Cyber Security Unit 5
Cyber Security Unit 5
Computer Intrusion
Computer intrusion refers to any unauthorized access or breach into a
computer system, network or device
The intruder can steal sensitive data, plant malware, spy on activity or shut
down operations
Common Types
Sweeper Attack
Cyber criminals erase all the information or data like cache, cookies, internet
history or documents from the system by a malicious program
Password Guessing
Most hackers crack password of the system accounts by guessing and
gaining remote entry into our personal computer system. Repeatedly
guessing passwords until access is gained.
Snooping
it refers to opening and looking into someone’s computer or data without their
permission
It can be:
Tracking what keys they press (to steal passwords or personal info)
Eavesdropping
Eavesdropping is when someone secretly listens to or intercepts data as it
moves over a network.
For example:
They might listen to private conversations or steal data while it's traveling
online
Firewall
A firewall is a network security device either hardware or software based
which monitors all incoming and outgoing traffic and based on a defined set of
It acts like a security guard that helps keep your digital world safe from
unwanted visitors and potential threats
A firewall is essentially the wall that separates a private internal network from
the open internet at it very basic level
Characteristics
Traffic Filtering: A firewall monitors ad filters incoming and outgoing network
traffic based on predefined security rules. It decides which data packets to
allow or block
Types of Firewall
1. packet Filtering Firewall
Packet filtering firewall is used to control network access by monitoring
outgoing and incoming packets and allowing them to pass or stop based om
source and destination IP address, protocols, and ports
Only It can allow or deny the packets based on unique packet headers.
Packet filtering firewall maintains a filtering table that decides whether the
packet will be forwarded or discarded.
From the given filtering table, the packets will be filtered according to the
following rules:
Incoming packets destined for the internal TELNET server (port 23) are
blocked.
It keeps track of the state of networks connection travelling across it, such as
TCP streams.
So the filtering decisions would not only be based on defined rules, but also
on packet’s history in the state table.
has the ability to block specific content, also recognize when certain
application and protocols (like HTTP, FTP) are being misused.
A proxy firewall prevents the direct connection between either side of the
firewall, each packet has to pass through the proxy.
5. Cloud Firewall
These are software-based, cloud-deployed network devices.
Advantages
Protection From Unauthorized Access: Firewalls can be set up to restrict
incoming traffic from particular IP addresses or networks, preventing hackers
or other malicious actors from easily accessing a network or system.
Regulation Compliance: Many industries are bound by rules that demand the
usage of firewalls or other security measures.
Disadvantages
Complexity: Setting up and keeping up a firewall can be time-consuming and
difficult, especially for bigger networks or companies with a wide variety of
users and devices.
Limited Visibility: Firewalls may not be able to identify or stop security risks
that operate at other levels, such as the application or endpoint level, because
they can only observe and manage traffic at the network level.
Limited Scalability: Because firewalls are only able to secure one network,
businesses that have several networks must deploy many firewalls, which can
be expensive.
Cost: Purchasing many devices or add-on features for a firewall system can
be expensive, especially for businesses.
This model is particularly useful for hosting public facing services (like web
servers or email servers) while still safeguarding the internal network from
external network
Working
The architecture begins with internal network, which includes various trusted
devices such as desktop, laptops, machines and phone. These devices
communicate with the rest of the world through firewall
This internal firewall serves as the first line of defense, monitoring all traffic
that attempts to leave or enter the LAN
Sitting between the internal and external firewall is the screened subnet or
DMZ . This is the semi trusted zone that hosts public services such as web
servers, FTP servers and mail servers
When someone from the internet tries to access your website, the request first
goes through the outer firewall, which only allows safe traffic into the DMZ.
The web server in the DMZ handles the request, but cannot directly access
your internal network
The inner firewall separates the internal network from the DMZ and blocks
unknown traffic from entering. This setup ensures that even if a hacker gets
into the DMZ, they can’t reach your main private network
It analyzes the data flowing through the network to look for patterns and signs
of abnormal behavior.
The IDS compares the network activity to a set of predefined rules and
patterns to identify any activity that might indicate an attack or intrusion.
If the IDS detects something that matches one of these rules or patterns, it
sends an alert to the system administrator.
The system administrator can then investigate the alert and take action to
prevent any damage or further intrusion.
A HIDS monitors the incoming and outgoing packets from the device only and
will alert the administrator if suspicious or malicious activity is detected.
It takes a snapshot of existing system files and compares it with the previous
snapshot.
If the analytical system files were edited or deleted, an alert is sent to the
administrator to investigate.
Signature-Based Detection:
Signature-based detection checks network packets for known patterns linked
to specific threats.
Regular updates are needed to detect new threats, but unknown attacks
without signatures can bypass this system
Provides Insights: IDS generates valuable insights into network traffic, which
can be used to identify any weaknesses and improve network security.
Disadvantages of IDS
False Alarms: IDS can generate false positives, alerting on harmless activities
and causing unnecessary concern.
Requires Maintenance: Regular updates and tuning are needed to keep the
IDS effective, which can be time-consuming.
Doesn’t Prevent Attacks: IDS detects and alerts but doesn’t stop attacks, so
additional measures are still needed.
Password Management
Password management refers to the practices, tools, and strategies used to
create, store, and protect passwords to ensure secure access to digital
systems and services.
Since passwords are the first line of defense against unauthorized access,
managing them effectively is crucial for maintaining cybersecurity.
Trusted System
A trusted system is a computer system that is designed and implemented to
enforce a specified level of security policy, such as protecting data
confidentiality, integrity, and availability.
3. Audit Trails: Keeps detailed logs of system activities for monitoring and
forensic analysis.
4. Security Policy Enforcement: Enforces rules about who can access what and
under what conditions.