SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Computer Network Security
Sachithra Gayan Gunarathne
Sabaragamuwa University Of Sri Lanka
gayan_sac@yahoo.com
P a g e 1 | 4
Abstract
Computer technology has rapidly grown to maturity.
Computer technology becomes familiar with day-to-
day life. However, computer also brings to us a lot of
security risks due to its openness and connectivity.
Users are now faced with a large number of security
threats of domestic and international coverage.
Network administrators need to keep up with the
recent advancements in both the hardware and
software fields to prevent their as well as the user’s
data.
Antivirus software, Firewalls, and other technologies
for safeguarding personal data and computer
networks are essential but not sufficient to ensure
security.
Cyber-Ethics, Cyber-Safety, and Cyber-Security
issues should be integrated in the educational process.
Security counter measures help ensure the
confidentiality, availability, and integrity of
information systems by preventing or mitigating asset
losses from Cyber security attacks.
Key words : Cyber-Ethics, Cyber-Safety, Cyber-
Security
Introduction
Current situation of computer network security
The security of computer network, security of
important data in the network system and the
structural completion of computer network. It must
protect users’ data and computer system from nasty
attacks. Computer network security specialists have
set up special researches on the maintaining,
destruction and repairmen of computer network
security. By these research results, specialists built
the PPDRR computer network security model.
Through this model, people can accomplish
monitoring and analyzing computer network security,
specialist can detect the vulnerabilities of computer
network system and react in time to protect computer
network system from leak of information and
economical loss.
Computer network security encompasses a wide
range of specialties. Such as software design of
computer software development, monitoring and
maintenance of software could all use the protection
of computer network security. Therefore computer
network security specialists aspiring to find an
effective method of computer network security. By
the way specialists proposed a new analysis method
of computer network security “attack-tree”. They
integrate past attacking data and use mathematical
formulas to represent them. Although this method
still have some flaws and disagreements in
integrating and explaining the “leaves”. Therefore
some specialists also proposed “privilege graph”
analysis method to improve past computer network
security analysis methods. With the development of
technology, there have been continuous innovations
of computer network security analysis methods.
Influential elements of security of computer
network
Hackers are the great influential element of computer
network security. They sabotage the internet or steal
information. They use collated data to monitor every
computer in the network system to find the
vulnerability of the network to destroy computer
network security system. Most hacked use Trojan
horses and worm virus to attack users’ computers.
Some are write large amount of false programs to
install on users’ computers to control their computers.
Some hackers would also monitor user’s internet data
to steal users’ account numbers, passwords and bank
savings. There would be threats like communication
threat, application treat and system threat in hackers’
attack.
Vulnerability of network and software is the next
influential element of computer network security. It
take account of vulnerability in computer system and
software design, lack of protection of computer
network and software security, illegal users enter to
computer through computer network vulnerability
and computer being controlled by unknown users.
This could severely influence user’s daily use of
computer and normal network communication. It
would cause users’ information cannot spread and
receive. With this vulnerability information could be
stealed any time by any unkown people.
Falsification of personal information and leak of
classified information is the third element of
computer security. In the computer network
communication, information got spread the most is
personal information of users and classified
materials. It refers to falsify and delete the
information to result in the interception. Outflow of
information refers to third party monitor users’
computers remotely and steal information.
The universal use of computer technology has a great
influence on people’s life. Computer network
Computer Network Security
Sachithra Gayan Gunarathne
Sabaragamuwa University Of Sri Lanka
gayan_sac@yahoo.com
P a g e 2 | 4
technology has influences on people’s life, economy
and politics. But this kind of influences is two-sided.
There are good influences and bad influences.
Computer network technology brings people’s life
convenience and threat to the security of personal
information. This vulnerability of computer network
security brings a lot problems and cause the users of
computer network great loss.
Research findings
Basic technologies of computer network security
Firewall technology is safety applications to exert
mandatory access on external network by using
predetermined safety facilities between network
systems. Data transfer between two or more networks
should follow certain safety measures to monitor the
performance, determine whether the communication
between the networks is allowed, and monitor the
running of the network.
Data encryption technology can be divided in data
storage, data transfer, data integrity, authentication
and key management techniques. Data encryption is
stored in the memory in order to prevent data loss and
destruction. The transmission process in the
information encrypted is commonly in the form of
