Module 3 Computer Network Security
Module 3 Computer Network Security
Prepared by:
MAC JOHN T. POBLETE
Faculty, Information Technology Department
Cavite State University Naic
Email: nc.macjohn.poblete@cvsu.edu.ph
ITEC90 Network Fundamentals Module 3 Computer Network Security
Instructions:
1. Read carefully all instruction for each task before working on the requirements.
2. All questions related to requirements shall be coursed through email only. Replies will be sent
during office hours.
Pretest:
1. What is network security?
2. How does a network security work?
3. What are the different types of network security?
LET US LEARN!
Computer Network Security
Network security is a broad term that covers a multitude of technologies, devices and processes. In its
simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility
of computer networks and data using both software and hardware technologies. Every organization, regardless of
size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-
growing landscape of cyber threats in the wild today.
Today's network architecture is complex and is faced with a threat environment that is always changing and
attackers that are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of
areas, including devices, data, applications, users and locations. For this reason, there are many network security
management tools and applications in use today that address individual threats and exploits and also regulatory non-
compliance. When just a few minutes of downtime can cause widespread disruption and massive damage to an
organization's bottom line and reputation, it is essential that these protection measures are in place.
o Privacy: Privacy means both the sender and the receiver expects confidentiality. The transmitted message
should be sent only to the intended receiver while the message should be opaque for other users. Only the
sender and receiver should be able to understand the transmitted message as eavesdroppers can intercept
the message. Therefore, there is a requirement to encrypt the message so that the message cannot be
intercepted. This aspect of confidentiality is commonly used to achieve secure communication.
o Message Integrity: Data integrity means that the data must arrive at the receiver exactly as it was sent.
There must be no changes in the data content during transmission, either maliciously or accident, in a
transit. As there are more and more monetary exchanges over the internet, data integrity is more crucial.
The data integrity must be preserved for secure communication.
o End-point authentication: Authentication means that the receiver is sure of the sender’s identity, i.e., no
imposter has sent the message.
o Non-Repudiation: Non-Repudiation means that the receiver must be able to prove that the received
message has come from a specific sender. The sender must not deny sending a message that he or she
send. The burden of proving the identity comes on the receiver. For example, if a customer sends a request
to transfer the money from one account to another account, then the bank must have a proof that the
customer has requested for the transaction.
Access control. Not every user should have access to your network. To keep out potential attackers, you
need to recognize each user and each device. Then you can enforce your security policies. You can block
noncompliant endpoint devices or give them only limited access. This process is network access control (NAC).
Anti-virus and anti-malware software. "Malware," short for "malicious software," includes viruses, worms,
Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even
weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files
afterward to find anomalies, remove malware, and fix damage.
Application security. Any software you use to run your business needs to be protected, whether your IT staff
builds it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can
use to infiltrate your network. Application security encompasses the hardware, software, and processes you use to
close those holes.
Behavioral analytics. To detect abnormal network behavior, you must know what normal behavior looks like.
Behavioral analytics tools automatically discern activities that deviate from the norm. Your security team can then
better identify indicators of compromise that pose a potential problem and quickly remediate threats.
Cloud security. Cloud security is a broad set of technologies, policies, and applications applied to defend
online IP, services, applications, and other imperative data. It helps you better manage your security by shielding
users against threats anywhere they access the internet and securing your data and applications in the cloud.
Data loss prevention. Organizations must make sure that their staff does not send sensitive information
outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even
printing critical information in an unsafe manner.
Email security. Email gateways are the number one threat vector for a security breach. Attackers use
personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients
and send them to sites serving up malware. An email security application blocks incoming attacks and controls
outbound messages to prevent the loss of sensitive data.
Mobile device security. Cybercriminals are increasingly targeting mobile devices and apps. Within the next
three years, 90 percent of IT organizations may support corporate applications on personal mobile devices. Of
course, you need to control which devices can access your network. You will also need to configure their connections
to keep network traffic private.
Security information and event management. SIEM products pull together the information that your security
staff needs to identify and respond to threats. These products come in various forms, including physical and virtual
appliances and server software.
Web security. A web security solution will control your staff's web use, block web-based threats, and deny
access to malicious websites. It will protect your web gateway on site or in the cloud. "Web security" also refers to the
steps you take to protect your own website.
Wireless security. Wireless networks are not as secure as wired ones. Without stringent security measures,
installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an
exploit from taking hold, you need products specifically designed to protect a wireless network.
Post Test
Answer the following questions:
1. Differentiate the three different network controls.
2. What are the aspects of network security? Explain each.
3. Give at least five examples of network security. Explain each.
4. Why is network security important?
ITEC90 Network Fundamentals Module 3 Computer Network Security
References
Computer Network Security - javatpoint. (n.d.). Www.Javatpoint.Com.
https://www.javatpoint.com/computer-network-security
What is Network Security? (2021a, May 6). Forcepoint. https://www.forcepoint.com/cyber-
edu/network-security
What Is Network Security? (2021b, June 28). Cisco.
https://www.cisco.com/c/en/us/products/security/what-is-network-security.html#
%7Etypes