Importance of Network Security
As reliance on computers and the internet grows, securing these systems becomes increasingly vital.
Security focuses on preventing unauthorized access, usage, or damage to computer and network resources including hardware, software, and personal data.
Security Threats
The term security threat refers to any event that compromises the security of systems or networks, leading to data loss or damage.
Security breaches can involve hacking, which is the act of exploiting vulnerabilities, often categorized as attacks or intrusions.
Malware
Definition: Malicious software designed to harm or exploit systems.
Includes viruses, trojan horses, spyware, and adware.
Viruses
A type of malware that replicates itself and spreads to infect other software or computers.
Can corrupt, steal, or delete data and consume system resources.
Trojan Horse
Malware disguised as legitimate software, which allows hackers to access the system through a hidden backdoor.
Spyware
Software that secretly collects user information without consent, including personal data and internet habits.
Adware
Software that presents unwanted advertisements and can track browsing behavior.
DDoS (Distributed Denial of Service)
Overwhelms a service with traffic from multiple sources to disrupt normal operations, rendering it unavailable.
Sniffing
The act of capturing and analyzing data packets traveling over a network, potentially exposing sensitive data such as passwords.
Spamming
Involves sending unsolicited messages, often via email, that can include harmful links.
Phishing
Attempts to acquire sensitive information by masquerading as a trustworthy entity in electronic communications.
Bandwidth Piracy
Unauthorized access to another user's network, consuming shared bandwidth without permission.
Overview of Strategies
Strategies include antivirus software, encryption, access control, and authentication to maintain data confidentiality, integrity, and availability.
Purpose: Detect and prevent malware attacks.
Examples: McAfee, Norton, Kaspersky.
Can scan for and remove or quarantine infected files.
Protects personal or system information by converting it into a unrecognizable format (scrambling data).
Requires a decryption key to revert to the original format.
Methods include public key encryption.
Determines who can access systems/networks and enforces restrictions.
Implementations include:
Password protection (username and password combinations).
Hardware or software firewalls to filter traffic.
Intrusion detection systems to monitor for suspicious activity.
Higher-level security verifying user identity before granting access.
Methods include:
Token-based Authentication
Involves generating a one-time password to authenticate alongside a username and password.
Biometric Identification
Uses physical traits for verification, categorized into physiological (e.g. fingerprints) and behavioral (e.g. typing patterns).
Digital Certificates
Electronic documents confirming a user's identity, issued by a certificate authority (CA).