circuit encryption and port encryption. Data integrity
identification technology is to protect information
transfer, storage, access, identification and
confidential treatment of people and data. Data are
subject to validation, and encryption enhanced the
protection. Key management is a common encryption
in many cases. Key management techniques include
key generation, distribution, storage, and destruction.
Intrusion detection technology is to ensure the safety
of the design and the rational allocation. Intrusion
detection technology can quickly find anomalies in
the system and the authorized condition in the report.
It can address and resolve system vulnerabilities in a
timely manner.
Anti-virus technology not simply refers to anti-virus
software technology. It can be classified into network
anti-virus software and stand-alone anti-virus
software. Online anti-virus software focuses on
network connection against viruses. Once the virus
has invaded the network or diffused to other network
data, it will be promptly detected by online virus
software, be killed and deleted.
Hacker and hacker programs are safety hazard.
Hacker illegally attacks to the computer system.
Hackers are heaped in groups sometimes. Hacker
causes great harms, including theft and fraud in
financial and economic fields. They also spread false
advertisings to scam money, steal military,
commercial and political secrets, attack other people's
copyrights, and manufacture new virus software to
spread yellow information. According to the research
of FBI, the losses of network security register $ 7.6
billion in USA.
Measures to improve network security
Computer network virus prevention is difficult and
complex. It is hard to monitor the prevention work
online. It is only limited to every client computer, so
that every user needs to install anti-virus software and
on machine.
The invasion can be divided into subjective and
objective security issues. Subjectivity security issue
mainly refers to errors made by network management
personnel. Objectivity security issue mainly refers to
loopholes in computers and the network where
hackers exploit these vulnerabilities to conduct
various forms of attack.
Network management personnel identify these
problems in a timely manner and install the patch.
Network managers take the advantage of scanning
tools and learn about the weakness links take
appropriate preventive and repair measures.
Firewall technology is to prevent others from
accessing your network. There are three types of
firewall technology, namely, packet filtering
technology, agent technology, and status monitoring
technology. Packet filtering technology is to verify
the IP address by setting it. Those IP addresses that
do not match those settings will be filtered by the
firewall. Agent technology is to verify the legitimacy
of requests sent by accept client of proxy server to.
This technology also involves with user
authentication, login, simplified filtering criteria and
shielding the internal IP addresses. Status monitoring
technology is the third generation of network security
technologies, which is effective for all levels of
network monitoring.
For a large-scale regional computer network, that the
switch should be connected to a network or in a
separate network, so that the switch can form a
separate management network. This will effectively
reduce the number of network switches and narrow
the scope of failure. By using search and location, it
is also convenient for network managers to quickly
handle remote network accidents.
Computer Network Security
Sachithra Gayan Gunarathne
Sabaragamuwa University Of Sri Lanka
gayan_sac@yahoo.com
P a g e 3 | 4
Methodologies
There are four main computer security attributes
which are restated for convenience and emphasis.
Those are confidentiality, integrity, privacy, and
availability. Confidentiality and integrity still hold to
the same definition. Availability means the computer
assets can be accessed by authorized people. Privacy
is the right to protect personal secrets. Attack
methods are relate to these attributes.
Internet Attack Methods
Internet attacks methods are broken into categories.
Eavesdropping and phishing attacks gain system
knowledge or personal information. Viruses attacks
can also interfere with the system’s intended
function. There’s another form of attack. When the
system’s resources are consumes uselessly, these can
be caused by denial of service (DoS) attack. Other
forms of network intrusions also exist, such as land
attacks, smurf attacks, and teardrop attacks.
a) Eavesdropping
Eavesdropping is interception of communications by
an unauthorized party. When the person only secretly
listens to the networked messages is passive
eavesdropping. Active eavesdropping is when the
intruder listens and inserts something into the
communication stream. This can lead to the messages
being distorted. Sensitive information can be stolen
this way.
b) Phishing
Phishing is an attempt to obtain confidential
information from an individual, group, or
organization. Phishers trick users into disclosing
personal data, such as credit card numbers, online
banking credentials, and other sensitive information.
c) IP Spoofing Attacks
To have the address of the computer mirror the
address of a trusted computer in order to gain access
to other computers. The identity of the intruder is
hidden by different means making detection and
prevention difficult. With the current IP protocol
technology, IPspoofed packets cannot be eliminated.
d) Denial of Service
Denial of Service is an attack when the system
receiving too many requests cannot return
communication with the requestors. The system then
consumes resources waiting for the handshake to
complete. The system cannot respond to any more
requests rendering it without service.
e) Viruses, Worms, Trojans
