0% found this document useful (0 votes)
10 views19 pages

4.5. Network Security

The document discusses network security, emphasizing its importance in preventing unauthorized access and ensuring safe data transmission. It outlines fundamental elements of network security, including protection, detection, and response, as well as key services like authentication, authorization, and accounting. Additionally, it highlights various tools and techniques for enhancing network security, such as firewalls, anti-malware software, and VPNs, while addressing the challenges faced in maintaining robust security measures.

Uploaded by

pelsssssssssss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views19 pages

4.5. Network Security

The document discusses network security, emphasizing its importance in preventing unauthorized access and ensuring safe data transmission. It outlines fundamental elements of network security, including protection, detection, and response, as well as key services like authentication, authorization, and accounting. Additionally, it highlights various tools and techniques for enhancing network security, such as firewalls, anti-malware software, and VPNs, while addressing the challenges faced in maintaining robust security measures.

Uploaded by

pelsssssssssss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Net-Centric Computing

Network Security

Julius Makinde
Email: [Link]@[Link]
1
Introduction
• In most cases, computer science is concerned with
achieving desired behavior.

• Security is concerned with preventing undesired behavior.

• Computer security – focuses on securing systems against


viruses, secure data storage, OS security, etc.
• Network security – focuses on security of data as it is
transmitted between networked systems.
– this includes authentication protocols, encryption of
transmitted data, firewalls, etc.
– It also describes the security tools, strategies, and
security policies designed to monitor, prevent and
respond to unauthorized network intrusion.
2
Introduction..
• Unauthorized users are always interested in gaining
access to a network for malicious purposes.

• There intentions ranges from bringing down the


network to identity theft or data corruption.

• Therefore, there is need to secure a network for safe


transmission of data from one point to another.

3
Data as the Life-Blood of any system
• Every system or organization depends on data for
analyzing her growth and discover ways to improve
on her delivery.

• Network can be seen as the heartbeat that pumps the


data from source to destination.

• Every attempt of cyber threat is to get at the data, it


has to be through unprotected or weak security on a
network.

4
Fundamental of Network Security
• There are 3 main bedrocks of any network security strategy:
– Protection: tools or policies designed to prevent network
security intrusion.

– Detection: tools specifically responsible for analyzing


network traffic for the identification of problems before
they are escalated to cause serious harm.

– Response: the ability to react to identified network


security threats and resolve them as quickly as possible.

5
Challenges in achieving Network Security

• Many layers in network architecture

• Many different media of network connection

• Adversary’s location hard to determine

• New attacks keep emerging

• Cryptographic overhead

6
Basic Elements of Network Security

• It is expected that a secure communication network should


provide the following services:
• AAA
– Authentication
– Authorization
– Accounting

• Secured communication
– Confidentiality
– Integrity
– Non-repudiation

• Availability
7
Basic Elements of Network Security..
AAA
• Authentication
– Message: a process that assures the recipient that the
message is from the intended source.

– Entity: a process verifying that someone is who they claim


they are.
• Methods for the determination of entity’s identity:
– what a user knows – username and password, or PIN
– what a user has – USB dongle, smart card, private
key, etc.
– what a user is – characteristics that can be verified:
fingerprint, retinal images, etc.

8
Basic Elements of Network Security..
AAA..
• Authorization
– Process of granting the user access to specific system
resources
• based on user’s profile and the local/global policy
controlling the resource access
• follows the authentication process.
– Ensured by access control lists (ACLs)
• define permissions to perform particular operation or
to access particular resources.
• Accounting
– Monitoring the users’ usage of network services for
management, planning, billing, or any other purposes.

9
Basic Elements of Network Security..
Secured communication
• Confidentiality
– Protects data from sniffers during transmission, only the
sender and receiver understand the content of the
message.
– Secured by message encryption

• Integrity
– Protects data from unauthorized modification.
– secured by encryption and hashing algorithms.

• Non-repudiation
– Proves origin/delivery of the message
• Neither the sender nor the receiver can deny the
transmission or the reception of the message.
– Secured by digital signatures 10
Basic Elements of Network Security..
Availability
• Ensures that network resources are accessible and usable any
time upon demand by an authorized system entity.

• The services are provided according to the system design


whenever users require them.

• Services must be protected from Denial of service (DoS) and


DDoS attacks.

11
Network Security Tools and Techniques

• Network security strategies need to be able to address the


different methods threat actors might employ. The strategies
include:

– Access control: limits user access and resources to only


the parts of the network that directly apply to individual
users’ responsibilities.

– Anti-malware software: designed to identify dangerous


programs and prevent them from spreading, thus
minimizing the damage to the network.

12
Network Security Tools and Techniques..
– Anomaly detection: This requires understanding the
normal operation of a network. Network anomaly detection
engines (ADE) allow you to analyze your network, so that
when breaches occur, you’ll be alerted to them quickly
enough to be able to respond.

– Application security: helps to establish security


parameters for any applications that may be relevant to a
network security.

13
Network Security Tools and Techniques..

– Data loss prevention (DLP): The weakest link is the


human element. DLP technologies and policies help protect
staff and other users from misusing and possibly
compromising sensitive data or allowing said data out of
the network.

– Email security: focused on shoring up human-related


security weaknesses. Email security helps identify
dangerous emails and can also be used to block attacks and
prevent the sharing of vital data.

14
Network Security Tools and Techniques..
–Intrusion prevention systems (IPS): also known as Intrusion
Detection. It constantly scans and analyzes network
traffic/packets, so that different types of attacks can be
identified and responded to quickly. These systems keep a
database of attack methods, so as to be able to recognize
threats immediately.

–Network segmentation: grants the right access to the right


traffic, while restricting traffic from suspicious sources.

–Security information and event management (SIEM):pulls


the right information from so many different tools and
resources — particularly when time is an issue.
15
Network Security Tools and Techniques..
– Virtual private network (VPN): used to authenticate
communication between secure networks and an endpoint
device. Remote-access VPNs generally use IPsec or Secure
Sockets Layer (SSL) for authentication, creating an encrypted
line to block other parties from eavesdropping.

– Web security: a blanket term to describe the network security


measures businesses take to ensure safe web use when
connected to an internal network. This helps prevent web-based
threats from using browsers as access points to get into the
network.
–Wireless security: wireless networks are less secure than
traditional networks. Thus, strict wireless security measures are
necessary. 16
Network Security Tools and Techniques..
– Endpoint security: When BYOD is allowed, sometimes
the personal devices become targets when users rely on
them to access business networks. Endpoint security adds a
layer of defense between remote devices and business
networks.
– Firewalls: function much like gates that can be used to
secure the borders between a network and the internet to
manage network traffic, allowing authorized traffic
through while blocking access to non-authorized traffic.

17
Classification firewalls

• The followings are the basic classes of firewalls


– Packet filtering firewalls – operate on network layer.

– Circuit level gateways – operate on session/transport layer.

– Application gateways (or proxy servers) – operate on


application layer.

– Dynamic packet filtering firewalls (or Session filtering


firewalls) a combination of the three above.

18
Benefits of Network Security
– Builds Trust: Network security boosts client and consumer
confidence, and it protects businesses from the reputational
and legal fallout of a security breach.

– Mitigates Risk: Minimizes the business and financial impact


of a breach if it does occur.

– Protects Proprietary Information: Network security ensures


the protection of information and data of clients shared across
the network.

– Enables a More Modern Workplace: This allows employees


to work and collaborate securely from any location using VPN.
19

You might also like