Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Network security issues, Sniffing, IP Spoofing, Common threats, E-mail threats, IP security, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, types of firewall, Intrusion detection system

Beoordeling
-
Verkocht
-
Pagina's
28
Geüpload op
02-05-2023
Geschreven in
2022/2023

Network security issues, Sniffing, IP Spoofing, Common threats, E-mail threats, IP security, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, types of firewall, Intrusion detection system

Instelling
Vak

Voorbeeld van de inhoud

UNIT – II

NETWORK SECURITY

Network security issues, Sniffing, IP Spoofing, Common threats, E-mail threats, IP security,
SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, types of firewall,
Intrusion detection system.



NETWORK SECURITY ISSUES

What is Network Security?

Network security is any activity designed to protect the usability and integrity of your
network and data. It includes both hardware and software technologies. It targets a variety of
threats. It stops them from entering or spreading on your network. Effective network security
manages access to the network

Network security encompasses all the steps taken to protect the integrity of a computer
network and the data within it. Network security is important because it keeps sensitive data safe
from cyber attacks and ensures the network is usable and trustworthy. Successful network
security strategies employ multiple security solutions to protect users and organizations from
malware and cyber attacks, like distributed denial of service.

A network is composed of interconnected devices, such as computers, servers and
wireless networks. Many of these devices are susceptible to potential attackers. Network security
involves the use of a variety of software and hardware tools on a network or as software as a
service.

Why is network security important?

Network security is critical because it prevents cyber criminals from gaining access to
valuable data and sensitive information. When hackers get hold of such data, they can cause a
variety of problems, including identity theft, stolen assets and reputational harm.

The following are four of the most important reasons why protecting networks and the
data they hold is important:

 Operational risks.
 Financial risks for compromised personally identifiable information (PII).
 Financial risk for compromised intellectual property.
 Regulatory issues.

,Benefits of network security

The following are the main benefits of network security:

 Functionality.
 Privacy and security.
 Intellectual property protection.
 Compliance.

Challenges of network security

Network security involves a number of challenges, including the following:

 Evolving network attack methods.
 User adherence.
 Remote and mobile access.
 Third-party partners.

, The following table matches the OSI layer levels to the corresponding type of network security:-


OSI LAYERS SECURITY
ISSUE

Application Authentication


Presentation Access control


Session Nonrepudiation


Transport Data integrity


Network Confidentiality


Data Link Assurance and
availability


Physical Notarization and
signature



Some Common Network Security Issues

1) Internal Security Threats

Over 90% of cyber attacks are caused by human error. This can take the form of phishing
attacks, careless decision-making, weak passwords, and more. Insider actions that negatively
impact your business's network and sensitive data can result in downtime, loss of revenue, and
disgruntled customers.

2) Distributed Denial-Of-Service (DDoS) Attacks

A DDoS attack causes websites to crash, malfunction, or experience slow loading times. In these
cases, cybercriminals infect internet-connected devices (mobile phones, computers, etc.) and
convert them into bots. Hackers send the bots to a victim's IP address. This results in a high
volume of internet traffic bombarding the website with requests and causing it to go offline.
These attacks make it difficult to separate legitimate and compromised traffic.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
2 mei 2023
Aantal pagina's
28
Geschreven in
2022/2023
Type
College aantekeningen
Docent(en)
Keerthiraaj,ap/iot
Bevat
Alle colleges

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
startech1

Maak kennis met de verkoper

Seller avatar
startech1 Manakula Vinayagar Institute of Technology
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
3 jaar
Aantal volgers
0
Documenten
4
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen