SCT Unit I
SCT Unit I
Network security is vital to maintaining the integrity of your data and the privacy of your
organization and employees. It encompasses everything from the most basic practices,
such creating strong passwords and fully logging out of community computers, to the
most complex, high-level processes that keep networks, devices and their users safe.
More and more sensitive information is stored online and in these various devices, and if
an unauthorized user gains access to that data, it could lead to disastrous results.
Network security is the key to keeping that sensitive information safe, and as more private
data is stored and shared on vulnerable devices, network security will only grow in
importance and necessity. Experts expect that more than 2,314 exabytes (or over 2 trillion
gigabytes) of data will exist by 2020; managing that amount of data is difficult enough,
and protecting it will be another issue entirely.
While each and every member of your organization can take strides to help keep things
secure, network security has become more complex in recent years. Adequately
protecting networks and their connected devices requires comprehensive network
training, a thorough understanding of how networks actually work and the skills to put that
knowledge into practice. It’s crucial for networks to be thoroughly and properly set up,
secured and monitored to fully preserve privacy.
Virtually all computer networks have vulnerabilities that leave them open to outside
attacks; further, devices and networks are still vulnerable even if no one is actively
threatening or targeting them. A vulnerability is a condition of the network or its hardware,
not the result of external action.
4. Wireless
It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory. LANs are used widely as it is easy to design and to troubleshoot.
Personal computers and workstations are connected to each other through LANs. We
can use different types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network
among each other while it can also be as complex as interconnecting an entire building.
LAN networks are also widely used to share resources like printers, shared hard-drive
etc.
Characteristics of LAN
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the
prominent ones are Ethernet, Token ring.
One of the computer in a network can become a server serving all the remaining
computers called clients. Software can be stored on the server and it can be used
by the remaining clients.
Sharing common resources like printers etc are some common applications of
LAN.
Advantages of LAN
Easy and Cheap Communication: Data and messages can easily be transferred
over networked computers.
Centralized Data: The data of all network users can be saved on hard disk of the
server computer. This will help users to use any workstation in a network to
access their data. Because data is not stored on workstations locally.
Data Security: Since, data is stored on server computer centrally, it will be easy
to manage data at only one place and the data will be more secure too.
Internet Sharing: Local Area Network provides the facility to share a single
internet connection among all the LAN users. In Net Cafes, single internet
connection sharing system keeps the internet expenses cheaper.
Disadvantages of LAN
High Setup Cost: Although the LAN will save cost over time due to shared
computer resources, but the initial setup costs of installing Local Area Networks is
high.
Privacy Violations: The LAN administrator has the rights to check personal data
files of each and every LAN user. Moreover he can check the internet history and
computer use history of the LAN user.
Covers Limited Area: Local Area Network covers a small area like one office, one
building or a group of nearby buildings.
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN
and uses the similar technology as LAN. It is designed to extend over the entire city. It
can be means to connecting a number of LANs into a larger network or it can be a
single cable. It is mainly hold and operated by single private company or a public
company.
Characteristics of MAN
Communication medium used for MAN are optical fibers, cables etc.
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such
as fibre optic cables.
It provides a good back bone for large network and provides greater access to
WANs.
The dual bus used in MAN helps the transmission of data in both directions
simultaneously.
More cable required for a MAN connection from one place to another.
It is also called WAN. WAN can be private or it can be public leased network. It is used
for the network that covers large distance such as cover states of a country. It is not easy
to design and maintain. Communication medium used by WAN are PSTN or Satellite
links. WAN operates on low data rates.
Characteristics of WAN
Communication medium used are satellite, public telephone networks which are
connected by routers.
Advantages of WAN
Covers a large geographical area so long distance business can connect on the
one network.
Messages can be sent very quickly to anyone else on the network. These
messages can have picture, sounds or data included with them(called
attachments).
Everyone on the network can use the same data. This avoids problems where
some users may have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the
network.
Setting up a network can be an expensive, slow and complicated. The bigger the
network the more expensive it is.
