18-12-2012, 06:04 PM
network security issues and concept of firewall
network security issues.pdf (Size: 123.41 KB / Downloads: 23)
INTRODUCTION
Access to internet is a great source of information and fast transaction, which is necessary for the steep competition faced in modern industrial era. With the advancement of Internet and Internet related services, the network security becomes more and more significant as people spend more and more time stay connected. This leads to:
1. Increasing online transactions.
2. Personal and sensitive information is shared over the network.
Therefore ‘Network Security’ can be defined as: “Protection of network and related resources from misuse or unauthorized use” and also providing its monitoring and measure of its effectiveness. Or we can say that a network is secure if its resources are used and accessed intentionally under any circumstances. Here we have to protect misuse of:
a. Our data. (Information we keep on computers like product design, financial records, personnel data)
b. Our resources. (Unauthorized use of computer time & space)
c. Our reputation. (Misrepresentation, forgery, negative publicity)
The misuse of network can be categorised as intentional and accidental. The accidental misuse is much easier to handle or if we able to deal with intentional misuse of the network accidental misuse is automatically eliminated. Although it is not possible to fully eliminate the intentional misuse of network and its resources.
NETWORK SECURITY ISSUES
To implement network security successfully, the following important network security issues are keep in view.
1. Authentication: Authentication is the process of verifying identity of user. Authentication deals with determining whom we are talking to before revealing sensitive information or entering into a business deal.
2. Integrity: Integrity means the data must arrived at the receiver exactly as sent. There must no changes during transmission either intentional (malicious) or accidental.
3. Privacy: Privacy or confidentiality, the transmitted massage must make sense only to intended user. The sensitive information must not be visible to eavesdroppers.
4. Non-repudiation: Non-repudiation means the receiver is able to prove that the received message is came from a specific sender. Assurance that any transaction that takes place can subsequently be proved to have taken place.
5. Authorization: It deals with assigning access rights to users.
Intrusion detection system (IDS):
Intrusion detection is process of monitoring events occurring on computer system or network. Signs of violation of computer security policies, acceptable use policies, or standard security practices are analyzed. Intrusion prevention is process of detecting signs of intrusion and attempt to stop the intrusion. Collectively it is known as intrusion detection and prevention system (IDPS. Types of intruders: Masquerades: they are typically outsiders from the trusted users and are not authorized to use the computer systems. These intruders are penetrating the system protection using legitimate user accounts. Misfeasors: these are insiders and legitimate users who access recourses that are not authorized to use or they may be authorized but they misuse privileges.