Report On Network Security
Report On Network Security
Report On Network Security
SUBMITTED TO:
Mam Nudrat Nida
SE (2C)
Abstract ___
Development
of
computer network is growing very
fast, for sharing and receiving
informations from all
over the
world. Also it is rapidly growing
area of interest due to extension
in
networks development
and
weakness measures in that field .
Software system are increasingly
assembled
from components that
are buy from or purchase
from
third parties
for technical and
economic gains. Therefore lot of
security issues appeared. This paper
also include the features of security
network , major security threats and
issues faced by computer networks .
Also explanations
of popular
security technology of Wi-Fi network
is discussed here.
Keywords: Network security, Wi-Fi,
Internet Vulnerabilities, ipV6 security
protocol,
issues
Countermeasures,
Encryption and Authentication.
I.
INTRODUCTION:
II.
COMPUTER
SECURITY:
NETWORK
III.
SECURITY THREATS:
IV.
PRECAUTION
ON
NETWORK SECURITY:
V.
ISSUES
FACED
NETWORK :
BY
Hacking
Computer destroying viruses.
Attacks in internal environment.
Solution
network:
of
issues
campus
Virus
Today
preventative
softwares:
The
weakness
of
the
WEP
encryption mechanism: WEP is a
security protocol that encrypt transmitted
data for wireless network. WEP is easy to
crack keys by someone else. Key
management is complex, use WEP keys
need
to
accept
an
external
key
management system of control.
Search
wireless
signal
attack:
Solution
of
issues
Network Security:
Wi-Fi
Wireless
signal
spectrum
expansion
technology: To increase frequency for
the secure transmission of data. Spread
spectrum sent a very low power signal
used in a very wide frequency range of
launch, and narrow-band radio-on the
contrary; it put all the energy into a single
frequency.
WEP
is
the
most
basic
wireless
IEEE802.11b protocol security encryption
measures, its main purposes include
providing access control and prevent
unauthorized users from accessing the
network.
VI. NETWORK
SECURITY
SERVICE CLASSIFICATION:
Availability of services:
Information or services to ensure that
when needed can be a normal visit.
Confidential service:
To ensure that sensitive data or
information will not be leaked or exposed
to unauthorized entities.
Integrity services:
To ensure that data is not the way to
unauthorized alteration or destruction.
Identification:
The identity of an entity to provide the
guarantee the legitimacy of.
Authorized:
VII.
IMPLEMENTATION
SECURITY:
OF
VIII.
NETWORK
MONITOR:
SECURITY
PHASES OF ATTACKER:
Attacker basically attack
system in three phases.
Analysis phase.
Attack phase.
Post attack phase.
on
your
ANALYSIS PHASE:
In this phase .attacker try to know that
how well he can
penetrate in your
IX.
ATTACK PHASE:
POST_ATTACK PHASE:
In this phase, the effects will remains or
signs are left after attack .your system
may slow down in his working .this is due
to reason that attacker may use your
system memory.
COMPAR
ISION
LAN
WAN
Stands
for
Covers
Local Area
Network
Local area
only just like
in home etc.
It has a faster
speed
I-e. (1000
mbps)
It is a
computer
network and
covers small
area
high
Speed
Definiti
on
Data
transfe
r rate
Exampl
e
SECURI
TY
How we
provide
securit
y?
Network
within a
building
It is more
secure
because it all
the resources
are under
control.
Verify
that your
network
is
segmente
d
Make sure
that there
is a
guests
network
so that
vendors
(Seller)
can be
attached
to it if
needed.
Setting
some
type of
switch
security
that may
disable a
port.
low
internet
It is less secure because all the resources are not under the
control due to large geographical area.
X.
XI.
CONCLUSION:
REFERENCES:
Information
Technology
and
Management Engineering.
Gong, Yishan, Guanghong Yue, and
Quansheng Xu. "Network Security
and Safety Precautions." Future
Networks, 2010. ICFN'10. Second
International Conference on. IEEE,
2010.
Purboyo, Tito Waluyo. "Methods for
strengthening a Computer network
security." Rural
Information
&
Communication Technology and
Electric-Vehicle
Technology
(rICT&ICeV-T),
2013
Joint
International Conference on. IEEE,
2013.
Peng, Haishen. "WIFI network
Information
security
analysis
research." 2012 2nd International
Conference
on
Consumer
Electronics, Communications and
Networks, CECNet, April. 2012.
Heberlein, L. Todd, et al. "A network
security
monitor." Research
in
Security
and
Privacy,
1990.
Proceedings., 1990 IEEE Computer
Society Symposium on. IEEE, 1990.
Li,Fuguo. "Study on security and
prevention strategies of computer
network." Computer Science and
Information Processing (CSIP), 2012
International Conference on. IEEE,
2012.
Yan, Fan, Yang Jian-Wen, and Cheng
Lin. "Computer Network Security
and
Technology
Research." Measuring
Technology
and
Mechatronics
Automation
(ICMTMA),
2015
Seventh
International Conference on. IEEE,
2015.