Network Security
Network Security
Network Security
SECURITY
in
this
contemporary scenarios has become a
more sensible issue either it may be in
REAL WORLD or in the CYBER
WORLD .in this world as opposed to
the cyber world an attack is often
preceded by information gathering.
A basic understanding of
computer networks is requisite in order
to understand the principles of network
security. In this section, we'll cover
some of the foundations of computer
networking, then move on to an
overview of some popular networks. The
impressive development of computer
networks has reached the point, where
security becomes essential. Users want
to exchange data in a secure way. The
problem of network security is a
complex issue. Network security means
a protection of the network assets.
Network
security
is
a
complicated subject, historically only
tackled by well-trained and experienced
experts. However, as more and more
people becomewired'', an increasing
number of people need to understand the
What is Security:
Something that gives or assures
safety, as:
1. A group or department of private
guards:
Call building security if a visitor acts
suspicious
2. Measures adopted by a government
to prevent espionage, sabotage, or attack.
3. Measures adopted, as by a business
or homeowner, to prevent a crime
such as burglary or assault: Security
was lax at the firm's smaller plant,
etc.
Why do we need security?
o Protect vital information while still
allowing access to those who need it.
Ex:Trade secrets, medical records,
etc.
o Provide authentication and access
control for resources.
Ex: AFS.
o Guarantee availability of resources.
Ex: 5 9s (99.999% reliability).
Who is vulnerable?
Financial institutions and banks.
Internet service providers.
Pharmaceutical companies.
Government and defense agencies.
Contractors to various government
agencies.
Multinational corporations.
ANYONE ON THE NETWORK.
ATTACKS
Attacks on the security of a
computer system or network are best
characterized by viewing the
function of a computer system as
provided information. This normal
flow is depicted in figure:
information
information
source
destination
(b)
Interruption
(c)Modification
(d)
Fabrication
SECURITY THREATS
Categorization of these attacks is
passive attacks and active attacks.
Passive attacks: In this the goal of the
attacker is to obtain information that is
being transmitted. Two types of passive
attacks are release of message contents
and traffic analysis.
Active attacks: These attacks involve
some modification of the data stream or
the creation of false stream and can be
sub divided into 4 categories:
Masquerade, Replay, Modification of
messages, and denial of service.
Denial of service: DoS (Denial-ofService) attacks are probably the
nastiest, and most difficult to address.
Such attacks were fairly common in late
1996 and early 1997, but are now
becoming less popular. Some things that
can be done to reduce the risk of being
stung by a denial of service attack
include
Unauthorized Access :
``Unauthorized access'' is a very
high-level term that can refer to a
number of different sorts of attacks. The
goal of these attacks is to access some
resource that your machine should not
provide the attacker. These can take the
form of a virus, worm, or Trojan horse.
One of the most publicized threats to
security is intruder. Generally referred to
as a hacker or cracker, and some other
threats are executing commands illicitly,
confidential
breaches,
destructive
behavior.
Where do the attacks come from?
How, though, does an attacker gain
access to your equipment? Through any
connection that you have to the outside
world.
This
includes
Internet
connections, dial-up modems, and even
physical access.
Preventing security disasters:
Steganographic
are
such
two
techniques. Hence we focus on
development, use and management of
Cryptographic techniques.
What is Cryptography?
The word cryptography is
derived from Greek and when literally
translated, means secret writing. The
study of enciphering and encoding (on
the sending end), and decoding (on the
receiving end) is called cryptography.
Although the distinction is fuzzy, ciphers
are different from codes. When you mix
up or substitute existing letters, you are
using a cipher.
Encryption refers to the
transformation of data in plain text
form into a form called cipher text,
.The recovery of plain text requires the
key, and this process is known as
decryption. This key is meant to be
secret information and the privacy of
the text depends on the cryptographic
strength of the key. Ciphers are broken
into two main categories, substitution
ciphers and transposition ciphers.
Substitution ciphers replace letters in
the plaintext with other letters or
symbols, keeping the order in which
the
symbols
fall
the
same.
Transposition ciphers keep all of the
original letters intact, but mix up their
order.
Substitution cipher:
Plaintext letter
ABCDE
FGHIJKLMNOPQRSTUVW
XYZ
Cipher text letter
Q W E R
TYUIOPASDFGHJKLZXC
VBNM
You can construct a secret message from
the above table. Relative substitutions
can be done. So, the message Meet me
Decryption
Secret key cryptography is sometimes
referred to as symmetric cryptography
or conventional cryptography. If
sender and receiver agree on a shared
secret key, then by using secret key
cryptography we can send messages to
one another on a medium that can be
tapped,
without
worrying
about
eavesdroppers. All we need to do is have
the sender encrypt the messages and the
receiver decrypt them using the key. An
eavesdropper will only see unintelligible
data. Some of the secret key
cryptography algorithms are - DES, 3DES, blowfish, IDEA, AES, RC2, RC4,
RC5, ECB etc.
Advantages
of
Secret
Key
Cryptography:
Very fast relative to public key
cryptography.
Considered secure, provided the key
is relatively strong.
The cipher text is compact (i.e.,
encryption does not add excess
Baggage to the cipher text).
Widely used and very popular.
Disadvantages
of
Secret
Key
Cryptography:
Hybrid Systems:
Just one crypto-system will not
solve every problem. Most systems in
use today employ a hybrid system.
DEVELOPING AN EFFECTIVE
NETWORK SECURITY POLICY
A study reported by the U.S. General
Accounting Office (GAO) (1996) found
that the U.S. Department of Defense
network computers are extremely
vulnerable. A series of security attacks
conducted by the Defense Information
System Agency (DISA) revealed that of
38,000 attacks DISA could penetrate the
protection and gain access to the
network computers 65% of time. Of
those successful attacks only 4% (988
attacks) were detected by the target
organization. Furthermore, of those
detected, only 27% (267 attacks) were
actually reported to the appropriate
security
authority.
Given
the
sophisticated computer network at the
Department of Defense and the number
of computer personnel involved, the
CONCLUSION
Everyone has a different idea of
what ``security'' is, and what levels of
risk are acceptable. It's important to
build systems and networks in such a
way that the user is not constantly
reminded of the security system around
him. As and when new security methods
are developed, breaking of these
methods has increased. So measures
have to be taken to fill the loopholes, of
which cryptography has and is playing a
major role. Cryptography is evergreen
and developments in this area are a
better option.
REFERENCES
o William Stallings: Cryptography and
Network security: principles and
practice: 2nd edition.
Handbook of Applied
Cryptography.
o Smith,
Laurence
Dwight.