Computer Networks and Data Security
Computer Networks and Data Security
4. Network Topologies:
Network topology refers to how computers, devices, and other elements are
arranged in a communication network. This layout can be physical (how devices
and cables are connected) or logical (how data flows within the network).
2. Network Authentication:
Network authentication ensures that users accessing a system or network are
legitimate and authorized. This is achieved by verifying the user’s identity
through a process called authentication, which assigns unique credentials to
each user or device on the network.
2.1 Methods of Authentication:
● Username and Password
● IP Address Authentication
● Biometric Authentication
3. Types of Network Attacks:
Network attacks threaten the security and integrity of data shared across
interconnected systems. They are broadly classified into passive attacks, where
the attacker only observes, and active attacks, where data is manipulated with
the intent to corrupt or disrupt the network.
Prevention
Attack Type Description Impact/Objective
Measures
Intercepting data Exposes sensitive Use encryption
Eavesdroppin traveling through the information through (e.g., SSL/TLS) to
g network without altering "sniffing" or secure
it. "snooping." communications.
Implement
Unauthorized changes to Alters or falsifies
Data integrity checks
data packets during data, compromising
Modification and cryptographic
transmission. integrity and trust.
hashing.
Allows
Identity Using a false IP address unauthorized Use firewalls and
Spoofing (IP to impersonate a access, data IP filtering to
Spoofing) legitimate user or device. manipulation, and detect spoofing.
rerouting.
Steals data, Enforce strong
Exploiting weak
changes password policies
Password-Ba passwords or stolen
configurations, or and multi-factor
sed Attacks credentials for
executes malicious authentication
unauthorized access.
actions. (MFA).
Causes slowdowns, Use traffic
Overloading a network
Denial-of-Ser crashes, or monitoring tools
or system with excessive
vice (DoS) prevents legitimate and rate-limiting
traffic.
access. policies.
Intercepting Steals or alters Use end-to-end
Man-in-the-M communication between transmitted data, encryption and
iddle Attack two parties without their posing as a session token
knowledge. legitimate user. validation.
Use key
Gaining unauthorized Decrypts sensitive management
Compromised
access to a cryptographic data or generates protocols and
-Key Attack
key. new malicious keys. regular key
rotations.
Reveals
Deploy encryption
Captures and analyzes confidential
protocols (e.g.,
Sniffer Attack unencrypted network information such as
WPA2, TLS) for
traffic. passwords and
all traffic.
messages.
Installs malware or
Exploits vulnerabilities in Regular patching
Application-L disables security
software or operating and vulnerability
ayer Attack controls to enable
systems. management.
future attacks.
4. Virus:
A computer virus is a malicious program designed to replicate itself by infecting
other files and systems. Similar to biological viruses, it enter a system without
the user’s awareness and spread across networks, often lying dormant until
triggered. It targets system files, programs, and even data storage areas like the
Master Boot Record (MBR) or RAM. Viruses are categorized as:
● Boot Sector Viruses: Infect the boot sector of a drive.
● Program File Infectors: Target executable files (.exe, .dll, .sys).
● Polymorphic Viruses: Modify their code to avoid detection.
● Macro Viruses: Infect data files like Microsoft Word documents (.doc) and
Excel spreadsheets (.xls).
Modern viruses are often hard to detect, hiding in memory or disguising
themselves as legitimate files, known as stealth viruses. An example is the
Jerusalem Virus, which activates on certain dates, causing system damage.
6. Cryptography:
Cryptography is the art and science of securing information and communication
by transforming data into a coded format, ensuring that only authorized
recipients can understand or process it. This process helps protect sensitive
information from unauthorized access or misuse. The term comes from the
Greek roots: "crypt," meaning hidden, and "graphy," meaning writing.
At its core, cryptography employs mathematical concepts and algorithm-based
calculations to encode data, making it unreadable to anyone who doesn’t
possess the correct decryption key. These algorithms are critical for generating
cryptographic keys, creating digital signatures, and performing verification
tasks.
7. Anti - Virus:
Anti-virus software is a program designed to detect, prevent, and remove
malicious software (malware) such as viruses, worms, and Trojans from
computer systems. It serves as the first line of defense against threats that can
compromise system security and data integrity.
Antivirus Year of Developer /
Software Development Company
Reaper 1972 Bob Thomas
McAfee
1987 John McAfee
Antivirus
Norton Antivirus 1991 Symantec
Kaspersky
1997 Eugene Kaspersky
Antivirus
AVG Technologies
AVG Antivirus 1992
(later Avast)
Avast Antivirus 1988 Avast Software
Panda Security 1990 Panda Software
Bitdefender 2001 Bitdefender
ESET NOD32 1987 ESET
Sophos
1985 Sophos Group
Antivirus
8. Anti-Spyware Software:
Anti-spyware software is a specialized cybersecurity tool designed to detect,
block, and eliminate spyware—a type of malicious software that secretly
collects information about individuals or organizations without their consent.
Spyware infiltrates devices to monitor user behavior, steal sensitive information,
or track activities, posing serious risks to privacy and data security.
8.1 Types of Anti-Spyware Software:
Selecting the right anti-spyware software depends on individual needs,
business requirements, and the overall cybersecurity framework. Below are the
key types of anti-spyware programs available, each offering unique benefits
and potential limitations:
Free Anti-Spyware:
Free options can be effective for individual users or small businesses with
limited budgets. However, they usually come with fewer features, and updates
may be less frequent, leaving gaps in protection against newer threats.
Paid Anti-Spyware:
Paid solutions offer more robust protection, including advanced features such
as behavioral analysis to detect fileless malware and regular updates. They
typically also provide better customer support.