Once set up, maintaining a network is a full-time job which requires network
supervisors and technicians to be employed.
Security is a real issue when many different people have the ability to use
information from other computers. Protection against hackers and viruses adds
more complexity and expense.
Wireless Network
Digital wireless communication is not a new idea. Earlier, Morse code was used to
implement wireless networks. Modern digital wireless systems have better performance,
but the basic idea is the same.
1. System interconnection
2. Wireless LANs
3. Wireless WANs
System Interconnection
In simplest form, system interconnection networks use the master-slave concept. The
system unit is normally the master, talking to the mouse, keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio modem and antenna with
which it can communicate with other systems. Wireless LANs are becoming increasingly
common in small offices and homes, where installing Ethernet is considered too much
trouble. There is a standard for wireless LANs called IEEE 802.11, which most systems
implement and which is becoming very widespread.
Wireless WANs
Inter Network
Inter Network or Internet is a combination of two or more networks. Inter network can
be formed by joining two or more individual networks by means of various devices such
as routers, gateways and bridges.
Computer Network Models
Layered Architecture
o The main aim of the layered architecture is to divide the design into small pieces.
o Each lower layer adds its services to the higher layer to provide a full set of services
to manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
o It ensures the independence between layers by providing the services from lower
to higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.
o The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower
to a higher layer and hiding the details from the layers of how the services are
implemented.
o The basic elements of layered architecture are services, protocols, and interfaces.
o Service: It is a set of actions that a layer provides to the higher layer.
o Protocol: It defines a set of rules that a layer uses to exchange the
information with peer entity. These rules mainly concern about both the
contents and order of the messages used.
o Interface: It is a way through which the message is transferred from one
layer to another layer.
o In a layer n architecture, layer n on one machine will have a communication with
the layer n on another machine and the rules used in a conversation are known as
a layer-n protocol.
Cyber security is a complex field that requires a deep understanding of the various threats
that exist and the measures that can be taken to protect against them. It is important to
understand the different types of threats that exist, such as malware, phishing, and
ransomware, and the different types of security measures that can be taken to protect
against them. This includes the use of firewalls, antivirus software, and other security
measures. It is also important to understand the different types of data that need to be
protected, such as customer data, financial data, and intellectual property.
Once an organization has a good understanding of the threats that exist and the
measures that can be taken to protect against them, it is important to implement the
necessary security measures. This includes the use of firewalls, antivirus software, and
other security measures. It is also important to ensure that all employees are trained on
the proper use of these security measures and that they are aware of the risks associated
with not following security protocols. Additionally, organizations should regularly review
their security measures to ensure that they are up to date and effective.
Monitoring Cyber Security
When a cyber security incident occurs, it is important for organizations to respond quickly
and effectively. This includes identifying the source of the attack, assessing the damage,
and taking steps to mitigate the damage. It is also important to notify the appropriate
authorities and take steps to prevent similar incidents from occurring in the future.
Additionally, organizations should review their security measures to ensure that they are
up to date and effective.
Organizations should also develop and implement cyber security policies to ensure that
their networks and systems are secure. These policies should include guidelines for the
use of the network, the use of passwords, and the use of encryption. Additionally,
organizations should ensure that all employees are aware of the policies and that they
are following them. This includes regularly reviewing the policies and making sure that
they are up to date and effective.
Organizations should also ensure that all employees are educated on cyber security. This
includes providing training on the proper use of the network, the use of passwords, and
the use of encryption. Additionally, organizations should ensure that all employees are
aware of the risks associated with not following security protocols. This includes regularly
reviewing the policies and making sure that they are up to date and effective.
Organizations should also invest in cyber security solutions to ensure that their networks
and systems are secure. This includes investing in firewalls, antivirus software, and other
security measures. Additionally, organizations should ensure that all employees are
aware of the risks associated with not following security protocols. This includes regularly
reviewing the security measures to ensure that they are up to date and effective.
