Professional Documents
Culture Documents
Chapter 10
Network security
Concepts
l XII p SE o d
Network Security Concepts
Ne rk e ri y i e r e yi l
i
i i i ,
l i , i , i , ii i ,
i i l , i l
, , i
i ii l i i i
e vir e
Network Security Concepts
Netw rk ec rity t re t ty e :
P ive Netw rk re t : P ive cy er tt ck em l y
i r tive met t t t e cker e t r w tte ti t
t e tt ck P ive tt ck re lly t g t eri g er ti ,
w ic me t ey lly em l y me rt m lw re r ck
that eavesdrops on system communications Activities such as
wiret i g i le c t t re e ig e t i terce t tr ic
tr veli g t r g t e etw rk
Active Netw rk re t : Active cy er tt ck re te ggre ive,
l t t tt ck t t victim imme i tely ec me w re w e
they occur Activities such as Denial of ervice (Do ) attacks and
Q i ecti tt ck w ere t e tt cker i ttem ti g t e ec te
c mm t i r t t e etw rk’ rm l er ti ir e ,
w rm , r r e, m,m lw re, e i l ervice tt ck ,
w r cr cker re ll e m le ctive cy er tt ck
Network Security Concepts
m ter vir
i ir i l i r i
i ir i r r r ir li i
il rr
Network Security Concepts
y e eg l rly
l
l ile re lly
Network Security Concepts
i li i , l li i
l rly er e ' l re' i e e i re
i
il il i il
li i i
i i i
li li i i li i
ill ll il l
i l l i i l l
i e er i v l er le i ill e e
i
The Internet Relay Chat (IRC) worm
l, i i il li i i
il i il i l
e i re l er re vi P P e rk
Network Security Concepts
Ways to prevent from computer worms
e re t t c m ter’ er ti g y tem
lic ti re t te wit t e l te t ver i
P i i g i t er l r w y r cker t re
w rm Alw y e e tr c ti w e e i g nted
em il , e eci lly t e r m k w e er t t c t i
attachments or dubious links
Be re t i ve t i tr g i ter et ec rity tw re
l ti t t c el l ck c m ter w rm
Network Security Concepts
i li i l g un
ke r l er r i ei e e, i r , e l, r i
l i os l i
i
i ll l l
l i l i i il
ill
l i i i i li l i
i ii i
i i i ll li i
ki er li e r i
i i i l i
i i i l l
i i i i
Network Security Concepts
Ways to prevent from Tro an Hoarse
Never w l r i t ll tw re r m rce y ’t
tr t c m letely
M ke re r tivir i i t lle r i g
c m ter
Network Security Concepts
ll l i i i
, i ll l li
i ll l l l ii
er i lly r ive eri i e, i lie e i l er i er
i li i
Network Security Concepts
Why should an IP be protected?
IP i et c e e l ite y t e w er r
c mmerci l g i ym er
IP w er m y i te t t t er r m m ct ri g
selling products and services which are dully protected by him
IP w er c ell r lice e t e IP r c mmerci l g i
IP c e e t e t li t e g will r v l ei t e
m rket
IP can be mention in resumes of it’s creator and thus show
c m ete ce it’ cre t r
IPR certi ic te e t li e leg l v li w er i t
i tellect l r erty
Network Security Concepts
Kinds of IPRs
P te t t r tect tec l gie e P te t Act
r e M rk t r tect w r , ig , l g , l el e r e
M rk Act
• Design (to protect outer ornamental configuration –The
e ig Act
Ge gr ic l I ic ti GI t r tect regi eci ic
r ct e Ge gr ic l I ic ti G Act
• Copyright (to protect literary and artistic work –The Copyright
Act
Network Security Concepts
IPRs are protected in accordance with the provisions of
legi l ti c try eci ic I I i , IPR c e r tecte
m li e er t e ct me t em re