-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathnetsec.html
More file actions
104 lines (101 loc) · 6.26 KB
/
netsec.html
File metadata and controls
104 lines (101 loc) · 6.26 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
<!DOCTYPE html>
<html lang="en" dir="ltr">
<head>
<meta charset="utf-8">
<title>Home</title>
<link rel="stylesheet" href="style1.css">
</head>
<body>
<div class="img1">
<div class="centered"><h1 class="headline">Distributed Embedded Computing</h1></div>
</div>
<nav>
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="UNIT 1.html">Unit 1</a>
<ul>
<li><a href="broadband.html">Broadband Transmission Facilities</a></li>
<li><a href="OSI.html">Open Interconnection Standards</a></li>
<li><a href="LAN.html">Local Area Network</a></li>
<li><a href="WAN.html">Wide Area Network</a></li>
<li><a href="netmgmt.html">Network management</a></li>
<li><a href="netsec.html">Network security</a></li>
<li><a href="Ccomp.html">Cluster computers</a></li>
</ul>
</li>
<li><a href="#">Unit 2</a></li>
<li><a href="#">Unit 3</a></li>
<li><a href="#">Unit 4</a></li>
</ul>
</nav>
<div class="Brief">
<h1>Network Security</h1>
<p>Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.<br> Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.<br> Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.</p>
<ol>
<li>Passive attack</li>
<li>Active attack</li>
<p>Networks are subject to attacks from malicious sources. Attacks can be from two categories: "Passive" when a network intruder intercepts data traveling through the network, <br> and "Active" in which an intruder initiates commands to disrupt the network's normal operation or to conduct reconnaissance and lateral movement to find and gain access to assets available via the network.</p>
</ol>
<p>Types of passive attacks iclude</p>
<br>
<ol>
<li>Network wiretapping</li>
<li>Port Scanner</li>
<li>Idle Scan</li>
<li>Encryption</li>
<li>Traffic analysis</li>
</ol>
<p>Types of active attacks include</p>
<ol>
<li>Virus</li>
<li>Eavesdropping</li>
<li>Data modification</li>
<li>Denial-of-service attack</li>
<li>Man in the middle</li>
<li>DNS spoofing</li>
<li>ARP poisoning</li>
<li>VLAN hopping</li>
<li>Smurf Attack</li>
<li>Buffer overflow</li>
<li>Heap overflow</li>
<li>Format string attack</li>
<li>SQL injection</li>
<li>Phishing</li>
<li>Cross-site scripting</li>
<li>CSRF</li>
<li>Cyber-attack</li>
</ol>
<br>
<br>
<p>Masquerade – attacks takes place when one entity pretends to be different entity. </p>
<br>
<img src="images/Masquerade.jpg" alt="">
<p>Repudiation – this attack is done by either sender or receiver. The sender or receiver can deny later that he/she has send or receive a message.
<br> For example, customer ask his Bank “To transfer an amount to someone” and later on the sender(customer) deny that he had made such a request. This is repudiation.</p>
<br>
<p>Denial of Service – it prevents normal use of communication facilities. This attack may have a specific target. For example, an entity may suppress all messages directed to a particular destination.
<br>
<img src="images/dos.jpg" alt="">
<br> Another form of service denial is the disruption of an entire network wither by disabling the network or by overloading it by messages so as to degrade performance.</p>
<p>IP Spoofing- is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets. <br> IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value.</p>
<p>
Phishing- is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
<br>Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.</p>
<h2>Security Measures</h2>
<p>
Cryptography: is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. The pre-fix "crypt" means "hidden" and the suffix "graphy" stands for "writing." In cryptography, a Caesar cipher is one of the simplest and most widely known encryption techniques. <br> It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3 i.e., D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
<br>
<br>
<img src="images/caesercipher.jpg" alt="">
<br>
caser cipher
</p>
<br>
<br>
<p>
<img src="images/netsectable.jpg" alt=""><br>
The table above shows the difference between private key and public key
</p>
</div>
</body>
</html>