Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Assignment 3 Network Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Name:

Kainat Khalid

Class:

ADIT 3

Roll No:

117

Subject:

Networking

Submitted To:

Sir Shehzad

UCP
Networking
Question 1: Security is important in each field of life by
concerning this concept explain the network security.
Network:
Network is the arrangement of multiple devices which are connected through
media.

Security:
Security is the freedom from risk, danger or fear. It ensures the safety of any
particular object.

Network security:
Network security describes the policies and procedures implemented by a
network administrator to avoid and keep track of unauthorized access,
modification of network and network resources.

Network security

Network security is any activity designed to protect the usability and integrity of
your network and data. It includes both hardware and software technologies.
Effective network security manages access to the network. It targets a variety of
threats and stops them from entering or spreading on your network.

Network security objectives:


1. Identification
2. Authentication
3. Access control

Identification:
Objective of identification is to uniquely identify a user. For example User ID is
used to identify user separately. User ID can be one or combination of the
following.

Identification

Authentication:
It is the process of verifying the identity of user. Typically it is based on 3 major
types.

 Something user knows


Password
 Something user have
Key, smart card, disk or other device
 Something user is
Fingerprint, voice, or retinal scans
Authentication

Access controls:
It is security features that control who can access resources in the operating
system. Applications call access control functions to set who can access
specific resources. Access control is a way of limiting access to a system or to
physical or virtual resources. In computing, access control is a process by
which users are granted access and certain privileges to systems, resources or
information.

Access control

Elements of a comprehensive security program


 Have good passwords
 Use good antiviral products
 Use good cryptography
 Have good firewalls
 Have a backup system
 Audit and Monitor systems and networks

Advantages:
 Network security helps in protecting data of clients existing on network.
 Network security facilitates protection of information that is shared
between computers on the network.
 Hacking attempts or virus attacks from the internet will not be able to
harm physical computers.
 External possible attacks are prevented.

Question 2:
How you can secure a network by using an Attacker’s Tools to Stop
Network Attacks.
Attacks on your company’s IT resources are inevitable. Therefore, if you
only believe your network is secure, you could be placing important data at
risk. You have to know. Reliable network security takes setting up defenses
based on the assumption that the network has already been penetrated.
Working from this mindset forces you to ensure that your data can’t be stolen
by attackers from the corporate network.

To simplify things, most of network attackers use powerful tools to gain access
the data on a network:

1. MetaSploit Framework:
MetaSploit Framework - an open source tool for exploit development and
penetration testing Metasploit is well known in the security community.
Metasploit has exploits for both server and client based attacks; with
feature packed communication modules (meterpreter) that make pwning
systems fun! The framework now includes Armitage for point and click
network exploitation. This is the go to tool if you want to break into a
network or computer system.
Defending against Metasploit:

 Keep all software updated with the latest security patches.


 Use strong passwords on all systems.
 Deploy network services with secure configurations.
2. Ettercap:
Ettercap - a suite of tools for man in the middle attacks (MITM). Once you
have initiated a man in the middle attack with Ettercap use the modules
and scripting capabilities to manipulate or inject traffic on the fly. Sniffing
data and passwords are just the beginning; inject to exploit FTW!

Defending against Ettercap:

 Understand that ARP poisoning is not difficult in a typical switched


network.
 Lock down network ports.
 Use secure switch configurations and NAC if risk is sufficient.

3. SSLStrip:
Sslstrip - using HTTPS makes people feel warm, fuzzy and secure. Using
sslstrip this security can be attacked, reducing the connection to an
unencrypted HTTP session, whereby all the traffic is readable. Banking
details, passwords and emails from your boss all in the clear. Even includes
a nifty feature where the favicon on the unencrypted connection is
replaced with a padlock just to make the user keep that warm and fuzzy
feeling.

Defending against sslstrip:

 Be aware of the possibility of MITM attacks (arp, proxies / gateway,


wireless).

 Look for sudden protocol changes in browser bar. Not really mitigation.
4. Evilgrade:

Evilgrade - another man in the middle attack. Everyone knows that keeping
software updated is the way to stay secure. This little utility fakes the
upgrade and provides the user with a not so good update. Can exploit the
upgrade functionality on around 63 pieces of software including Opera,
Notepad++, VMware, Virtualbox, itunes, quicktime and winamp! It really
whips the llamas ass!

Defending against evilgrade:

 Be aware of the possibility of MITM attacks (arp, proxies / gateway,


wireless).

 Only perform updates to your system or applications on a trusted network.

5. Social Engineer Toolkit:


Social Engineer Toolkit - makes creating a social engineered client side
attack way too easy. Creates the spear phish, sends the email and serves
the malicious exploit. SET is the open source client side attack weapon of
choice.

Defending against SET:

 User awareness training around spear phishing attacks.


 Strong Email and web filtering controls.

References:

Network security - https://www.techopedia.com/definition/24783/network-


security

Attacker tool - https://hackertarget.com/11-offensive-security-tools/

You might also like