Viruses are use files to infect and propagate. These
are self‐replication programs.
A worm also self‐replicating, but the worm does not
require a file to allow it to propagate. There are two
categories of worms, mass‐mailing worms and
network-aware worms. Mass mailing worms use
email to infect other computers. A network‐aware
worm selects a target and once the worm accesses the
target host.
Trojans appear to be benign programs to the user, but
will actually have some malicious purpose. Trojans
usually carry some payload such as a virus.
Internet Security Methods
Internet threats are major issue in the global world
provided that information is accessible and
transferred across the Internet. There are different
defense and detection mechanisms were developed to
contend with these attacks.
a) Cryptographic systems
Cryptography is a useful and widely used tool in
security engineering. It involved the use of codes and
ciphers to transform information into unintelligible
data.
b) Firewall
This is a typical border control mechanism or
perimeter defense. The purpose of a firewall is to
block traffic from the outside, but it could also be
used to block traffic from the inside. A firewall is the
front line defense mechanism against intruders. It is a
system designed to prevent unauthorized access to or
from a private network. Firewalls can be
implemented in both hardware and software, or a
combination of both.
c) Intrusion Detection Systems
An Intrusion Detection System (IDS) is an additional
protection measure. It helps deflect computer
intrusions. IDS systems can be software and
hardware devices used to detect an attack. IDS are
used to monitor connection in determining whether
attacks are been launched.
Computer Network Security
Sachithra Gayan Gunarathne
Sabaragamuwa University Of Sri Lanka
gayan_sac@yahoo.com
P a g e 4 | 4
d) Anti‐Malware Software and scanners
Anti‐Malware tools are used to detect them and cure
an infected system. Viruses, worms and Trojans are
examples of malicious software
e) Secure Socket Layer (SSL)
The Secure Socket Layer (SSL) is a collection of
protocols which is a standard way to achieve a good
level of security between a web browser and a
website. SSL is designed to create a secure channel,
or tunnel, between a web browser and the web server.
SSL provides authentication of clients to server
through the use of certificates.
Conclusion
Nowadays use amalgamations of firewalls,
encryption, and authentication mechanisms to create
“intranets” that are connected to the World Wide
Web, but protected. Intranet is a private computer
network that uses internet protocols. This is differ
from "Extranets" restricted to employees of the
organization while can be accessed by customers,
suppliers, or other approved parties. It does not
necessarily have to be any access from the
organization's internal network to the Internet itself.
When such access is provided it is usually through a
gateway with a firewall, along with user
authentication, encryption of messages, and often
makes use of virtual private networks (VPNs).
Although intranets can be set up quickly to share data
in a controlled environment, that data is still at risk
unless there is tight security. The disadvantage of a
closed intranet is that vital data might not get into the
hands of those who need it. Intranets have a place
within agencies.
Hardware developments also should be developing
rapidly. Biometric systems and smart cards are the
only new hardware technologies are extensively
impacting security. The obvious use of biometrics is
for secure workstation. Hardware device built in
thumbprint readers would be the next step up. These
devices would be more expensive.
Smart card itself is designed to store encryption keys
and other information used in authentication and
other identification processes. This use to provide
undeniable proof of a user’s identity. There are safety
features built into smart cards to prevent someone
from using a stolen card. It requires to enter a
personal identification number (PIN) before they’ll
be granted any level of access into the system.
Software aspect of network security is very vast. The
improvement of the standard security software still
remains the same. When new viruses emerge, the
antivirus is updated to be able to guard against those
threats. This process is the same for firewalls and
intrusion detection systems. Present-day research is
being performed on security software using neural
networks. The objective of the research is to use
neural networks for the facial recognition software.
Most of the current security algorithms are
computational intensive and require substantial
processing power. Therefore, there is a need for
designing light‐weight security algorithms.
The future will possibly be that the security is similar
to an immune system. The immune system fights off
attacks and builds itself to fight tougher enemies.
Similarly, the network security will be able to
function as an immune system.
References
I. M. M. B. W. Pikoulas J, “Software Agents
and Computer Network Security,” Napier
University, Scotland, UK.
II. Daya , “Network Security: History,
Importance, and Future ,”University of
Florida Department of Electrical and
Computer Engineering, 2013.
III. Huang Zhilong. Research on computer
network security analysis model [J].
Research on computer network security
analysis model, 2014(05).
IV. Zhang Baoshi. Research on computer
network security analysis model [J].
Electronic technology and software
engineering, 2014(04).
V. Hong Yaling. Research on computer
network security analysis model [J].
Computer CD Software and Applications,
2013(z):1-152.
VI. Adeyinka, O., "Internet Attack Methods and
Internet Security Technology," Modeling &
Simulation, 2008. AICMS 08. Second Asia
International Conference on, vol., no.,
pp.77‐82, 13‐15 May 2008