Organizations should also develop a cyber security plan to ensure that their networks and
systems are secure. This plan should include the steps that need to be taken to protect
against cyber threats, the steps that need to be taken to respond to cyber security
incidents, and the steps that need to be taken to ensure that all employees are aware of
the risks associated with not following security protocols. Additionally, organizations
should regularly review their security measures to ensure that they are up to date and
effective.
this one simply isn’t true, and we believe the myth has originated from poor
implementation of security tools, rather than the limitations of the tools themselves. if
security tools have been implemented properly then you should be provided with security
without affecting your users’ productivity.
whilst having a strong password is a necessity, unfortunately it isn’t enough on its own. a
good way to add another level of security is to use multi-factor authentication (mfa),
requiring users to authenticate themselves via a second method such as their phone or
an app like google authenticator. with mfa in place, even if criminals do manage to get
hold of usernames and passwords, they still won’t be able log in without the ‘second
factor’.
companies who think like this are often not considering the downside costs. data
breaches will end up being much costlier to your business than making sure you have
dedicated security solutions in place before they can happen. capita estimates the
average cost of a data breach to be $3.86 million, considering the cost of detecting and
escalating a breach, notifying those affected and the regulatory authorities, lost business
and reputational damage, and paying fines, legal fees and other costs associated with
making things right.
this rarely the case these days. there used to be some easy signs (pop up ads or slow
loading browsers) but scammers have become stealthier. hacking is a silent crime and it
is in criminals’ best interest to remain unnoticed for as long as possible. the longer they
have access to your systems, the more data they can steal.
unfortunately, neglectful employees are the number one cause of cybersecurity breaches,
so you can’t rely solely on the it department to keep your organization secure online –
everyone has a role to play. all your staff should be using corporate
laptops/tablets/phones with at least 2 factor authentication, as well as ensuring that their
installed security software is up to date.
following on from our last point, research suggests that up to 75% of data breaches come
from the inside. occasionally this will be a disgruntled employee looking for revenge, but
more often than not it is employees who have not been given proper security training or
are not following your security protocols.
this is an illusion. even if hackers gain only usernames and passwords, this can still result
in very bad outcomes for anyone who’s data was compromised, as many people use the
same credentials for most of their services, including for their online banking.
there is a belief that apple products are immune to cyber threats – this isn’t the case.
apple products can and do get hacked and users who think their devices are invulnerable
are more susceptible to data loss.
in this day and age, computers are not the only targets for hackers and scammers as so
many of our devices connect to the internet. scammers go after phones, routers and even
smart tvs. we must make sure we are protecting all end points.
There’s a lot that can go wrong here. Although most people feel at ease after installing
security software, they’re not nearly air-tight in reality. The servers of such security
software providers are vulnerable to hacking attacks, rendering the clients’ defenses
useless.
The kind of cyber-security software you choose is also important. It’s easy to select an
antivirus at random and live to regret it later. Always go with reliable providers with
stronger safeguards. Some great ones might charge a buck or two, but curtailing costs
here might cost you big-time in the future.
Passwords are becoming really easy to breach for hackers. Special programs are
capable of cracking the longest and most confusing passwords by trying billions of
different combinations in the space of seconds. Password trends can also be further
replicated to breach your security in multiple online avenues, e.g., having a password
for a social media site and using the same one for your email account.
Temporary passwords, OTPs, and two-factor authentication are a way to reduce the
risk.
3. My Data Isn’t Worth Anything
That is not true. If it were, social media would never be free to begin with. If a service
such as that is free, it monetizes your data instead, selling it to advertisers as an entire
‘customer’ profile.
Data can be materialized for crime, such as theft, impersonation, and physical harm. If
it’s valuable for some, it’s valuable for many.
Phishing schemes and scams are getting more and more intelligent and convincing.
Some pretend to withhold your sensitive information via webcam and threaten to
release it. Others masquerade as services that you are currently subscribed to and give
‘reminders’ about privacy settings updates.
