Skip to main content

Network Security Threats

Network Security Threats

Introduction:

Security plays a very critical role in safeguarding
networks that are connecting more and more
people every day. Information that is being
exchanged between networked computers
is very vulnerable to attacks. This increases
the security challenges for network security professionals to protect the information and identity of users connected globally. Network security is needed in almost every field and includes small and large organizations, governmental entities, homes, and even
countries at large. 
Over the last few years, it has been observed that there is a massive increase in
hacking and other malicious activities. Moreover, many threats are being created for
the sole purpose of acquiring the personal information of users. Therefore, it is important
to use a security program that can provide complete proactive protection, i.e., it can
safeguard you before you get infected.
In this chapter, we look at the categories of network security threats. We Will
understand the different types of threats that are posed to computer networks in the
current scenario. Further, we will examine the solutions that must be implemented
to counter the effect of these threats. Each of the threats that are discussed is
accompanied by a solution to make the discussion more fruitful.


Network Security Threats:

It can be troublesome to get rid of malware like viruses, Trojans, and worms once
they infect computer systems or networks. Therefore, it is always best to prevent,
them from infecting your computer in the first place: Network security aims t
protect information exchanged over a network or the Internet. It deals with aspects,
such as the prevention and detection of unauthorized access, termination of misuse,
Denial of service (Dos) and upholding the confidentiality and integrity of data. A
secure network protects not just your desktops and laptops but also the handheld
and wireless devices (such as smartphones and tablets) that connect to your home
network.
To create a secure network environment where your computers and devices
can be free from attacks, the following measures should be given due consideration.

  • Back up the data regularly
  • Store the data on a reliable medium
  • Update the software patches
  • Install SSL certificates to stay ahead of threats
  • Upgrade Firewalls with ACLs (Access Control Lists), Demilitarised Zone (DMZ) Proxy and routers

Network security threats are of two types:

Passive threats: Passive threats or attacks involve attempts by an intruder to
monitor communication, or to steal sensitive information that two devices
transmit over a network. During a passive attack, the attacker does not affect 
communication. Email, file transfers, and client/server exchanges are some examples
of transmissions that can be monitored by passive attackers. Passive threats are
sometimes referred to as eavesdropping attacks or sniffing and snooping attacks.

Active threats: Active threats involve modification of transmitted data and attempts
to gain unauthorized access to networked computers. In an active attack, the
attacker alters the information stored on a computer, prevents users from accessing
the network or web resources and pretends to be a legitimate user to gain access to
the network.

Comments

  1. This info was literally helpful. I hope u come again with new and helpfup information

    ReplyDelete

Post a Comment

Popular posts from this blog

Exploring Electronic Mail

Introduction   Email is the most commonly used mode of communication today. Information is communicated over email in different forms such as text, images, audio, and video. It is the main resource for business communication. As it has become an undetachable medium of communication, it attracts criminals or persons having malicious intent. Cybercriminals use email for sending spam, threats, phishing emails, propagating malicious software like viruses and worms, distributing illegitimate material like child pornography, and hoaxes, and using it for other criminal activities. Therefore, it is necessary to secure our email system and to identify criminals, collect evidence against them and bring them to justice in a court of law. Emails suffer from multiple threats and there are several tools available in the market for fighting such threats. To secure emails, we need a multi-pronged approach. Multiple safety measures need to be implemented to have a safe online experience. In this chapte

What is Cybersecurity....?

what is Cybersecurity..?   In simple term, cybersecurity is the protection of your cyber (or digital) assets or information system from attacks or unauthorised access that are aimed for exploitation. In other word, it means keeping everything  you to do online safe, so no one steals your financial and personal to use for their own gain. The panama Papers, yahoo hack and Ashley Madison data breaches are to name a few of the recent high profile cyber attacks which have caused a great deal of damage to organization and common people  The term 'cybersecurity' was coined in 1988 as a result of one of the first ever registered online virus: The Morris worm.  The worm caused many computers connected to the Internet at the time to slow down to the point that they wear unusable. more recently, cybersecurity has come to signify a form of protection      from attacks designed to paralyse websites, financial network and other computer systems; by flooding them with data from outside compu