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Network security
Network securityNetwork security
Network security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Security services
Security servicesSecurity services
Security services
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
System security
System securitySystem security
System security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 

Andere mochten auch

The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardAPNIC
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri LankaAPNIC
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation Jackseen Jeyaluck
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri LankaSLINTEC
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceUpekha Vandebona
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsUpekha Vandebona
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTUREHansani Sampath
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Social security on employment in sri lanka
Social security on employment in sri lankaSocial security on employment in sri lanka
Social security on employment in sri lankaArjun Ariaratnam
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Andere mochten auch (20)

The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Social security on employment in sri lanka
Social security on employment in sri lankaSocial security on employment in sri lanka
Social security on employment in sri lanka
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Ähnlich wie Computer Network Security

IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxjeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxtodd521
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And PrivacyTodd Turner
 

Ähnlich wie Computer Network Security (20)

network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
I0516064
I0516064I0516064
I0516064
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 

Mehr von Sachithra Gayan

Mehr von Sachithra Gayan (6)

Embedded Robotics
Embedded RoboticsEmbedded Robotics
Embedded Robotics
 
Best Practices in Project Management
Best Practices in Project ManagementBest Practices in Project Management
Best Practices in Project Management
 
Data acquisition softwares
Data acquisition softwaresData acquisition softwares
Data acquisition softwares
 
Source control
Source controlSource control
Source control
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Computer Network Security

  • 1. Computer Network Security Sachithra Gayan Gunarathne Sabaragamuwa University Of Sri Lanka gayan_sac@yahoo.com P a g e 1 | 4 Abstract Computer technology has rapidly grown to maturity. Computer technology becomes familiar with day-to- day life. However, computer also brings to us a lot of security risks due to its openness and connectivity. Users are now faced with a large number of security threats of domestic and international coverage. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the user’s data. Antivirus software, Firewalls, and other technologies for safeguarding personal data and computer networks are essential but not sufficient to ensure security. Cyber-Ethics, Cyber-Safety, and Cyber-Security issues should be integrated in the educational process. Security counter measures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cyber security attacks. Key words : Cyber-Ethics, Cyber-Safety, Cyber- Security Introduction Current situation of computer network security The security of computer network, security of important data in the network system and the structural completion of computer network. It must protect users’ data and computer system from nasty attacks. Computer network security specialists have set up special researches on the maintaining, destruction and repairmen of computer network security. By these research results, specialists built the PPDRR computer network security model. Through this model, people can accomplish monitoring and analyzing computer network security, specialist can detect the vulnerabilities of computer network system and react in time to protect computer network system from leak of information and economical loss. Computer network security encompasses a wide range of specialties. Such as software design of computer software development, monitoring and maintenance of software could all use the protection of computer network security. Therefore computer network security specialists aspiring to find an effective method of computer network security. By the way specialists proposed a new analysis method of computer network security “attack-tree”. They integrate past attacking data and use mathematical formulas to represent them. Although this method still have some flaws and disagreements in integrating and explaining the “leaves”. Therefore some specialists also proposed “privilege graph” analysis method to improve past computer network security analysis methods. With the development of technology, there have been continuous innovations of computer network security analysis methods. Influential elements of security of computer network Hackers are the great influential element of computer network security. They sabotage the internet or steal information. They use collated data to monitor every computer in the network system to find the vulnerability of the network to destroy computer network security system. Most hacked use Trojan horses and worm virus to attack users’ computers. Some are write large amount of false programs to install on users’ computers to control their computers. Some hackers would also monitor user’s internet data to steal users’ account numbers, passwords and bank savings. There would be threats like communication threat, application treat and system threat in hackers’ attack. Vulnerability of network and software is the next influential element of computer network security. It take account of vulnerability in computer system and software design, lack of protection of computer network and software security, illegal users enter to computer through computer network vulnerability and computer being controlled by unknown users. This could severely influence user’s daily use of computer and normal network communication. It would cause users’ information cannot spread and receive. With this vulnerability information could be stealed any time by any unkown people. Falsification of personal information and leak of classified information is the third element of computer security. In the computer network communication, information got spread the most is personal information of users and classified materials. It refers to falsify and delete the information to result in the interception. Outflow of information refers to third party monitor users’ computers remotely and steal information. The universal use of computer technology has a great influence on people’s life. Computer network
  • 2. Computer Network Security Sachithra Gayan Gunarathne Sabaragamuwa University Of Sri Lanka gayan_sac@yahoo.com P a g e 2 | 4 technology has influences on people’s life, economy and politics. But this kind of influences is two-sided. There are good influences and bad influences. Computer network technology brings people’s life convenience and threat to the security of personal information. This vulnerability of computer network security brings a lot problems and cause the users of computer network great loss. Research findings Basic technologies of computer network security Firewall technology is safety applications to exert mandatory access on external network by using predetermined safety facilities between network systems. Data transfer between two or more networks should follow certain safety measures to monitor the performance, determine whether the communication between the networks is allowed, and monitor the running of the network. Data encryption technology can be divided in data storage, data transfer, data integrity, authentication and key management techniques. Data encryption is stored in the memory in order to prevent data loss and destruction. The transmission process in the information encrypted is commonly in the form of circuit encryption and