The data they used to reach you, such as the email address and password, has
probably been breached. Some hackers even manage to breach the social media
accounts of people you know and use your trust in them against you by sending links to
malicious content.
All of the big websites employ cookies to track your internet trajectory. Despite the
onsite safety, these companies that own the sites possess your data. If any of these
companies are hacked, your data is breached too. Consequently, your data isn’t as safe
with big websites either.
Eight malicious actors were arrested in Kathmandu, Nepal, were arrested by the police
for hacking into bank accounts. The attackers shared the Android package kit (APK) for
a fake app called Nepali Keti over WhatsApp. Then they hacked into the bank accounts
of the people who downloaded the app and stole money.
XSS vulnerabilities found in DMS providers
Impact: Unknown
Four DMS providers reportedly had XSS vulnerability – CWE – 79. The companies have
both free and freemium offerings. The zero-day vulnerabilities were discovered by Rapid7
during a regular inspection.
Perpetrators: Unknown
On 14th February 2023, Cloudflare thwarted the largest known DDoS attack peaking at
71 million requests per second. The attack was mounted against gaming platforms,
cryptocurrency companies, and hosting providers, among others, that use Cloudflare to
protect their websites. The attack was based on HTTP/2 and involved 30,000 IP
addresses.
Impact: Some data was extracted and Dish’s share price fell by 6.5%
Dish Network, one of the USA’s biggest television providers, disclosed that the network
outage reported earlier was connected to a cyber attack. The root causes of the intrusion
are yet to be found. The attack resulted in data theft and internal communication
breakdown.
Target: USMS
The U.S. Marshals Service is responsible for sensitive tasks like the security of federal
judges, fugitive apprehension, etc. The stand-alone USMS system was compromised by
attackers exposing data related to USMS investigations.
In this section, we’ll learn about recent cyber attacks – their targets, perpetrators, impact,
and current status. This is not an exhaustive list. We’ve picked the most impactful attacks.
Target: T-Mobile
Perpetrator: Unknown
Perpetrator: Unknown
Impact: Exposure of email IDs, user names, earned miles balance
In a recent report, two major airlines, AirFrance and KLM have confirmed unauthorized
access to customer data. The attack exposed some personally identifiable information
about Flying Blue customers. However, no Passport, financial information, or social
security information was exposed. Flying Blue is a customer-loyalty program run by a
number of airlines.
CVE: CVE-2023-21674
Notably, Microsoft released 98 patches on January 10, 2023, including the one for
the ALPC zero-day vulnerability.
Attack on Mailchimp
Perpetrator: Unknown
Nissan North America reported on January 16, 2023, a data breach that had taken place
in June 2022. A third-party vendor that had access to limited customer data for
development purposes was victimized by the bad actor. An investigation launched by
Nissan in September 2022 confirmed that the attack took advantage of the badly
configured database used by the vendor.
Perpetrator: Unknown
Impact: Hackers had access to the personal data of 34,942 PayPal users for 2
days
In the case of PayPal users, hackers had access to the full names, dates of birth, social
security numbers, postal addresses, and individual tax identification numbers of 34,942
users for 2 days.
As cyber-attacks volume and complexity increase, cyber security’s importance also increases.
Cyber security is critical because it helps to protect organizations and individuals from cyber
attacks. Cyber security can help to prevent data breaches, identity theft, and other types of
cybercrime. Organizations must have strong cyber security measures to protect their data and
customers.
1. Technology Innovation
The importance of cyber security regarding technology innovation is that it helps protect
ideas and intellectual property from theft or being copied without permission. This is
important because it allows companies to maintain a competitive advantage and keep
their products and services safe from competitors. Additionally, it helps to ensure that new
products and services are not easily replicated or stolen before they can be released to
the market.
2. Cloud Transformation
The cloud has transformed how we think about IT, but it has also introduced new security
risks. As organizations move more critical data and applications to the cloud, they must
know the latest cyber security threats and how to protect themselves.
