways by which only
authorized user can get access to the data in the network.
• For network access, users are given a unique ID and 
password. 
• Large businesses and institutions use network security 
to protect their networks against unauthorized access.
Firewall

• A firewall is a system that applies certain protocols for managing and


regulating traffic on the network. It acts as the barricade between the
internet and the verified internal network. A firewall can be a software
or a hardware. Firewalls are commonly used to prevent any threat to
the data from an outside source. Hardware firewalls are found on
routers while software firewalls are installed on the computers.
Firewall
•There are three types of firewall:
•Application Gateways
•Packet Filtering
•Hybrid Systems
Types of network attack
Following are the types of attack on the network:

• Active Attack – In an active attack, a miscreant tries to attack data while it is being
sent to some other location. He can make changes to it or can hack confidential
information while data is being transferred. The prevention of these attacks is quite
difficult because of a broad range of potential physical, network and software
vulnerabilities. Instead of prevention, it emphasizes on the detection of the attack
and recovery from any disruption or delay caused by it.
• Passive Attack – In a passive attack, the hacker constantly monitors the system
to gain valuable information through open ports. The attacker does not
attempt to make changes to data. Unlike active attack, the passive attack is
hard to detect because it doesn’t involve any alteration in the data or system
resources. Thus, the attacked entity doesn’t get any clue about the attack.
Although, it can be prevented using encryption methods in which the data is
firstly encoded in the unintelligible language at the sender’s end and then at
the receivers end it is again converted into human understandable language.
Key Differences Between Active and Passive Attacks
• The active attack includes modification of the message. On the other hand, in
passive attacks, the attacker doesn’t commit any changes to the intercepted
information.

• The active attack causes a huge amount of harm to the system while the
passive attack doesn’t cause any harm to the system resources.
• A passive attack is considered as a threat to data confidentiality. In contrast, an
active attack is a threat to the integrity and availability of the data.

• The attacked entity is aware of the attack in case of active attack. As against,
the victim is unaware of the attack in the passive attack.

• The active attack is accomplished by gaining the physical control over the
communication link to capture and insert transmission. On the contrary, in a
passive attack, the attacker just needs to observe the transmission.
WIRELESS SECURITY
• Wireless security is the prevention of unauthorized access or damage to
computers or data using wireless networks, which include Wi-Fi networks.The
most common type is Wi-Fi security, which includes Wired Equivalent Privacy
(WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard
from 1997.
THERE ARE FOUR MAJOR TYPES OF WIRELESS SECURITY

• Wired Equivalent Privacy (WEP)

• Wi-Fi Protected Access (WPA)

• Wi-Fi Protected Access 2 (WPA 2)

• Wi-Fi Protected Access 3 (WPA 3)


Wired Equivalent Privacy (WEP)
• Wired Equivalent Privacy (also known as the WEP) is a security algorithm
introduced to provide data confidentiality for wireless networks.

• Wi-Fi Protected Access (WPA) is a security standard for computing devices


equipped with wireless internet connections.

• Wi-Fi Protected Access; Wi-Fi Protected Access (WPA) is a security standard for


computing devices equipped with wireless internet connections.
• WPA2 has stronger security and is easier to configure than the prior options.
The main difference with WPA2 is that it uses the Advanced Encryption
Standard (AES) instead of TKIP (Temporal Key Integrity Protocol). While WPA2
offers more protection than WPA and therefore provides even more protection
than WEP, the security of your router heavily depends on the password you
set. WPA and WPA2 let you use passwords of up to 63 characters.
• AES (Advanced Encryption Standard) is able to secure top-secret government
information, so it's a good option for keeping a personal device or
company WiFi safe. WPA2 is a type of encryption used to secure the vast majority of
Wi-Fi networks. A WPA2 network provides unique encryption keys for each wireless
client that connects to it.TKIP (Temporal Key Integrity Protocol) is an encryption
protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It
was designed to provide more secure encryption than the notoriously weak Wired
Equivalent Privacy (WEP), the original WLAN security protocol.
AVANTAGE(BENEFITS)
• REMOTE CONTROL: One of the key advantages of wireless  security systems is
the ability to control the system remotely. You can operate the locks of doors
and manage your lights from anywhere. All you need is a smartphone,
computer or tablet, and the wireless controls take care of the rest.

