Unit-4 Network Security
Unit-4 Network Security
NETWORK SECURITY
Any action intended to safeguard the integrity and usefulness of your data
and network is known as network security. In other words, Network security
is defined as the activity created to protect the integrity of your network and
data.
Network security uses several layers of protection, both at the edge of the
network and within it. Each layer has rules and controls that determine who
can access network resources. People who are allowed access can use the
network safely, but those who try to harm it with attacks or other threats are
stopped from doing so.
The basic principle of network security is protecting huge stored data and
networks in layers that ensure the bedding of rules and regulations that have
to be acknowledged before performing any activity on the data. These levels
are:
Physical Network Security: This is the most basic level that includes
protecting the data and network through unauthorized personnel from
acquiring control over the confidentiality of the network. The same can
be achieved by using devices like biometric systems.
There are several types of network security through which we can make our
network more secure, Your network and data are shielded from breaches,
invasions, and other dangers by network security. Here below are some
important types of network security:
Email Security
Network Segmentation
Access Control
Your network should not be accessible to every user. You need to identify
every user and every device in order to keep out any attackers. You can then
put your security policies into effect. Noncompliant endpoint devices might
either have their access restricted or blocked. Network access control (NAC)
is this process.
Sandboxing
Web Security
A online security solution will restrict access to harmful websites, stop web-
based risks, and manage staff internet usage. Your web gateway will be
safeguarded both locally and in the cloud. “Web security” also include the
precautions you take to safeguard your personal website.
This type of network security ensures that any malicious software does not
enter the network and jeopardize the security of the data. Malicious software
like Viruses, Trojans, and Worms is handled by the same. This ensures that
not only the entry of the malware is protected but also that the system is
well-equipped to fight once it has entered.
Firewalls Security
Application Security
Wireless Security
Wireless networks are less secure than wired ones. If not properly secured,
setting up a wireless LAN can be like having Ethernet ports available
everywhere, even in places like parking lots. To prevent attacks and keep
your wireless network safe, you need dedicated products designed to protect
it from exploits and unauthorized access.
Web Security
A web security solution manages how your staff uses the internet, blocks
threats from websites, and stops access to harmful sites. It safeguards your
web gateway either onsite or in the cloud. Additionally, “web security”
involves measures taken to protect your own website from potential attacks
and vulnerabilities.
Cybercriminals are focusing more on mobile devices and apps. In the next
three years, about 90 percent of IT organizations might allow corporate
applications on personal mobile devices. It’s crucial to control which devices
can connect to your network and set up their connections securely to protect
network traffic from unauthorized access.
VPN Security
Network Security has several benefits, some of which are mentioned below:
Network Security helps in protecting clients’ information and data
which ensures reliable access and helps in protecting the data from
cyber threats.
Network Security protects the organization from heavy losses that may
have occurred from data loss or any security incident.
Cryptography
Types Of Cryptography
1. Symmetric Key Cryptography
2. Hash Functions
There is no usage of any key in this algorithm. A hash value with a fixed
length is calculated as per the plain text which makes it impossible for the
contents of plain text to be recovered. Many operating systems use hash
functions to encrypt passwords.
Advantages of Cryptography
Firewall
Firewall match the network traffic against the rule set defined in its
table. Once the rule is matched, associate action is applied to the
network traffic. For example, Rules are defined as any employee from
Human Resources department cannot access the data from code
server and at the same time another rule is defined like system
administrator can access the data from both Human Resource and
technical department.
Most traffic which reaches on the firewall is one of these three major
Transport Layer protocols- TCP, UDP or ICMP. All these types have a
source address and destination address. Also, TCP and UDP have port
numbers. ICMP uses type code instead of port number which identifies
purpose of that packet.
Default policy: It is very difficult to explicitly cover every possible rule on
the firewall. For this reason, the firewall must always have a default policy.
Default policy only consists of action (accept, reject or drop). Suppose no rule
is defined about SSH connection to the server on the firewall. So, it will follow
the default policy. If default policy on the firewall is set to accept, then any
computer outside of your office can establish an SSH connection to the
server. Therefore, setting default policy as drop (or reject) is always a good
practice.
Types of Firewall
Application layer firewall can inspect and filter the packets on any OSI layer,
up to the application layer. It has the ability to block specific content, also
recognize when certain application and protocols (like HTTP, FTP) are being
misused. In other words, Application layer firewalls are hosts that run proxy
servers. A proxy firewall prevents the direct connection between either side
of the firewall, each packet has to pass through the proxy.
This works as the Sessions layer of the OSI Model’s . This allows for the
simultaneous setup of two Transmission Control Protocol (TCP) connections. It
can effortlessly allow data packets to flow without using quite a lot of
computing power. These firewalls are ineffective because they do not inspect
data packets; if malware is found in a data packet, they will permit it to pass
provided that TCP connections are established properly.
6. Software Firewall
7. Hardware Firewall
8. Cloud Firewall
This guide will explain what VPN is, how it works, and the different
types of VPNs available to suit your needs in 2025.
What Is a VPN
Securi
VPN Type Description Use Case ty Speed
Large
A secure, efficient,
enterprises with Very Very
MPLS VPN and scalable solution
multiple office High High
for large enterprises.
sites
An older VPN
Legacy
protocol known for Very
PPTP VPN systems, basic Low
speed but lacks High
VPN needs
security.
Tunneling Protocol
environments,
IPsec VPN with IPsec for better te
reliable security
security.
An open-source VPN
Advanced
protocol known for Very Modera
OpenVPN users, custom
its flexibility and High te
setups
strong encryption.
2. Not All VPNs Are Equal: Some VPN services may log your data or
provide subpar protection, so it’s essential to choose a reliable VPN
provider.
5. Cost: While there are free VPNs available, premium VPNs offer more
reliable services and better security, which can be a recurring expense.
It analyzes the data flowing through the network to look for patterns
and signs of abnormal behavior.
The IDS compares the network activity to a set of predefined rules and
patterns to identify any activity that might indicate an attack or
intrusion.
The system administrator can then investigate the alert and take
action to prevent any damage or further intrusion.
Intrusion Detection System (IDS)
Disadvantages of IDS
Doesn’t Prevent Attacks: IDS detects and alerts but doesn’t stop
attacks, so additional measures are still needed.