port encryption. Data integrity identification technology is to protect information transfer, storage, access, identification and confidential treatment of people and data. Data are subject to validation, and encryption enhanced the protection. Key management is a common encryption in many cases. Key management techniques include key generation, distribution, storage, and destruction. Intrusion detection technology is to ensure the safety of the design and the rational allocation. Intrusion detection technology can quickly find anomalies in the system and the authorized condition in the report. It can address and resolve system vulnerabilities in a timely manner. Anti-virus technology not simply refers to anti-virus software technology. It can be classified into network anti-virus software and stand-alone anti-virus software. Online anti-virus software focuses on network connection against viruses. Once the virus has invaded the network or diffused to other network data, it will be promptly detected by online virus software, be killed and deleted. Hacker and hacker programs are safety hazard. Hacker illegally attacks to the computer system. Hackers are heaped in groups sometimes. Hacker causes great harms, including theft and fraud in financial and economic fields. They also spread false advertisings to scam money, steal military, commercial and political secrets, attack other people's copyrights, and manufacture new virus software to spread yellow information. According to the research of FBI, the losses of network security register $ 7.6 billion in USA. Measures to improve network security Computer network virus prevention is difficult and complex. It is hard to monitor the prevention work online. It is only limited to every client computer, so that every user needs to install anti-virus software and on machine. The invasion can be divided into subjective and objective security issues. Subjectivity security issue mainly refers to errors made by network management personnel. Objectivity security issue mainly refers to loopholes in computers and the network where hackers exploit these vulnerabilities to conduct various forms of attack. Network management personnel identify these problems in a timely manner and install the patch. Network managers take the advantage of scanning tools and learn about the weakness links take appropriate preventive and repair measures. Firewall technology is to prevent others from accessing your network. There are three types of firewall technology, namely, packet filtering technology, agent technology, and status monitoring technology. Packet filtering technology is to verify the IP address by setting it. Those IP addresses that do not match those settings will be filtered by the firewall. Agent technology is to verify the legitimacy of requests sent by accept client of proxy server to. This technology also involves with user authentication, login, simplified filtering criteria and shielding the internal IP addresses. Status monitoring technology is the third generation of network security technologies, which is effective for all levels of network monitoring. For a large-scale regional computer network, that the switch should be connected to a network or in a separate network, so that the switch can form a separate management network. This will effectively reduce the number of network switches and narrow the scope of failure. By using search and location, it is also convenient for network managers to quickly handle remote network accidents.
  • 3. Computer Network Security Sachithra Gayan Gunarathne Sabaragamuwa University Of Sri Lanka gayan_sac@yahoo.com P a g e 3 | 4 Methodologies There are four main computer security attributes which are restated for convenience and emphasis. Those are confidentiality, integrity, privacy, and availability. Confidentiality and integrity still hold to the same definition. Availability means the computer assets can be accessed by authorized people. Privacy is the right to protect personal secrets. Attack methods are relate to these attributes. Internet Attack Methods Internet attacks methods are broken into categories. Eavesdropping and phishing attacks gain system knowledge or personal information. Viruses attacks can also interfere with the system’s intended function. There’s another form of attack. When the system’s resources are consumes uselessly, these can be caused by denial of service (DoS) attack. Other forms of network intrusions also exist, such as land attacks, smurf attacks, and teardrop attacks. a) Eavesdropping Eavesdropping is interception of communications by an unauthorized party. When the person only secretly listens to the networked messages is passive eavesdropping. Active eavesdropping is when the intruder listens and inserts something into the communication stream. This can lead to the messages being distorted. Sensitive information can be stolen this way. b) Phishing Phishing is an attempt to obtain confidential information from an individual, group, or organization. Phishers trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information. c) IP Spoofing Attacks To have the address of the computer mirror the address of a trusted computer in order to gain access to other computers. The identity of the intruder is hidden by different means making detection and prevention difficult. With the current IP protocol technology, IPspoofed packets cannot be eliminated. d) Denial of Service Denial of Service is an attack when the system receiving too many requests cannot return communication with the requestors. The system then consumes resources waiting for the handshake to complete. The system cannot respond to any more