Seminarreport
Seminarreport
Seminarreport
A SEMINAR REPORT
ON
NETWORK SECURITY
By
Hemlata Pandey(2202250100113)
In
partial fulfillment for
the degree of
Bachelor of Technology
in
Computer Science Engineering
February 2023-2024
Title: Seminar Report on Network
Security
. Introduction
1. Confidentiality:
Network security ensures that sensitive information
remains confidential and is accessible only to authorized
users. This is particularly important for protecting personal
data, financial information, and business secrets.
2. Integrity:
Network security measures guarantee the integrity of data
by preventing unauthorized modifications, alterations, or
tampering. It ensures that information remains accurate
and trustworthy throughout its lifecycle.
3. Availability
Network security safeguards against disruptions and
ensures the continuous availability of network resources.
This is vital for businesses and organizations to maintain
operations without interruptions.
4. Protection Against Unauthorized Access:
Network security prevents unauthorized users from
gaining access to sensitive data or critical systems.
Unauthorized access can lead to data breaches, financial
losses, and reputational damage.
5. Prevention of Cyberattacks:
With the rise of sophisticated cyber threats such as
malware, ransomware, and phishing attacks, network
security acts as a barrier, protecting networks from various
forms of malicious activities.
1. Evolution and growth of network threats : Early Threats (1980s -
1990s):
Malware Pioneers: The 1980s saw the emergence of the first
computer viruses, such as the Morris Worm in 1988. These
early threats were often experiments or pranks, spreading
through floppy disks and early computer networks.
Phreaking and Hacking: The 1990s witnessed the rise of
phreaking (manipulating telecommunications systems)
and hacking, with groups like the Chaos Computer Club
gaining notoriety. The motivations were often curiosity
and a desire for exploration rather than malicious intent.
2. Commercialization of Cybercrime (Late 1990s - Early 2000s):
Increasing Connectivity: The
advent of the internet in the late
1990s led to a surge in connectivity. This, in turn, provided
new opportunities for cybercriminals to exploit
vulnerabilities in networks.
Financial Motivations: The
motive behind cyber-attacks shifted
towards financial gains. The rise of e-commerce and online
banking presented lucrative targets for attackers seeking
to steal personal and financial information
3. Malware
4. Phishing
5. Denial of Service (DoS) attacks
6. Man-in-the-Middle (MitM) attacks
7. Insider Threats
8. Password Attacks
1. Confidentiality:
Goal: Ensure that sensitive information remains private
and is accessible only to authorized individuals or systems.
Means: Encryption, access controls, secure communication
protocols.
2. Integrity:
Goal: Guarantee the accuracy and trustworthiness of data
by preventing unauthorized alterations, modifications, or
tampering.
Means: Digital signatures, checksums, data validation
mechanisms.
3. Availability:
Goal: Ensure that network resources and services are
consistently available and accessible to authorized users.
Means: Redundancy, load balancing, disaster recovery
planning, and measures to prevent and mitigate denial-of-
service (DoS) attacks.
4. Authentication:
Goal: Verify the identity of users, devices, or systems
attempting to access the network.
Means: Passwords, biometrics, multi-factor authentication
(MFA), digital certificates.
5. Non-repudiation:
Goal: Prevent individuals from denying their actions or
transactions within the network.
Means: Digital signatures, transaction logs
an unsecured network.
Use Cases: Secure command-line, file transfer (SCP/SFTP),
and tunneling.
5. Pretty Good Privacy (PGP) / GNU Privacy Guard (GPG):
Purpose: Provides cryptographic privacy and
signatures.
X. Conclusion
XI. References
Cite relevant books, articles, and websites that were used for
research.