Network Security in Computer Network

Class 12-Computer Engineering Computer Network

Posted by yanib on 2025-03-23 07:54:42 |

Share: Facebook | Twitter | Whatsapp | Linkedin Visits: 200


Network Security in Computer Network

7.1 Introduction to Network Security

Network security is the practice of protecting computer networks and their associated systems, devices, and data from unauthorized access, cyber-attacks, and other security threats. It involves implementing various security measures to safeguard the integrity, confidentiality, and availability of data and network resources. As organizations rely increasingly on networks for communication and data exchange, network security becomes crucial to prevent data breaches, attacks, and downtime.

7.2 Types of Network Security

7.2.1 Firewall Protection

A firewall acts as a barrier between your trusted internal network and untrusted external networks, like the internet. It monitors and controls the incoming and outgoing network traffic based on predefined security rules.

  • Types of Firewalls:

    • Packet-Filtering Firewalls: These examine packets of data (units of transmission over the internet) to ensure they meet security criteria before allowing them to pass through. For example, a packet filter might block incoming traffic from a suspicious IP address.

    • Stateful Inspection Firewalls: These track the state of active connections and make decisions based on the context of the traffic. For example, if you're browsing a website and the firewall recognizes that the traffic is part of an ongoing connection, it will allow the response packets back in.

    • Proxy Firewalls: These act as intermediaries between users and the services they access on the internet. For example, when you try to access a website, the proxy server will fetch the web page for you, ensuring that your IP address remains hidden from the external world.

  • Example: A company uses a hardware firewall to prevent unauthorized external users from accessing its internal network, allowing only authorized personnel to access internal systems while blocking malicious attacks.

    Firewalls can be hardware-based or software-based, each with its own advantages and use cases.


    1. Hardware Firewall

    A hardware firewall is a physical device placed between the internet and a local network. It filters traffic before it reaches devices in the network.

    Features of Hardware Firewall:

    • Independent Device: Runs separately from computers.

    • Traffic Filtering: Blocks malicious traffic before it enters the network.

    • Protection for Multiple Devices: Secures all devices connected to the network.

    • Faster Performance: Does not slow down individual computers.

    Example of Hardware Firewalls:

    • Cisco ASA (Adaptive Security Appliance)

    • Fortinet FortiGate

    • SonicWall Firewall

    • Palo Alto Networks Firewall

    Diagram:

    rust
    Internet ---> Hardware Firewall ---> Local Network (Computers, Servers)

    Advantages:

    ✔️ Protects an entire network at once.
    ✔️ More reliable since it runs on dedicated hardware.
    ✔️ Provides additional security features (VPN, Intrusion Prevention).

    Disadvantages:

    ❌ Expensive and requires technical knowledge to configure.
    ❌ Needs regular maintenance and updates.


    2. Software Firewall

    A software firewall is a program installed on a computer that controls internet traffic. It allows or blocks connections based on user-defined rules.

    Features of Software Firewall:

    • Installed on Individual Devices: Works on personal computers or servers.

    • Monitors Traffic for One Device: Protects only the device it is installed on.

    • Application-Level Protection: Can block specific applications from accessing the internet.

    Example of Software Firewalls:

    • Windows Defender Firewall (Built-in on Windows)

    • ZoneAlarm Firewall

    • Norton Firewall

    • McAfee Firewall

    Diagram:

    csharp
    Internet ---> Computer (with Software Firewall)

    Advantages:

    ✔️ Easy to install and configure.
    ✔️ Protects against specific application threats.
    ✔️ Less expensive compared to hardware firewalls.

    Disadvantages:

    ❌ Only protects the device it is installed on.
    ❌ Can slow down system performance.
    ❌ If disabled by malware, the computer becomes vulnerable.


    Difference Between Hardware and Software Firewall

    FeatureHardware FirewallSoftware Firewall
    LocationExternal device between network and internetInstalled on individual computers
    Protection LevelProtects entire networkProtects a single device
    Performance ImpactNo effect on device performanceCan slow down the system
    Setup ComplexityRequires network knowledgeEasy to install and use
    CostExpensiveUsually free or low-cost




    Which Firewall Should You Use?

    • For Personal Use: A software firewall (e.g., Windows Defender Firewall) is enough.

    • For Businesses or Organizations: A hardware firewall provides better security for multiple devices.

    • For Maximum Security: Use both hardware and software firewalls together.


7.2.2 Email Security

Email security is about protecting email communication from unauthorized access, tampering, or threats like malware, spam, and phishing attacks.

  • Methods of Email Security:

    • Encryption: Ensures the contents of an email are unreadable to anyone except the intended recipient. For example, using PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) to encrypt emails.

    • Spam Filters: Filters out unwanted emails (e.g., advertisements or phishing attempts) to ensure the inbox only receives legitimate messages.

    • Phishing Protection: Tools like anti-phishing software can recognize phishing attempts and block emails that attempt to impersonate legitimate businesses.

  • Example: A bank uses email encryption to send customers their financial statements, ensuring that even if an attacker intercepts the email, the contents will be unreadable.


7.2.3 Anti-virus and Anti-malware Software

These software tools are designed to detect, prevent, and remove malicious software (malware), such as viruses, worms, and Trojans, which can damage or steal data from computers or networks.

  • Types of Malware Detected:

    • Virus: A malicious program that attaches to a legitimate program and spreads when the program is run. Example: The ILOVEYOU virus, which spread via email and overwrote files.

    • Ransomware: A type of malware that encrypts files on a device and demands payment to decrypt them. Example: WannaCry ransomware, which affected thousands of organizations worldwide in 2017.

    • Spyware: Software that secretly collects user information without their knowledge. Example: CoolWebSearch software that tracked users' internet activity.

    • Trojan Horse: A malware disguised as legitimate software. For example, Emotet, which appeared as a legitimate email attachment but led to malware installation.

  • Example: A company uses Norton Anti-virus to scan and remove malware from all devices connected to the company network, ensuring no unauthorized access or damage is done.


7.2.4 Virtual Private Network (VPN)

A VPN creates a secure, encrypted connection over a less-secure network (like the internet). It allows users to access a private network remotely while keeping their data safe from eavesdropping.

  • How VPN Works:

    • Encryption: VPNs encrypt all internet traffic between your device and the VPN server, preventing third parties from intercepting and reading it.

    • Tunneling: VPNs create a "tunnel" for data to travel securely between devices, ensuring no one can access the data along the way.

    • Anonymity: VPNs can mask the user's IP address, making them harder to trace online.

  • Example: A remote worker in another country connects to their company's internal network via a VPN to access sensitive data without worrying about hackers on the public Wi-Fi network.


7.2.5 Network Access Control (NAC)

Network Access Control (NAC) is a set of policies and technologies that regulate who and what can access a network, and under what conditions.

  • Core Components:

    • Authentication: Verifying the identity of users or devices attempting to access the network. This can be done via passwords, biometrics, or multi-factor authentication (MFA). Example: A company requires all employees to log in using their username, password, and a one-time code sent to their phone.

    • Authorization: Determining what actions or resources an authenticated user can access. Example: A finance employee may have access to financial systems, but a marketing employee cannot.

    • Accountability: Monitoring and logging user activity on the network. Example: A company monitors employees' access to sensitive data, ensuring they comply with company policies and detect any unauthorized behavior.

  • Example: A healthcare provider uses NAC to ensure that only authorized doctors and staff can access patient records and monitors their activity to detect any unauthorized access.


7.3 Common Network Security Threats

7.3.1 Virus

A virus is a malicious program that attaches itself to legitimate software or files and spreads when the software or file is executed. Viruses can cause a wide range of problems, from data corruption to system crashes.

  • Example: The ILOVEYOU virus, which spread through email attachments, caused widespread damage by overwriting files and sending itself to everyone in the victim’s address book.


7.3.2 Trojan Horse

A Trojan horse is malware disguised as a legitimate program, tricking the user into executing it. Unlike viruses, Trojans don't replicate themselves but can still cause significant harm by allowing unauthorized access or installing additional malware.

  • Example: The Zeus Trojan was used to steal banking credentials from users by embedding itself in seemingly legitimate software, allowing hackers to siphon off money from bank accounts.


7.3.3 Computer Worm

A computer worm is a type of malware that can self-replicate and spread across networks without requiring human intervention. Worms often exploit software vulnerabilities to spread.

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

  • Example: The Blaster Worm, which exploited a vulnerability in Windows, spread rapidly across the internet, causing massive disruption to networks and systems worldwide in 2003.


7.3.4 Phishing Attacks

Phishing is a social engineering attack in which an attacker impersonates a trustworthy entity to trick the victim into providing sensitive information like passwords, credit card details, or personal data.

Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website.

  • Types of Phishing:

    • Email Phishing: Attackers send emails that appear to be from legitimate companies to steal credentials. Example: A fake email from your bank asking for your account details.

    • Spear Phishing: More targeted phishing attacks aimed at specific individuals or organizations. Example: An email that seems to come from your CEO asking you to transfer funds urgently.

    • Vishing (Voice Phishing): Attackers use phone calls to impersonate legitimate entities and steal sensitive information.

  • Example: An attacker sends an email pretending to be from your bank asking you to click on a link to "verify your account." If you click the link, you're taken to a fake site where you unknowingly input your login credentials.


Leave a Comment: