Group 1
Group 1
Group 1
Network Security
• What is the difference among Computer, Network and Internet Security?
• What are Security Attacks,
o What are the Services and Mechanisms?
▪ What is the tree different mechanisms?
o One approach is to consider three aspects of information security
• Enumerate and elaborate the four general categories of attack
• What are the classifications of security services?
• What is Enterprise Security?
• Discuss the Enterprise Security within an Enterprise Architecture Context
Objectives :
At the end of this lesson, students are expected to;
1.Role of Network Security
2.Identify the differences among Computer, Network and Internet Security.
3.Types of Security Attacks.
4.Four General categories of attack
Discussions
Define what is Computer Security?
According to https://www.edureka.co/blog/what-is-
computer-security/ computer security basically is the protection of computer
systems and information from harm, theft, and unauthorized use. It is the process
of preventing and detecting unauthorized use of your computer system.
Security Attacks
Define what is Security Attacks
According to https://www.igi-global.com/dictionary/big-
data-security-management/43257 any form of malicious or actions taken to harm
the security of information system components. An action is classified as
malicious with respect to the enterprise security policy.
Most common types of security attacks
These threats can be tricky because they’re not attributed to human error.
You could visit a seemingly legitimate site, unaware it’s been compromised.
Therefore, the best action you can take to prevent drive-by download attacks
is to keep your security systems updated and remove any unnecessary
software.
Based on https://www.edureka.co/blog/what-is-computer-security/
Confidentiality is ensuring that information is available only to the intended
audience,Integrity is protecting information from being modified by unauthorized
parties,Availability is protecting information from being modified by unauthorized
parties
1. Malware
2. Drive-by Downloads
3. Phishing
4. Brute-force attacks
5. Sql Injections
6. Main-In-The-Middle
7. Denial of Service (Dos) attacks
8. Cross-Site Scripting (Xss)
References
https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
https://www.edureka.co/blog/what-is-computer-security/
https://www.geeksforgeeks.org/difference-between-network-security-and-cyber-
security/
https://www.igi-global.com/dictionary/big-data-security-management/43257
https://managewp.com/blog/security-attacks
https://www.eecis.udel.edu
http://etutorials.org/Networking/802.11+security.+wi-
fi+protected+access+and+802.11i/Part+I+What+Everyone+Should+Know/Chapter
+4.+Different+Types+of+Attack/Classification+of+Attacks/
https://www.linkedin.com/pulse/enterprise-security-architecture-context-peter-
watson