Topic 9 Security
Topic 9 Security
SECURITY
BY the end of the chapter ,the trainee should be
able to:
Describe network security
Explain importance of network security
Explain security techniques
Explain how to deal with security threats and
other network vulnerabilities
Network security
Network security consists of the
policies adopted to prevent and
monitor authorized access,
misuse, modification, or denial of a
computer network and network-
accessible resources.
Network security involves the
authorization of access to data in a
network, which is controlled by the
network administrator
Importance Of Network Security
For Business Organization:
1. To Protect Company’s Assets- This can
be considered as the primary goal of
securing the computers and computer
networks.
2. To Comply with Regulatory Requirements
and Ethical Responsibilities- It is the
responsibility of every organization to develop
procedures and policies addressing the
security requirements of every organization
3. For Competitive Advantage- Developing
an effective security system for networks
will give the organization a competitive edge
Infrastructure security -is the practice of
protecting critical systems and assets against
-physical and cyber threats
1. MAC Address
2. Authentication
3. Firewall
4. Physical Security
5. Encryption
1. Encryption
Wi-Fi Protected Access (WPA)
WPA encrypts information, and checks to
make sure that the network security key
has not beenmodified.
WPA also authenticates users to help ensure
that only authorized people can access the
network.
Circumstances when encryption is
used in network as a security method
1.when to protect private information, sensitive
data
2. when to enhance the security of
communication between client apps and
servers.
3.When you want to convert human readable
text(plain text)
To cyper text
There are two types of WPA authentication:
WPA and WPA2.
WPA is designed to work with all wireless
network adapters, but it might not work
with older routers or access points.
WPA2 is more secure than WPA, but it
will not work with some older network
adapters.
WPA is designed to be used with an 802.1X
authentication server, which distributes
different keys to each user. This is referred to
as WPA-Enterprise or WPA2-Enterprise.It can
also be used in a pre-shared key (PSK) mode,
where every user is given the same
password. This is referred to as WPA-
What is cryptography?
Cryptography is a method of protecting
information and communications through the
use of codes, so that only those for whom the
information is intended can read and process
it.
There are three types of cryptography:
1. Symmetric key cryptography.
2. Asymmetric key cryptography.
3. Hash Function.
cryptography
Symmetric Key Cryptography
Symmetric key cryptography is also known as
secret-key cryptography, and in this type of
cryptography, you can use only a single key.
The sender and the receiver can use that
single key to encrypt and decrypt a message.
Because there is only one key for encryption
and decryption, the symmetric key system
has one major disadvantage: the two parties
must exchange the key in a secure manner
Asymmetric Key Cryptography
Asymmetric key cryptography is also known
as public-key cryptography, and it employs
the use of two keys. This cryptography
differs from and is more secure than
symmetric key cryptography. In this
system, each user encrypts and decrypts
using two keys or a pair of keys (private
key and public key). Each user keeps the
private key secret and the public key is
distributed across the network so that
anyone can use those public keys to send a
message to any other user. You can use any
of those keys to encrypt the message and
can use the remaining key for decryption.
Applications of Cryptography
Confidentiality: Cryptography allows users to
store encrypted data, avoiding the major flaw
of hacker circumvention.
Non-repudiation: The creator/sender of
information cannot later deny his intent to send
information.
Authentication: Helps to authenticate the
sender and receiver’s identities along with the
destination and origin of the information.
Integrity: Information cannot be altered during
storage or in transit between the sender and
the intended receiver without any addition to
the information being detected
2. MAC Address
A Media Access Control address is a
unique identifier assigned to network
interfaces for communications on the
physical network segment. Can be
described as Ethernet hardware
address (EHA), hardware address or
physical address. It is assigned by the
manufacturer of a network interface
card (NIC) and are stored in its
hardware, the card's read-only memory,
or some other firmware mechanism
The advantage to MAC filtering is that there is
no attachment cost to devices that connect to
the network. The policy is set on a router or
switch, and the equipment attached either is
permitted or it is not. The person attaching
the equipment has nothing to do.
The advantage of a firewall is that the user can monitor incoming and
outgoing security alerts and the firewall company will record and
track down an intrusion attempt depending on the severity. Some
firewalls can detect viruses, worms, Trojan horses, or data collectors.