Network security and Security Threats

Network security

The Network is a connection of independent computer which is used to communicate with one another over a divided network. It is generally a collection of computer,software and hardware which are connected through one another to share information and resources together. A network is connected to one another through a transmission medium which is in the form of cable or wireless, specialized software and the other devices which are used to manage traffic . Network share information locally or remotely. Therefore, it is possible that an unwanted user can hack the network and make a misuse the file and folder and their security which is very harmful to the network and for the user.

The Network are designed in such a way that you can share large amount of information, so that the network must be clearly arrange in such a way that we can easily identify a sharable information as-well-as non-shareable information.It should also clear that with whom you are sharing an information.The price of management is increasing day by day, according to the increase insecurity system; therefore level of security and the price should fix as per the requirement of the network system security policy. The network security makes a clear root between users and system administrator.The network security policy organization reveals the valuable data and their associated cost to the business, the security policy is completely tested company environment, that includes the existing network infrastructure.

Levels of Security

  1. User identification and authentication
  2. The efficiency to monitor and audit system activity
  3. Arrangement of discretionary access  
  4. Authority to reuse of resources
  5. Establish a specific area of possible attack
  6. Arrangement of suitable countermeasure
  7. The security level system includes a system architecture, design, implementation, transport and trust of other hosts.

Security Threats

The list of security threats in the network are:

  1. Viruses and Worms:-The virus is indicate the word malware entering the vicious code in the present document or program, it spread itself in may ways. Many of the viruses are spread through the Email ,attachments, File transfer or by clicking some links. Althrough the viruses are treated as a standard type of network security threat. A user action may prevent from the spread of virus because virus totally depends upon a user action to insert itself in the computer that's why it is always recommended that never open a attachments of spam links.Therefore, some of the measures have been taken to stop the worm from infecting the network as the host file was not need to worm from infecting a network as they propagate themselves. Worm infects the whole computer and make a copy and spread in whole network within a few hours. A new version of anti virus software should be use to save the computer and to avoid the attacks from viruses and worms.
  2. Spam:-Spam use a technique "news service" spam. Daily 60 to 70 percent of email sent to increase the demand of IT resources and to filter out these spam, which is irritating the user and most probably it become vicious and become trouble for the user. The spam attack exhausts so much of the bandwidth  on a network which causes a crash. Spam uses appropriate news headlines so that the user click the conspiracy beneficiary's email and open it .Email filter itself in two parties that is good email and spam it keep both of them separate from each other. Many of the spammers are increasing day by day with a common name to  affect the emails to spam .To avoid spam the email provides the naming system so it not become easier to reuse the email .

  3. Trojan Horses:- The malware work as a  silent killer for the computer as it enters into the computer and hide himself in downloadable free software on a website, computer game, or a search result page. The trojan horse once installed  on a computer, it installs the keylogger which infects the computer, and that infected computer record every keystroke  by the user and break all the details of the users. So the user rejects themselves from downloading freeware.Many of the site and the organization block free download software facilities for the user to keep safe themselves from the attack of  the  Trojan horses.Sometime user used to reformat the computer when it is infected by the Trojan horse, therefore it is always suggested that preventive steps should be taken that cure the infected computer system.

  4. Zombie computer and Botnets:- Zombie computer infects the computer attached to a network .It is a computer  that acts as an appropriate tool  of a spammer that send the thousands email from the various email addresses.Thus the uninvolved user sends the spam message to the thousand of the user without the knowledge of it, in this way the spammer or create  zombie computers into a small group which is called ''botnets". These 'botnets' transfer the spam include the phishing attempts, viruses and worms.The spam and phishing attacks and spam normally sends by the botnets.

  5. Phishing:-The phishing is a kind of spam. It is a fraud beneficiary's email which the user on click to the link to insecure website and provide all the details by considering the website  which look like the official one. Phishing attacks on the website and take all the information for e-commerce sites such as bank , regular financial institutions  and other websites. Phishing email  make a trap for the user so the user click on the link and go to that page where all the user is asked to enter all the account details and password.These websites are spam, and it is not an actual site, but it look at the actual one.The emails which come with titleUpdate Account Status all are spammer to "phish" the account details. Many of the financial institutions educate their employees how to away from hackers .

  6. Packet sniffers:- Packet sniffers works as by monitoring and record the details that are coming and going to a computer over a compromised network .To access to a network packet sniffer use honeypots .It uses a technique  to grab data steams over a network to get the information about  the important data such as usernames, passwords, and other financial information etc.Thus the packet sniffers vicious and risk for the network security.The packet sniffers unbound the wifi access point so that the hackers create a trap for the user. So to aware from the packet sniffers the prevention policy should be taken .The user should always remember not to access the internet through an unsecured connection. The user should use a variety of sign name or password to access the  various levels of the network security this will help the user for the less damage and  save the data when instance login information is compromised.

  7. Maliciously-Coded web sites:- Maliciously coded  website, create chartable website so that the user makes a donation by filling their account details password and other important information and thus they  steal all the important details and information. It is also used to enter networks forinstalling the keylogger.

  8. Password Attacks:- A''Password Attack" uses many techniques to steal the password and hack all the information some of these techniques are:

  • Brute-Force:- It is a method in which hacker guess the password and try again and again by the certain number phrases or word combination from the dictionary to steal the password and hack the information. User can secure the password and the username by using difficult password or guess user.

  • Packet sniffers:- The phishing is a kind of spam. It is a fraud beneficiary's email which the user on click to the link to insecure website and provide all the details by considering the website  which look like the official one. Phishing attacks on the website and take all the information for e-commerce sites such as bank , regular financial institutions  and other websites. Phishing email  make a trap for the user so the user click on the link and go to that page where all the user is asked to enter all the account details and password.These websites are spam, and it is not an actual site, but it look at the actual one.The emails which come with titleUpdate Account Status all are spammer to "phish" the account details. Many of the financial institutions educate their employees how to away from hackers .

  • IP-Spoofing:-Just like the spoofing the IP-Spoofing contain the interception of data packets which is provided by the computer successfully which acts as a pretending to a establish server.

 

Keywords: