Network Security

This section explores the network security fundamentals, explaining types of cyber-attacks, threats to network integrity, and methods to identify and mitigate vulnerabilities. Proper use of secure passwords, encryption, anti-malware software, and firewalls are essential in defending against these threats.

Forms of Attack

Definition: Cyber-attacks are attempts to exploit vulnerabilities in a network or computer system. These attacks aim to disrupt services, steal data, or cause damage.

Common Attack Types

Phishing: Deceptive emails or messages trick users into revealing personal information or downloading malware.

Denial of Service (DoS): Floods a network or server with traffic to make it unavailable to legitimate users.

Brute Force: Repeatedly attempts all possible passwords to gain unauthorised access to accounts.

SQL Injection: Malicious code is inserted into a database query to manipulate data and access sensitive information.

Threats to Networks

Malware (Malicious Software)

Definition: Software designed to harm, exploit, or otherwise compromise a network or computer.

Types of Malware

Viruses: Attach to files or programs and spread when these are shared.

Worms: Self-replicating programs that spread independently across networks.

Trojan Horses: Appear legitimate but contain harmful code, often used to create backdoors.

Spyware: Monitors user activity and steals personal data without the user’s knowledge.

Ransomware: Encrypts files and demands a ransom for decryption keys.

Other Threats

Social Engineering: Manipulates people into divulging confidential information or performing actions that compromise security.

Insider Threats: Employees or authorised users with access to sensitive data may misuse it intentionally or accidentally.

Botnets: Networks of compromised computers controlled remotely to launch attacks (e.g., spam distribution or DDoS).

Identifying and Preventing Vulnerabilities

Penetration Testing

Definition: Simulated cyber-attacks to identify and fix vulnerabilities within a network before they can be exploited.

Purpose: Helps organisations understand potential weaknesses and strengthen their security.

Network Forensics

Definition: Investigating network activity to detect, analyse, and understand security incidents.

Use: Logs and traces network traffic to identify how an attack occurred and who was involved.

Network Policies

Definition: Formal guidelines that dictate how network resources and data are used and protected.

Includes: Rules for acceptable use, remote access policies, and guidelines for responding to security breaches.

User Access Levels

Definition: Controls to restrict access to sensitive information based on a user’s role or level of authority.

Purpose: Limits exposure to sensitive data, reducing the risk of unauthorised access and accidental modification.

Passwords, Encryption, Anti-malware, and Firewalls

Secure Passwords

Characteristics: Strong passwords are usually at least 8–12 characters long, with a mix of letters, numbers, and symbols.

Importance: A secure password is essential for protecting user accounts against brute force attacks.

Encryption

Definition: Converts data into a coded format, making it unreadable without a decryption key.

Use: Ensures data confidentiality, especially during transmission over insecure networks (e.g., internet communications).

Example: Websites with HTTPS use encryption to protect users’ data from interception.

Anti-Malware

Definition: Software designed to detect, block, and remove malicious software (malware).

Function: Scans files and monitors network traffic for malicious activity, quarantining or removing detected malware.

Firewalls

Definition: A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Types

Hardware Firewalls: Installed as a physical device, usually at the network’s entry point, to protect all devices on the network.

Software Firewalls: Installed on individual devices to provide additional security.

Function: Blocks unauthorised access to a network while allowing legitimate communications.

Category
sign up to revision world banner
Southampton University
Slot