Network Security in Computer Network
Class 12-Computer Engineering
Computer Network
Posted by yanib on 2025-03-23 07:54:42 |
Share: Facebook |
Twitter |
Whatsapp |
Linkedin Visits: 200
7.1 Introduction to Network Security
Network security is the practice of protecting computer networks and their associated systems, devices, and data from unauthorized access, cyber-attacks, and other security threats. It involves implementing various security measures to safeguard the integrity, confidentiality, and availability of data and network resources. As organizations rely increasingly on networks for communication and data exchange, network security becomes crucial to prevent data breaches, attacks, and downtime.
7.2 Types of Network Security
7.2.1 Firewall Protection
A firewall acts as a barrier between your trusted internal network and untrusted external networks, like the internet. It monitors and controls the incoming and outgoing network traffic based on predefined security rules.
-
Types of Firewalls:
-
Packet-Filtering Firewalls: These examine packets of data (units of transmission over the internet) to ensure they meet security criteria before allowing them to pass through. For example, a packet filter might block incoming traffic from a suspicious IP address.
-
Stateful Inspection Firewalls: These track the state of active connections and make decisions based on the context of the traffic. For example, if you're browsing a website and the firewall recognizes that the traffic is part of an ongoing connection, it will allow the response packets back in.
-
Proxy Firewalls: These act as intermediaries between users and the services they access on the internet. For example, when you try to access a website, the proxy server will fetch the web page for you, ensuring that your IP address remains hidden from the external world.
-
Example: A company uses a hardware firewall to prevent unauthorized external users from accessing its internal network, allowing only authorized personnel to access internal systems while blocking malicious attacks.
Firewalls can be hardware-based or software-based, each with its own advantages and use cases.
1. Hardware Firewall
A hardware firewall is a physical device placed between the internet and a local network. It filters traffic before it reaches devices in the network.
Features of Hardware Firewall:
-
Independent Device: Runs separately from computers.
-
Traffic Filtering: Blocks malicious traffic before it enters the network.
-
Protection for Multiple Devices: Secures all devices connected to the network.
-
Faster Performance: Does not slow down individual computers.
Example of Hardware Firewalls:
Diagram:
Advantages:
âœ”ï¸ Protects an entire network at once.
âœ”ï¸ More reliable since it runs on dedicated hardware.
âœ”ï¸ Provides additional security features (VPN, Intrusion Prevention).
Disadvantages:
⌠Expensive and requires technical knowledge to configure.
⌠Needs regular maintenance and updates.
2. Software Firewall
A software firewall is a program installed on a computer that controls internet traffic. It allows or blocks connections based on user-defined rules.
Features of Software Firewall:
-
Installed on Individual Devices: Works on personal computers or servers.
-
Monitors Traffic for One Device: Protects only the device it is installed on.
-
Application-Level Protection: Can block specific applications from accessing the internet.
Example of Software Firewalls:
Diagram:
Advantages:
âœ”ï¸ Easy to install and configure.
âœ”ï¸ Protects against specific application threats.
âœ”ï¸ Less expensive compared to hardware firewalls.
Disadvantages:
⌠Only protects the device it is installed on.
⌠Can slow down system performance.
⌠If disabled by malware, the computer becomes vulnerable.
Difference Between Hardware and Software Firewall
Feature | Hardware Firewall | Software Firewall |
---|
Location | External device between network and internet | Installed on individual computers |
Protection Level | Protects entire network | Protects a single device |
Performance Impact | No effect on device performance | Can slow down the system |
Setup Complexity | Requires network knowledge | Easy to install and use |
Cost | Expensive | Usually free or low-cost |

Which Firewall Should You Use?
-
For Personal Use: A software firewall (e.g., Windows Defender Firewall) is enough.
-
For Businesses or Organizations: A hardware firewall provides better security for multiple devices.
-
For Maximum Security: Use both hardware and software firewalls together.
7.2.2 Email Security
Email security is about protecting email communication from unauthorized access, tampering, or threats like malware, spam, and phishing attacks.
-
Methods of Email Security:
-
Encryption: Ensures the contents of an email are unreadable to anyone except the intended recipient. For example, using PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) to encrypt emails.
-
Spam Filters: Filters out unwanted emails (e.g., advertisements or phishing attempts) to ensure the inbox only receives legitimate messages.
-
Phishing Protection: Tools like anti-phishing software can recognize phishing attempts and block emails that attempt to impersonate legitimate businesses.
-
Example: A bank uses email encryption to send customers their financial statements, ensuring that even if an attacker intercepts the email, the contents will be unreadable.
7.2.3 Anti-virus and Anti-malware Software
These software tools are designed to detect, prevent, and remove malicious software (malware), such as viruses, worms, and Trojans, which can damage or steal data from computers or networks.
-
Types of Malware Detected:
-
Virus: A malicious program that attaches to a legitimate program and spreads when the program is run. Example: The ILOVEYOU virus, which spread via email and overwrote files.
-
Ransomware: A type of malware that encrypts files on a device and demands payment to decrypt them. Example: WannaCry ransomware, which affected thousands of organizations worldwide in 2017.
-
Spyware: Software that secretly collects user information without their knowledge. Example: CoolWebSearch software that tracked users' internet activity.
-
Trojan Horse: A malware disguised as legitimate software. For example, Emotet, which appeared as a legitimate email attachment but led to malware installation.
-
Example: A company uses Norton Anti-virus to scan and remove malware from all devices connected to the company network, ensuring no unauthorized access or damage is done.
7.2.4 Virtual Private Network (VPN)
A VPN creates a secure, encrypted connection over a less-secure network (like the internet). It allows users to access a private network remotely while keeping their data safe from eavesdropping.
7.2.5 Network Access Control (NAC)
Network Access Control (NAC) is a set of policies and technologies that regulate who and what can access a network, and under what conditions.
7.3 Common Network Security Threats
7.3.1 Virus
A virus is a malicious program that attaches itself to legitimate software or files and spreads when the software or file is executed. Viruses can cause a wide range of problems, from data corruption to system crashes.
7.3.2 Trojan Horse
A Trojan horse is malware disguised as a legitimate program, tricking the user into executing it. Unlike viruses, Trojans don't replicate themselves but can still cause significant harm by allowing unauthorized access or installing additional malware.
7.3.3 Computer Worm
A computer worm is a type of malware that can self-replicate and spread across networks without requiring human intervention. Worms often exploit software vulnerabilities to spread.
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
-
Example: The Blaster Worm, which exploited a vulnerability in Windows, spread rapidly across the internet, causing massive disruption to networks and systems worldwide in 2003.
7.3.4 Phishing Attacks
Phishing is a social engineering attack in which an attacker impersonates a trustworthy entity to trick the victim into providing sensitive information like passwords, credit card details, or personal data.
Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website.