Assignment 3 Network Security
Assignment 3 Network Security
Assignment 3 Network Security
Kainat Khalid
Class:
ADIT 3
Roll No:
117
Subject:
Networking
Submitted To:
Sir Shehzad
UCP
Networking
Question 1: Security is important in each field of life by
concerning this concept explain the network security.
Network:
Network is the arrangement of multiple devices which are connected through
media.
Security:
Security is the freedom from risk, danger or fear. It ensures the safety of any
particular object.
Network security:
Network security describes the policies and procedures implemented by a
network administrator to avoid and keep track of unauthorized access,
modification of network and network resources.
Network security
Network security is any activity designed to protect the usability and integrity of
your network and data. It includes both hardware and software technologies.
Effective network security manages access to the network. It targets a variety of
threats and stops them from entering or spreading on your network.
Identification:
Objective of identification is to uniquely identify a user. For example User ID is
used to identify user separately. User ID can be one or combination of the
following.
Identification
Authentication:
It is the process of verifying the identity of user. Typically it is based on 3 major
types.
Access controls:
It is security features that control who can access resources in the operating
system. Applications call access control functions to set who can access
specific resources. Access control is a way of limiting access to a system or to
physical or virtual resources. In computing, access control is a process by
which users are granted access and certain privileges to systems, resources or
information.
Access control
Advantages:
Network security helps in protecting data of clients existing on network.
Network security facilitates protection of information that is shared
between computers on the network.
Hacking attempts or virus attacks from the internet will not be able to
harm physical computers.
External possible attacks are prevented.
Question 2:
How you can secure a network by using an Attacker’s Tools to Stop
Network Attacks.
Attacks on your company’s IT resources are inevitable. Therefore, if you
only believe your network is secure, you could be placing important data at
risk. You have to know. Reliable network security takes setting up defenses
based on the assumption that the network has already been penetrated.
Working from this mindset forces you to ensure that your data can’t be stolen
by attackers from the corporate network.
To simplify things, most of network attackers use powerful tools to gain access
the data on a network:
1. MetaSploit Framework:
MetaSploit Framework - an open source tool for exploit development and
penetration testing Metasploit is well known in the security community.
Metasploit has exploits for both server and client based attacks; with
feature packed communication modules (meterpreter) that make pwning
systems fun! The framework now includes Armitage for point and click
network exploitation. This is the go to tool if you want to break into a
network or computer system.
Defending against Metasploit:
3. SSLStrip:
Sslstrip - using HTTPS makes people feel warm, fuzzy and secure. Using
sslstrip this security can be attacked, reducing the connection to an
unencrypted HTTP session, whereby all the traffic is readable. Banking
details, passwords and emails from your boss all in the clear. Even includes
a nifty feature where the favicon on the unencrypted connection is
replaced with a padlock just to make the user keep that warm and fuzzy
feeling.
Look for sudden protocol changes in browser bar. Not really mitigation.
4. Evilgrade:
Evilgrade - another man in the middle attack. Everyone knows that keeping
software updated is the way to stay secure. This little utility fakes the
upgrade and provides the user with a not so good update. Can exploit the
upgrade functionality on around 63 pieces of software including Opera,
Notepad++, VMware, Virtualbox, itunes, quicktime and winamp! It really
whips the llamas ass!
References: