You are on page 1of 27

ll

Chapter 10
Network security
Concepts

l XII p SE o d
Network Security Concepts
Ne rk e ri y i e r e yi l
i
i i i ,
l i , i , i , ii i ,
i i l , i l
, , i
i ii l i i i
e vir e
Network Security Concepts
Netw rk ec rity t re t ty e :
P ive Netw rk re t : P ive cy er tt ck em l y
i r tive met t t t e cker e t r w tte ti t
t e tt ck P ive tt ck re lly t g t eri g er ti ,
w ic me t ey lly em l y me rt m lw re r ck
that eavesdrops on system communications Activities such as
wiret i g i le c t t re e ig e t i terce t tr ic
tr veli g t r g t e etw rk
Active Netw rk re t : Active cy er tt ck re te ggre ive,
l t t tt ck t t victim imme i tely ec me w re w e
they occur Activities such as Denial of ervice (Do ) attacks and
Q i ecti tt ck w ere t e tt cker i ttem ti g t e ec te
c mm t i r t t e etw rk’ rm l er ti ir e ,
w rm , r r e, m,m lw re, e i l ervice tt ck ,
w r cr cker re ll e m le ctive cy er tt ck
Network Security Concepts
m ter vir

i ir i l i r i

i ir i r r r ir li i

il rr
Network Security Concepts

Ways to prevent from computer virus –


il , i i ,
ll
ll i i i

y e eg l rly
l
l ile re lly
Network Security Concepts
i li i , l li i
l rly er e ' l re' i e e i re

i
il il i il
li i i
i i i
li li i i li i
ill ll il l
i l l i i l l
i e er i v l er le i ill e e
i
The Internet Relay Chat (IRC) worm
l, i i il li i i
il i il i l
e i re l er re vi P P e rk
Network Security Concepts
Ways to prevent from computer worms
e re t t c m ter’ er ti g y tem
lic ti re t te wit t e l te t ver i
P i i g i t er l r w y r cker t re
w rm Alw y e e tr c ti w e e i g nted
em il , e eci lly t e r m k w e er t t c t i
attachments or dubious links
Be re t i ve t i tr g i ter et ec rity tw re
l ti t t c el l ck c m ter w rm
Network Security Concepts
i li i l g un
ke r l er r i ei e e, i r , e l, r i
l i os l i
i
i ll l l
l i l i i il
ill
l i i i i li l i
i ii i
i i i ll li i
ki er li e r i
i i i l i
i i i l l
i i i i
Network Security Concepts
Ways to prevent from Tro an Hoarse
Never w l r i t ll tw re r m rce y ’t
tr t c m letely

• Never open an attachment or run a program sent in an


em il r m me e y ’t k w

Kee ll tw re y r c m ter t te wit t e


latest patches

M ke re r tivir i i t lle r i g
c m ter
Network Security Concepts

Spam - is any kind of unwanted, unsolicited digital


communication that gets sent out in bulk through
email
Ways to prevent from spam
• Never give out or post your email address publicly
• Think before click
• Do not reply to spam messages
• Download spam filtering tools and use anti-virus
software
Network Security Concepts
Cookies - are files that contain small pieces of data — like a
er me w r t t re e c ge etwee
er' c m ter we erver t i e ti y eci ic er
im r ve t eir r w i g e erie ce
i g ite e c kie t tr ck item er revi ly
viewe , ll wi g t e ite t gge t t er g t ey mig t
like
kie c ’t i ect c m ter wit vir e r t er m lw re,
lt g me cy er tt ck c i ck c kie ,
therefore, browsing sessions
Bew re ir P rty kie ir rty c kie let verti er
r lytic c m ie tr ck i ivi l' r w i g i t ry
cr t e we y ite t t c t i t eir c kie
themselves aren't harmful
Network Security Concepts
i i i ll
Firewalls are software programs or hardware devices that filter and examine the
information coming through your Internet connection.
All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security
criteria.
You need a firewall to protect your confidential information from those not
authorised to access it and to protect against malicious users.
One of the most important elements of a firewall is its access control features,
which distinguish between good and bad traffic.
There are various types of firewall. In ascending order, they are
• Packet layer : This analyses network traffic at the transport protocol layer.
• Circuit level : This validates that packets are either connection or data packets.
• Application layer : This ensures valid data at the application level before
connecting.
• Proxy server : This intercepts all messages entering or leaving the network.
Network Security Concepts
W t Ki Att ck irew ll Pr tect Ag i t
Firewalls prevent cybercriminals from gaining access to your personal information.
The issues include, but are not limited to:
Backdoor Access: A backdoor refers to any security holes or bugs that, allow
unauthorized control over the program. Even entire operating systems like
Windows can have backdoors, and an experienced hacker knows how to take
advantage of them.
Remote Login Hijacking: A remote desktop allows you to connect and control your
computer from another location over the internet. However, hackers can hijack the
login, access your machine, and steal your files.
Email Abuse: This type of attack targets an individual in which the perpetrator sends
thousands of emails to block the victim’s inbox. Spam email is also popular and
while most is merely annoying, some may contain viruses and malware.
Source Routing: When data packets are traveling through an online network, they
are typically “passed along” by multiple routers before reaching its destination.
Some hackers take advantage of this system by making malicious data packs look
like they’re coming from a trusted source. Many firewalls disable source routing for
this reason.
Network Security Concepts
HTTP (Hyper text transfer protocol secure) - helps prevent intruders
r m t m eri g wit t e c mm ic ti etwee y r we ite
y r er ' r w er It cr m le t e me ge i g t t "c e"
t t e i etwee c re t e me ge It kee r
i rm ti e r m cker
Https uses the "code" on a ecure ockets Layer ( L), sometimes
c lle r rt yer ec rity t e t e i rm ti ck
rt
e ti lly, we ee t ree t i g t e cry t t :
• The data to be sent/encrypted
A i e e cry ti key
A e cry ti lg rit m m t cti t t g r le t e t
ymmetric e cry ti i e i tt A ymmetric me we re
i g tw i ere t key , e t e cry t e t ecry t
i e cry ti i w e t r t er t
Network Security Concepts
y er rime A y crime t t i v lve c m ter etw rk i
called a Computer Crime or Cyber Crime
r i t er term ,it i crime i w ic c m ter i t e ect
t e crime cki g, i i g, mmi g r i e t l t
c mmit e e c il r gr y, te crime
STEPS TO PROTECT YOURSELF AGAINST CYBER CRIME
1 M ke re y r ec rity tw re i c rre t te it
reg l rly
2 ck r l g y r c m ter w e y te w y
3 Go offline when you don’t need an internet connection
4 i er ri g le li e
5 i k twice t i g lic Wi i
6 W e i t, ’t click
Network Security Concepts
Phishing is a cyber attack that uses disguised email as a
we e tt cker m er e tr te e tity me ki ,
e g l i t trick t e em il reci ie t i t elievi g t t t e
me ge i met i g t ey w t r ee reci ie t ill e
sensitive information like account no, username ,password etc
,t e tt cker e t e e
How to prevent phishing
• Always check the spelling of the URLs before click
• Watch out for URL redirects, that sent to a different website with identical
design
• If receive an email from that seems suspicious, contact that source with a
new email, rather than just hitting reply
• Don't post personal data, like your birthday, vacation plans, or your address
or phone number, publicly on social media
Network Security Concepts

Illeg l w l i gi t i i g ile r c m ter re rce t t


t ve t e rig t t e r m t e I ter et yrig t
l w r i it I ter et er r m t i i g c ie me i t t
we not legally purchase These laws exist to prevent digital
piracy, m c w ic i ge er lly c cte t r g I ter et ile
ri g w t reve t illeg l w l i g
m vie ir cy ct lly ecre e ig i ic tly t r g Bit rre t
and other traceable methods, as the adoption curve of Netflix
(and t er tre mi g ti i cre e e wer t ere i
im le m ke it c e er e ier t cce me i i "leg l"
m er, m re e le will tili e t e t t t e "illeg l"
t
Network Security Concepts

Child pornography is considered to be any depiction of a minor or


i ivi lw e r t e mi r w i e g ge i e l
r e lly rel te c ct i i cl e ict re , vi e ,
c m ter ge er te c te t ve lteri g im ge r vi e
that it appears to be a minor can be considered child pornography

il r gr y i crime i I i I Act, 2000 I i Pe l


e, 1860 r vi e r tecti r m c il r gr y e ewly
passed Information Technology Bill is set to make it illegal to not
ly cre te tr mit c il r gr y i y electr ic rm,
t eve t r w e it
Network Security Concepts
Wit t e gr wt i li e ervice i ter et e, t ere re m y
rt itie r crimi l t c mmit c m r e e re
dishonest schemes that seek to take advantage of unsuspecting people
t g i e e it c m ey, r cce t er l et il ee
re te c t i e i m i i g me ge
mm ty e li e c m i cl e:
• Unexpected prize scams,
U e ecte m ey c m ,
ti g r r m ce c m ,
re t e t rti c m,
• Jobs and investment scams, and
I e tity t e t
Do not respond to online scams or fraud. If you receive an email or SMS which looks
like a scam, the best thing to do is delete it. It is the best solution for online scam.
Network Security Concepts

Cyber forensics is a way or an electronic discovery technique which


i e t etermi e expo e tec ic l crimi l evi e ce
ri c ilitie cy er re ic re
m ter re ic
• Computer exams
t ly i
t e t y
M lw re ly i
• Mobile devices
Netw rk ly i
P t gr y
i e ly i
Network Security Concepts
elle l Pr
er y P i r er y re e y er r r
ii i ll li i i
i l il l i li i
l i , i i l i
, i , li i i
r , y l r l ,e ,

ll l i i i
, i ll l li
i ll l l l ii
er i lly r ive eri i e, i lie e i l er i er
i li i
Network Security Concepts
Why should an IP be protected?
IP i et c e e l ite y t e w er r
c mmerci l g i ym er
IP w er m y i te t t t er r m m ct ri g
selling products and services which are dully protected by him
IP w er c ell r lice e t e IP r c mmerci l g i
IP c e e t e t li t e g will r v l ei t e
m rket
 IP can be mention in resumes of it’s creator and thus show
c m ete ce it’ cre t r
IPR certi ic te e t li e leg l v li w er i t
i tellect l r erty
Network Security Concepts

Kinds of IPRs
P te t t r tect tec l gie e P te t Act
r e M rk t r tect w r , ig , l g , l el e r e
M rk Act
• Design (to protect outer ornamental configuration –The
e ig Act
Ge gr ic l I ic ti GI t r tect regi eci ic
r ct e Ge gr ic l I ic ti G Act
• Copyright (to protect literary and artistic work –The Copyright
Act
Network Security Concepts
IPRs are protected in accordance with the provisions of
legi l ti c try eci ic I I i , IPR c e r tecte
m li e er t e ct me t em re

1- The Patent Act, 1970,


2 e e ig Act, 2000,
3 e r e M rk Act, 1999,
4 e Ge gr ic l I ic ti G Act, 1999,
5- The Copyright Act, 1957,
6 Pr tecti I tegr te irc it y t e ig Act, 2000,
7 Pr tecti Pl t rietie rmer Rig t Act, 2001,
l r e ecret
Network Security Concepts
cki g i i e ti yi g we k e i c m ter y tem r etw rk t e l it it we k e e
t g i cce m le:U i g w r cr cki g lg t g i cce t y tem
y e cker
t ic l cker W ite t : A cker w g i cce t y tem wit view t i t e
i e ti ie we k e e ey m y l er rm e etr ti e ti g v l er ility
e me t
• Cracker (Black hat): A hacker who gains unauthorized access to computer systems for
er lg i e i te t i lly t te l c r r te t , vi l te riv cy rig t , tr er
r m k cc t etc
Grey t: A cker w i i etwee et ic l l ck t cker e e re k i t
c m ter y tem wit t t rity wit view t i e ti y we k e e reve l t em t
t e y tem w er
cri t ki ie : A kille er w g i cce t c m ter y tem i g lre y
m et l
cktivi t: A cker w e cki g t e ci l, religi , litic l, etc me ge
i i lly e y i cki g we ite le vi g t e me ge t e i cke we ite
P re ker:A cker w i e ti ie e l it we k e e i tele e i te
computers
Network Security Concepts

y er l w i yl wt t lie t t e i ter et i ter et rel te


technologies Cyber law provides legal protections to people using the
i ter et i i cl e t i e e every y citi e
U er t i g cy er l w i t e tm t im rt ce t y ew
e t e i ter et y er l w i im rt t ec e it t c e lm t ll
ect tr cti ctivitie i v lvi g t e i ter et,
W rl Wi e We cy er ce
I Act 2000 w e cte me e i 2008 c veri g i ere t
ty e crime er cy er l w i I i
Network Security Concepts
The Information Technology Act, 2000 provides legal recognition to the transaction
done via an electronic exchange of data and other electronic means of
communication or electronic commerce transactions. Some of sections under IT
act 2000 are given below.
SECTIO
OFFENCE PENALTY
N
Publishing images containing sexual Imprisonment up to seven years, or/and with fine up to Rs.
67A
acts 1,000,000
Imprisonment up to five years, or/and with fine up
Publishing child porn or predating to Rs.1,000,000 on first conviction. Imprisonment up to
67B
children online seven years, or/and with fine up to Rs.1,000,000 on second
conviction.
67C Failure to maintain records Imprisonment up to three years, or/and with fine.
Imprisonment up to three years, or/and with fine up
68 Failure/refusal to comply with orders
to Rs.200,000
69 Failure/refusal to decrypt data Imprisonment up to seven years and possible fine.
Securing access or attempting to
70 Imprisonment up to ten years, or/and with fine.
secure access to a protected system
Imprisonment up to three years, or/and with fine up
71 Misrepresentation
to Rs.100,000

You might also like