requests rendering it without service. e) Viruses, Worms, Trojans Viruses are use files to infect and propagate. These are self‐replication programs. A worm also self‐replicating, but the worm does not require a file to allow it to propagate. There are two categories of worms, mass‐mailing worms and network-aware worms. Mass mailing worms use email to infect other computers. A network‐aware worm selects a target and once the worm accesses the target host. Trojans appear to be benign programs to the user, but will actually have some malicious purpose. Trojans usually carry some payload such as a virus. Internet Security Methods Internet threats are major issue in the global world provided that information is accessible and transferred across the Internet. There are different defense and detection mechanisms were developed to contend with these attacks. a) Cryptographic systems Cryptography is a useful and widely used tool in security engineering. It involved the use of codes and ciphers to transform information into unintelligible data. b) Firewall This is a typical border control mechanism or perimeter defense. The purpose of a firewall is to block traffic from the outside, but it could also be used to block traffic from the inside. A firewall is the front line defense mechanism against intruders. It is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. c) Intrusion Detection Systems An Intrusion Detection System (IDS) is an additional protection measure. It helps deflect computer intrusions. IDS systems can be software and hardware devices used to detect an attack. IDS are used to monitor connection in determining whether attacks are been launched.
  • 4. Computer Network Security Sachithra Gayan Gunarathne Sabaragamuwa University Of Sri Lanka gayan_sac@yahoo.com P a g e 4 | 4 d) Anti‐Malware Software and scanners Anti‐Malware tools are used to detect them and cure an infected system. Viruses, worms and Trojans are examples of malicious software e) Secure Socket Layer (SSL) The Secure Socket Layer (SSL) is a collection of protocols which is a standard way to achieve a good level of security between a web browser and a website. SSL is designed to create a secure channel, or tunnel, between a web browser and the web server. SSL provides authentication of clients to server through the use of certificates. Conclusion Nowadays use amalgamations of firewalls, encryption, and authentication mechanisms to create “intranets” that are connected to the World Wide Web, but protected. Intranet is a private computer network that uses internet protocols. This is differ from "Extranets" restricted to employees of the organization while can be accessed by customers, suppliers, or other approved parties. It does not necessarily have to be any access from the organization's internal network to the Internet itself. When such access is provided it is usually through a gateway with a firewall, along with user authentication, encryption of messages, and often makes use of virtual private networks (VPNs). Although intranets can be set up quickly to share data in a controlled environment, that data is still at risk unless there is tight security. The disadvantage of a closed intranet is that vital data might not get into the hands of those who need it. Intranets have a place within agencies. Hardware developments also should be developing rapidly. Biometric systems and smart cards are the only new hardware technologies are extensively impacting security. The obvious use of biometrics is for secure workstation. Hardware device built in thumbprint readers would be the next step up. These devices would be more expensive. Smart card itself is designed to store encryption keys and other information used in authentication and other identification processes. This use to provide undeniable proof of a user’s identity. There are safety features built into smart cards to prevent someone from using a stolen card. It requires to enter a personal identification number (PIN) before they’ll be granted any level of access into the system. Software aspect of network security is very vast. The improvement of the standard security software still remains the same. When new viruses emerge, the antivirus is updated to be able to guard against those threats. This process is the same for firewalls and intrusion detection systems. Present-day research is being performed on security software using neural networks. The objective of the research is to use neural networks for the facial recognition software. Most of the current security algorithms are computational intensive and require substantial processing power. Therefore, there is a need for designing light‐weight security algorithms. The future will possibly be that the security is similar to an immune system. The immune system fights off attacks and builds itself to fight tougher enemies. Similarly, the network security will be able to function as an immune system. References I. M. M. B. W. Pikoulas J, “Software Agents and Computer Network Security,” Napier University, Scotland, UK. II. Daya , “Network Security: History, Importance, and Future ,”University of Florida Department of Electrical and Computer Engineering, 2013. III. Huang Zhilong. Research on computer network security analysis model [J]. Research on computer network security analysis model, 2014(05). IV. Zhang Baoshi. Research on computer network security analysis model [J]. Electronic technology and software engineering, 2014(04). V. Hong Yaling. Research on computer network security analysis model [J]. Computer CD Software and Applications, 2013(z):1-152. VI. Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77‐82, 13‐15 May 2008