Netwok Security (1)
Netwok Security (1)
usefulness of your data and network is known as network security. In other words,
Network security is defined as the activity created to protect the integrity of your
network and data.Network security is the practice of protecting a computer network
from unauthorized access, misuse, or attacks. It involves using tools, technologies, and
policies to ensure that data traveling over the network is safe and secure, keeping
sensitive information away from hackers and other threats.
Security Mechanism:- A security mechanism is a method or technology that protects
data and systems from unauthorized access, attacks, and other threats. Security
measures provide data integrity, confidentiality, and availability, thereby protecting
sensitive information and maintaining trust in digital transactions.
Types of Security Mechanism:- Encipherment : This security mechanism deals with
hiding and covering of data which helps data to become confidential. It is achieved by
applying mathematical calculations or algorithms which reconstruct information into not
readable form. It is achieved by two famous techniques named Cryptography and
Encipherment. Level of data encryption is dependent on the algorithm used for
encipherment.
Access Control : This mechanism is used to stop unattended access to data which you
are sending. It can be achieved by various techniques such as applying passwords, using
firewall, or just by adding PIN to data.
Notarization : This security mechanism involves use of trusted third party in
communication. It acts as mediator between sender and receiver so that if any chance of
conflict is reduced. This mediator keeps record of requests made by sender to receiver
for later denied.
Data Integrity : This security mechanism is used by appending value to data to which is
created by data itself. It is similar to sending packet of information known to both
sending and receiving parties and checked before and after data is received. When this
packet or data which is appended is checked and is the same while sending and
receiving data integrity is maintained.
Authentication Exchange : This security mechanism deals with identity to be known in
communication. This is achieved at the TCP/IP layer where two-way handshaking
mechanism is used to ensure data is sent or not
Bit Stuffing : This security mechanism is used to add some extra bits into data which is
being transmitted. It helps data to be checked at the receiving end and is achieved by
Even parity or Odd Parity.
Digital Signature : This security mechanism is achieved by adding digital data that is not
visible to eyes. It is form of electronic signature which is added by sender which is
checked by receiver electronically. This mechanism is used to preserve data which is not
more confidential but sender’s identity is to be notified.
Active Attacks :-Active attacks are unauthorized actions that alter the system or data. In
an active attack, the attacker will directly interfere with the target to damage or gain
unauthorized access to computer systems and networks. This is done by injecting hostile
code into communications, masquerading as another user, or altering data to get
unauthorized access. This may include the injection of hostile code into
communications, alteration of data, and masquerading as another person to get
unauthorized access.Types of active attacks are as follows: Masquerade
Attack,Modification of Messages,Repudiation,Replay Attack,Denial of Service (DoS)
Attack
1. Masquerade Attack:- Masquerade attacks are considered one type of cyber attack in
which the attacker disguises himself to pose as some other person and accesses systems
or data. It could either be impersonating a legal user or system and demanding other
users or systems to provide information with sensitive content or access areas that are
not supposed to be accessed normally. This may even include behaving like an actual
user or even some component of the system with the intention of manipulating people
to give out their private information or allowing them into secured locations.
Username and Password Masquerade: In this masquerade attack, a person uses either
stolen or even forged credentials to authenticate themselves as a valid user while
gaining access to the system or application.
Message repudiation attacks: In this attack, a message has been sent by an attacker, but
the attacker later denies the sending of the message. This can be achieved either
through spoofed or modified headers or even by exploiting vulnerabilities in the
messaging system.
Data repudiation attacks: In a data repudiation attack, data is changed or deleted. Then
an attacker will later pretend he has never done this. This can be done by exploiting
vulnerabilities in the data storage system or by using stolen or falsified credentials.
Flood attacks: Here, an attacker sends such a large number of packets or requests to a
system or network that it cannot handle them all and the system gets crashed.
Amplification attacks: In this category, the attacker increases the power of an attack by
utilizing another system or network to increase traffic then directs it all into the target to
boost the strength of the attack.
Passive Attacks:- A Passive attack attempts to learn or make use of information from the
system but does not affect system resources. Passive Attacks are in the nature of
eavesdropping on or monitoring transmission. The goal of the opponent is to obtain
information that is being transmitted. Passive attacks involve an attacker passively
monitoring or collecting data without altering or destroying it. Examples of passive
attacks include eavesdropping, where an attacker listens in on network traffic to collect
sensitive information, and sniffing, where an attacker captures and analyzes data
packets to steal sensitive information.Types of Passive attacks are as follows:
The opponent could determine the location and identity of communicating host and
could observe the frequency and length of messages being exchanged. This information
might be useful in guessing the nature of the communication that was taking place.
The most useful protection against traffic analysis is encryption of SIP traffic. To do this,
an attacker would have to access the SIP proxy (or its call log) to determine who made
the call.