SUBJECT: NETWORK SECURITY.
ASSIGNMENT: P1, P2, P3, M1, M2, D1 and
D2.
,INTRODUCTION TO NETWORK SECURITY.
Computer network is a set of linked computers. If you want to use your computer
and keep it safe and secure from threats, you should apply computer security.
Network security is the protection of computer networks from unauthorized
access or loss. Network attacks may be caused by human actions either
mistakenly or malicious intent through incorrect installation configuration or
operation.
TYPES OF NETWORK ATTACKS.
(1) Denial of services. This is the type of network attacks in which perpetrator
seeks to make a machine or network resources inaccessible to an intended
user by temporary disrupting services of the user connected to the
network. The purpose of denial of services is to damage organization
networks cooperation by denied access to the user. Denial of services can
attack any online activity. Example of denial of services attack is when
hackers try to hack business or banks organization, they hack and steal
money or data by slow down network performance services.
(2) Back door attack. The purposes of back door attack are breaking services,
unlocking hidden features and information leakage. Backdoor is a malware
type use ineffective normal authentication procedures to access the
system. For example of backdoor attack is, lets say for example there are
two companies, company of website and company of email server and on
other hand, there are hackers, hackers try to connect to these company
networks and company respond quickly by building firewall( strong
security) which protect hackers to attack the company. Then hackers when
they confirmed that there is strong security at the company, hackers use
end users and vendor to attack the company because there is weak
security.
, (3) Spoofing. This is type of attack in which a person successfully act as another
by falsifying data in order to get access to something. For example, when
the user try to log in to the account, the first log in got attacked by the
hacker who is act as a server, the hacker will know your password and will
get all your information, and if you try again to log you will be connected to
a real server. This how spoofing attack occur.
(4) Brute force. This is a type of attack that use method of trial and error to get
information, such as user password or personal identification number. In
brute force attack, their special software designed for guesses password.
you can protect brute force attack by increasing the length, complexity of
password.
(5) Viruses. This is the type of malicious software that replicates itself and
infect computer without permission of the user. Virus has the ability to
copy itself and attach to another computer. Also virus has the ability
damage computer programs and inserting its own code.
(6) Worms. these are self replicating files that located in the memory of
infected computer. Worms used computer networks to replicate such as
email. Worms does not need human action to replicates. The purpose of
worm in the computer is stealing data, damage system files and giving
backdoor access for attackers.
(7) Trojan. This is a computer program that get access to a computer system by
appearing to be harmless but is designed to damage computer. They may
sit to your computer and collect information with knowing. Trojan horse
can steal some of your information such credit card information and install
more malware in your computer. Your computer can be affected by Trojan
by downloading anything from authorized source.
(8) Spyware. It is software program that secretly gathers personal information
and send without user aware of it, from a computer when it is online. It
records what you do in your computer. Spyware is also used in criminal
investigation area. Spy ware can be penetrate in your device in the form of
Trojan horse. Spy ware is also used to track your email username, password
or personal identification number.