Network Security

Network Security

Network Security

Network security

Network security is a wide range of policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network.

Network security concepts

Network security starts with authentication (usually a username and a password). Since this requires just one detail authenticating the user name—i.e., the password—this is known as one-factor authentication. With two-factor authentication(2FA), another detail to the authentication of the user is added(e.g. security token, dongle, smart card, mobile phone, etc.). Three (or-more) factor authentication, called multi-factor authentication(MFA), involves additional authentication factors (e.g. fingerprint, retina scan, time interval, etc.).

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the authorized network users. Anti-virus software or an intrusion prevention system (IPS) can help detect and inhibit the action of malware. An anomaly-based intrusion detection system (e.g. wireshark) can monitor the network traffic and log it for audit and analysis purposes.

Communication between two hosts using a network can be encrypted to maintain privacy.

Type of Network Attacks

Networks are subject to attacks from malicious hackers. Attacks can be divided in two main categories:

  • Passive  – intercepting data traveling through the network
  • Active  – initiating commands to disrupt the network’s normal operations
  • Network Passive attacks
    • Wiretapping
    • Port scanner
    • Idle scan
  • Active attacks
    • Denial-of-service attack
    • DNS spoofing
    • Man in the middle attack
    • ARP poisoning
    • VLAN hopping
      Network Security

      Network Security

    • Smurf attack
    • Buffer overflow
    • Heap overflow
    • Format string attack
    • SQL injection
    • Phishing
    • Cross-site scripting (XSS)
    • Cross-site request forgery (CSRF)