Networking Systems

Networking Systems

Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator.Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Network security covers a variety of computer networks, both public and private, that are used in everyday jobs.It conducts transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions.

t does as its title explains: It secures the network, as well as protecting and oversees operations. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security always starts with an authentication process, commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e., the password— this is sometimes termed one-factor authentication. With two-factor authentication, something the user ‘has’ is also used (e.g., security token or ‘dongle’, an ATM card, or a mobile phone); and with three-factor authentication, something the user ‘is’ also used (e.g., a fingerprint or retinal scan).

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans which are transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malwares. Communication between two hosts using a network may be encrypted to maintain privacy.

Security Management

Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.

Types of attacks

1) Passive

  • Wiretapping.
  • Port Scanner.
  • Idle Scan.

2) Active

  • Denial of service attack.
  • DNS spoofing.
  • Man in the middle.
  • ARP poisoning.
  • Vlan_hopping.
  • Smurf attack.
  • Buffer and Heap overflow.
  • Format string attack.
  • SQL injection.
  • Phishing.
  • Cyber attack.