One of the most significant advantages of the cloud is that it allows organizations to be
more agile and responsive to change. However, this agility can also introduce new
security risks. For example, a cloud provider may not have the same security controls as
a traditional on-premises data center. Cloud data is often spread across multiple physical
locations, making protecting it more challenging.
Organizations must be aware of these new risks and take steps to mitigate them. They
should work with their cloud providers to ensure that adequate security controls are in
place. They should also consider using a cloud security platform to help manage and
monitor their cloud environment.
The internet has become a staple in business operations for the majority of companies
across the globe. The increase in internet usage has led to a rise in cyber-attacks, which
can significantly impact business operations. Cyber security in business helps protect
itself against these attacks, including data breaches, phishing scams, and ransom ware.
Cyber security can help businesses to protect their data, customers, and reputation.
Customers and employees trust that their information will be protected from cyber threats.
To maintain this trust, businesses must invest in cyber security measures to protect
customer and employee data. This may include installing firewalls, encrypting data, and
creating secure passwords. By taking these steps, businesses can show their
commitment to protecting customer and employee information, which can help to build
and maintain trust.
In some cases, it can even lead to bankruptcy. For these reasons, organizations need to
take steps to protect their data and their systems from attack. It includes investing in cyber
security measures such as firewalls, intrusion detection systems, and encryption.
The importance of cyber security in avoiding fines and penalties is that it helps protect
businesses and individuals from data breaches, cyber-attacks, and other online threats.
By implementing strong cyber security measures, companies and individuals can help to
safeguard their data and avoid potential fines and penalties.
Organizations face many potential risks regarding their ability to function correctly. One
of the most significant risks is a cyber attack. Cyber security is critical because it helps
protect organizations from these attacks.
Overall, cyber security is important because it helps protect organizations from the many risks
they face. By having strong cyber security measures in place, organizations can reduce the
chances of a successful attack and minimize the damage that an attack can cause.
Before heading to the different types of cyber attacks, we will first walk you through a
cyber attack. When there is an unauthorized system/network access by a third party, we
term it as a cyber attack. The person who carries out a cyber attack is termed as
a hacker/attacker.
Cyber-attacks have several negative effects. When an attack is carried out, it can lead to
data breaches, resulting in data loss or data manipulation. Organizations incur financial
losses, customer trust gets hampered, and there is reputational damage. To put a curb
on cyber attacks, we implement cyber security. Cyber security is the method of
safeguarding networks, computer systems, and their components from unauthorized
digital access.
The COVID-19 situation has also had an adverse impact on cyber security. According
to Interpol and WHO, there has been a notable increase in the number of cyberattacks
during the COVID-19 pandemic.
Before heading to the different types of cyber attacks, we will first walk you through a
cyber attack. When there is an unauthorized system/network access by a third party, we
term it as a cyber attack. The person who carries out a cyber attack is termed as
a hacker/attacker.
Cyber-attacks have several negative effects. When an attack is carried out, it can lead to
data breaches, resulting in data loss or data manipulation. Organizations incur financial
losses, customer trust gets hampered, and there is reputational damage. To put a curb
on cyber attacks, we implement cyber security. Cyber security is the method of
safeguarding networks, computer systems, and their components from unauthorized
digital access.
The COVID-19 situation has also had an adverse impact on cyber security. According
to Interpol and WHO, there has been a notable increase in the number of cyber attacks
during the COVID-19 pandemic.
Now that you know what a cyber attack is, let look at the different types of cyber attacks.
How Often Do Cyber Attacks Occur?
Cyber attacks are becoming increasingly common in our modern digital world. They can
cause severe damage to individuals, businesses, and governments. People launch cyber
attacks for several reasons, including financial gain, espionage, activism, and sabotage.
In addition, hackers may launch attacks simply for the challenge or to prove their skills.
There are many reasons why people launch cyber attacks, including financial gain,
espionage, activism, and sabotage. In some cases, cyber-attacks may be politically
motivated to cause damage to their opponents.