• REMOTE CHECK-IN

• SMARTPHONE NOTIFICATION
DISADVANTAGE
• Modern live video surveillance systems offer many of the same advantages—
without the large retainer or paycheck. ...

• Wireless Security guards expose employers to greater liability and insurance


costs. ...

• Wireless Security guards passively monitor property, and are prone to


boredom-related failure.
HONEYPOT.
• Honeypot is a computer security mechanism set to detect, deflect, or in some
manner, counteract attempts at unauthorized use of information systems. A
honeypot is additional security protection that can be used alongside a firewall
and other security solution to help protect a network from hackers and it allow
IT security teams to defend against attacks that the firewall fails to prevent.
Honeypot in network security.

• In the network security, honeypot controlled and safe environment for showing how
attackers work and examining different types of threats. With a honeypot security,
staff won’t be distracted by real traffic using the network they’ll be able to focus
100% on threat. Honeypot can also catch internet threats.

The role of honeypot in network security.

• It can be used to detect attacks or deflect them from a legitimate target. It can also
be used to gain information about how cyber criminals operate.
Effectiveness of honeypot.
• Honeypots are only effective if they can deceive attackers into thinking in the
computer systems. Most attackers do not want their methods known because they
know that it will lead to quick development of defensive methods against their
method.

• What honeypots do in network security.

• It assess the latest trends in attacks.

• Understand where cyber attacks arise from.

• Better frame security policies to mitigate future risks.


Types of honeypot.
• High interaction honeypots.

These honeypots imitate real world systems and applications with actual services, function and
operating systems involving high levels of interactivity ( though less than pure honeypot) . it gives
extensive details about how an attacker progresses and how payloads execute in a network .

• Medium interaction honeypots.

It falls between high and low interaction honeypots they come with extended capabilities
compared to low interaction honeypots but reduced implementation complexities than high
interaction honeypots. It imitate the application layer but don’t have their own operating system.
• Low interaction honeypots.
It allow partial interaction with systems since they run limited emulated services with
restricted functionality as would be typically expected from a server. Though these are
the easiest to set up and maintain, the run the risk of coming across as in authentic
targets to potential attackers.

Other types of honeypot.


• Malware honeypot.
• Database honeypot.
• Client honeypot.
• Email honeypot.
• Spider honeypot.
Benefits of Honeypots.
• Distracts cyber criminals from targeting leg attacks as they are legitimate
systems.

• Gives greater visibility of attacks as they are happening.

• Monitors an attacker’s behaviors.

• It help organization to take appropriate countermeasures to block the attack’s


access to legitimate servers.

• It help improve an organization’s overall security


Malware Detection:
• A malware is a software code which is designed to intentionally cause damage
to the computer network.

• The malware code can be in the form of :

• viruses

• worms

• Trojan horses

• spyware.
• The aim of malware detection is to find and remove any type of malware code
from the network.

• Antivirus software, firewalls, and other such strategies help in detecting


malware in the network.
Information Security:
• Information security refers to a set of strategies applied to prevent any type of
threat to digital and non-digital information.

• The strategies applied revolves around the CIA objectives which is expanded
as confidentiality, integrity, and availability. These objectives ensure that only
authorized users can access the information.
Access Management:
• It is a method of securing the network by granting access to authorized users
the right to access the network. This will prevent any unauthorized attack on
the network thereby securing the network.

• This process makes use of certain policies which are defined under Information
Security Management. This process was added to secure the confidential
information that is transferred through the network.
• It provide administrators with the tools and technologies to change a user’s
role, track user activities, create reports on those activities, and enforce
policies on an ongoing basis. These systems are designed to provide a means of
administering user access across an entire enterprise and to ensure
compliance with corporate policies and government regulations.
Benefits of Network Security
• Network Security is vital in;

• protecting client data and information

• keeping shared data secure

• ensuring reliable access and network performance

•  protection from cyber threats.

• A well-designed network security system reduces operating costs and protects businesses from
severe losses caused by data breaches or other security incidents. Having valid access to systems,
apps, and data allows businesses to run smoothly and provide services and goods to consumers.

You might also like