Introduction of Computer and Network Security. 1 Overview. A good security professional should possess two important skills: (1) the sense of security, and (2 ). The goal of network securIty IS to gIve people the hberty of enJoymg computer networks wIthout fear of compromlsmg theIr rIghts and mterests. Network secunty . Feb 18, Kizza, Joseph Migga. Computer Network Security /Joseph Migga Kizza with SANS Institute: dancindonna.info
|Language:||English, Spanish, Arabic|
|ePub File Size:||16.45 MB|
|PDF File Size:||15.15 MB|
|Distribution:||Free* [*Register to download]|
Intro to computer and network security. t o to co pute a d Malware, botnets, DDoS, network security testing . browsers, media players, PDF readers, etc.,. p y. Network Security deals with all aspects related to the protection of the sensitive We assume the reader has a basic understanding of computer networking and. Students can take their own notes, for example, on lecture slide set PDF Networks and Security (2IC60) course and the referenced reading materials. It is.
Malware can also become very dangerous as it can infect a network and then remain calm for days or even weeks. This software handles this threat by scanning for malware entry and regularly tracks files afterward in order to detect anomalies, remove malware, and fix damage. Application Security: It is important to have an application security since no app is created perfectly. It is possible for any application to comprise of vulnerabilities, or holes, that are used by attackers to enter your network. Application security thus encompasses the software, hardware, and processes you select for closing those holes. Behavioral Analytics: In order to detect abnormal network behaviour, you will have to know what normal behavior looks like.
When adware is downloaded without consent, it is considered malicious. Spyware works similarly to adware, but is installed on your computer without your knowledge.
It can contain keyloggers that record personal information including email addresses, passwords, even credit card numbers, making it dangerous because of the high risk of identity theft.
Computer worm Computer worms are pieces of malware programs that replicate quickly and spread from one computer to another. Transmission of worms is also often done by exploiting software vulnerabilities. Follow us on Twitter to receive updates! Follow SecurityTrails 6. You keep refreshing the page, waiting for that moment when the product will go live.
But more commonly, this is what happens to a website during a DoS attack, or denial-of-service, a malicious traffic overload that occurs when attackers overflood a website with traffic. A DoS attack is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. These computers can be distributed around the entire globe, and that network of compromised computers is called botnet.
Since the attack comes from so many different IP addresses simultaneously, a DDoS attack is much more difficult for the victim to locate and defend against. Phishing Phishing is a method of a social engineering with the goal of obtaining sensitive data such as passwords, usernames, credit card numbers. The attacks often come in the form of instant messages or phishing emails designed to appear legitimate.
It can also obtain personal information by sending an email that appears to be sent from a bank, asking to verify your identity by giving away your private information. Uncovering phishing domains can be done easily with SecurityTrails. Rootkit Rootkit is a collection of software tools that enables remote control and administration-level access over a computer or computer networks.
Once remote access is obtained, the rootkit can perform a number of malicious actions; they come equipped with keyloggers, password stealers and antivirus disablers.
Rootkits are installed by hiding in legitimate software: when you give permission to that software to make changes to your OS, the rootkit installs itself in your computer and waits for the hacker to activate it. Other ways of rootkit distribution include phishing emails, malicious links, files, and downloading software from suspicious websites.
Since this requires just one detail authenticating the user name—i. With two-factor authentication , something the user 'has' is also used e. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.
Anti-virus software or an intrusion prevention system IPS  help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis.
Newer systems combining unsupervised machine learning with full network traffic analysis can detect active network attackers from malicious insiders or targeted external attackers that have compromised a user machine or account.
Honeypots , essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes.
Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers.
A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server.
Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker's methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots. Security management for networks is different for all kinds of situations.
A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. Networks are subject to attacks from malicious sources. Attacks can be from two categories: Types of attacks include: From Wikipedia, the free encyclopedia.