During a cyber attack, the attacker gains unauthorized access to a computer system,
network, or device for stealing, modifying, or destroying data. The attacker may use a
variety of tactics, including malware, social engineering, or exploiting vulnerabilities in
software or systems.
Cyber attacks can happen in various methods. For instance, a hacker can
use phishing methods to trick a user into clicking a malicious link or entering their login
credentials into a fake website. Alternatively, a hacker may cause damage to the
vulnerability in the software to access other devices to steal sensitive information.
There are many varieties of cyber attacks that happen in the world today. If we know the
various types of cyber attacks, it becomes easier for us to protect our networks and
systems against them. Here, we will closely examine the top ten cyber-attacks that can
affect an individual, or a large business, depending on the scale.
Let’s start with the different types of cyber attacks on our list:
1. Malware Attack
This is one of the most common types of cyber attacks. “Malware” refers to malicious
software viruses including worms, spyware, ransom ware, adware, and Trojans.
The trojan virus disguises itself as legitimate software. Ransom ware blocks access to
the network's key components, whereas Spyware is software that steals all your
confidential data without your knowledge. Adware is software that displays advertising
content such as banners on a user's screen.
Malware breaches a network through a vulnerability. When the user clicks a dangerous
link, it downloads an email attachment or when an infected pen drive is used.
Use antivirus software. It can protect your computer against malware. Avast
Antivirus, Norton Antivirus, and McAfee Antivirus are a few of the popular antivirus
software.
Use firewalls. Firewalls filter the traffic that may enter your device. Windows and
Mac OS X have their default built-in firewalls, named Windows Firewall and Mac
Firewall.
2. Phishing Attack
Phishing attacks are one of the most prominent widespread types of cyber attacks. It is a
type of social engineering attack wherein an attacker impersonates to be a trusted contact
and sends the victim fake mails.
Unaware of this, the victim opens the mail and clicks on the malicious link or opens the
mail's attachment. By doing so, attackers gain access to confidential information and
account credentials. They can also install malware through a phishing attack.
Scrutinize the emails you receive. Most phishing emails have significant errors like
spelling mistakes and format changes from that of legitimate sources.
3. Password Attack
It is a form of attack wherein a hacker cracks your password with various programs and
password cracking tools like Air crack, Cain, Abel, John the Ripper, Hash cat, etc. There
are different types of password attacks like brute force attacks, dictionary attacks, and
keylogger attacks.
Listed below are a few ways to prevent password attacks:
Abstain from using the same password for multiple websites or accounts.
Update your passwords; this will limit your exposure to a password attack.
4. Man-in-the-Middle Attack
As seen below, the client-server communication has been cut off, and instead, the
communication line goes through the hacker.
Be mindful of the security of the website you are using. Use encryption on your
devices.
This results in the attacker being able to view, edit, and delete tables in the databases.
Attackers can also get administrative rights through this.
Carry out a validation of the user-supplied data. With a validation process, it keeps
the user input in check.
6. Denial-of-Service Attack
A Denial-of-Service Attack is a significant threat to companies. Here, attackers target
systems, servers, or networks and flood them with traffic to exhaust their resources and
bandwidth.
When this happens, catering to the incoming requests becomes overwhelming for the
servers, resulting in the website it hosts either shut down or slow down. This leaves the
legitimate service requests unattended.
Formulate an incident response plan, have a checklist and make sure your team
and data center can handle a DDoS attack.
7. Insider Threat
As the name suggests, an insider threat does not involve a third party but an insider. In
such a case; it could be an individual from within the organization who knows everything
about the organization. Insider threats have the potential to cause tremendous damages.
Insider threats are rampant in small businesses, as the staff there hold access to multiple
accounts with data. Reasons for this form of an attack are many, it can be greed, malice,
or even carelessness. Insider threats are hard to predict and hence tricky.
Companies must limit the IT resources staff can have access to depending on their
job roles.
Organizations must train employees to spot insider threats. This will help
employees understand when a hacker has manipulated or is attempting to misuse
the organization's data.