Podcast
Questions and Answers
What is the primary purpose of network security?
What is the primary purpose of network security?
- To enhance user experience
- To simplify network configurations
- To increase internet speeds
- To protect vital information (correct)
Which statement accurately describes a firewall?
Which statement accurately describes a firewall?
- It is ineffective against modern security threats
- It allows unlimited access to all ports
- It controls access to a network through specific rules (correct)
- It is solely a hardware solution
What is one of the common security attacks associated with network vulnerabilities?
What is one of the common security attacks associated with network vulnerabilities?
- Data compression
- Packet sniffing (correct)
- Network optimization
- Data integrity check
Why is it important to keep firewalls updated?
Why is it important to keep firewalls updated?
What does a Denial of Service attack aim to achieve?
What does a Denial of Service attack aim to achieve?
Which method is commonly used for user authentication in network security?
Which method is commonly used for user authentication in network security?
What characterizes packet filtering firewalls?
What characterizes packet filtering firewalls?
Which of the following is a vulnerability that can affect network security?
Which of the following is a vulnerability that can affect network security?
What is the purpose of well-known port numbers?
What is the purpose of well-known port numbers?
Which TCP port is associated with the Hypertext Transfer Protocol (HTTP)?
Which TCP port is associated with the Hypertext Transfer Protocol (HTTP)?
Which attack type aims to overload a network service to make it unusable?
Which attack type aims to overload a network service to make it unusable?
What does a Dictionary Attack target?
What does a Dictionary Attack target?
What is a primary function of Packet Sniffing?
What is a primary function of Packet Sniffing?
Which of the following protocols is used for securing IP communications by encrypting packets?
Which of the following protocols is used for securing IP communications by encrypting packets?
How can data be secured against malicious data insertion in TCP streams?
How can data be secured against malicious data insertion in TCP streams?
What is a method through which individuals can be manipulated to give up information?
What is a method through which individuals can be manipulated to give up information?
Flashcards
Network Security
Network Security
Measures taken to protect network resources from unauthorized access, use, disclosure, disruption, modification, or destruction.
Firewall
Firewall
A security system that controls the flow of network traffic by filtering incoming and outgoing packets based on rules.
Packet Filtering Firewall
Packet Filtering Firewall
A type of firewall that examines and filters individual data packets based on predefined rules.
Denial of Service (DoS) Attack
Denial of Service (DoS) Attack
Signup and view all the flashcards
TCP Attack (Spoofing)
TCP Attack (Spoofing)
Signup and view all the flashcards
Packet Sniffing
Packet Sniffing
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Network Port
Network Port
Signup and view all the flashcards
What is a port number?
What is a port number?
Signup and view all the flashcards
TCP Ports
TCP Ports
Signup and view all the flashcards
What's a dictionary attack?
What's a dictionary attack?
Signup and view all the flashcards
What is a DoS attack?
What is a DoS attack?
Signup and view all the flashcards
What is packet sniffing?
What is packet sniffing?
Signup and view all the flashcards
What is social engineering?
What is social engineering?
Signup and view all the flashcards
What is HTTPS?
What is HTTPS?
Signup and view all the flashcards
IPSec
IPSec
Signup and view all the flashcards
Study Notes
International & Access Foundation Programmes - Computer Science Module, Semester 2, Part 5: Networks - Network Security
- Overview of Network Security:
- What is network security?
- Why is network security needed?
- Who are the vulnerable parties?
- Common security attacks and countermeasures
- Firewalls & Intrusion Detection Systems
- Denial of Service Attacks
- TCP Attacks (Spoofing)
- Packet Sniffing
- Social Engineering
Why Network Security Is Needed
- Protecting sensitive information, such as trade secrets, medical records, and personal data, while allowing access to authorized users.
- Providing authentication and access control for resources.
- Mechanisms like logins, passwords, and biometrics.
- Maintaining resource availability and reliability (99.995% uptime).
Firewalls
- Basic Problem: Network applications and protocols can have security issues requiring periodic updates.
- Difficulty: Keeping up with these updates for users and keeping their systems secure.
- Solution: Firewall administratort limit access to end hosts by using firewalls. Firewalls kept updated by administrators.
- Analogy: Firewall as a castle with a drawbridge - only one access point. Can have positive and negative aspects.
- Types: Hardware-based (within routers) or software-based (integrated within operating systems like Unix, Windows XP/7/8, and Mac OS X).
- DMZ (De-militarized Zone): A security zone separating the internal network (intranet) from the internet. Web servers, email servers, and web proxies are housed in the DMZ.
Firewalls - Packet Filtering
- Used to filter incoming and outgoing network packets; this filtering happens based on pre-set rules.
- The way a typical default Window's 7 install. filters packets:
- 135/tcp open loc-srv
- 139/tcp open netbios-ssn
- 445/tcp open microsoft-ds
- 1025/tcp open NFS-or-IIS
- 3389/tcp open ms-term-serv
- 5000/tcp open UPnP
Ports
- Ports are endpoints of communication in an operating system within the internet protocol suite.
- 1024 well-known port numbers are reserved to indicate specific service types on a host.
- Each port is always linked to an IP address.
Typical TCP Ports
- 21Â File Transfer Protocol (FTP)
- 22 Secure Shell (SSH)
- 23 Telnet remote login service
- 25Â Simple Mail Transfer Protocol (SMTP)
- 53Â Domain Name System (DNS) service
- 80Â Hypertext Transfer Protocol (HTTP)
- 110Â Post Office Protocol (POP3)
- 119Â Network News Transfer Protocol (NNTP)
- 123 Network Time Protocol (NTP)
- 143 Internet Message Access Protocol (IMAP)
- 161 Simple Network Management Protocol (SNMP)
- 194 Internet Relay Chat (IRC)
- 443 HTTP Secure (HTTPS)
Types of Attacks
-
Intrusion Detection: Monitors for suspicious activity using well-known behavioral patterns.
-
Dictionary Attack (Brute Force): Tries various passwords from a dictionary to gain unauthorized access.
-
Denial of Service (DoS): Overloads a network service to make it unavailable.
-
TCP Attacks: Attackers create IP packets for malicious purposes affecting destination addresses or inserting malicious code into TCP streams that appear to come from another source.
-
Packet Sniffing: Monitoring network traffic to capture data like passwords. Encryption methods like SSL protect against packet sniffing by encrypting the data.
-
Social Engineering: Manipulating people to reveal sensitive information.
-
IPSec (Internet Protocol Security): A protocol suite that secures Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.