Sunteți pe pagina 1din 8

NETWORK SECURITY

GROUP MEMBERS NAME:


SIDRA OMER(GROUP LEADER)-109
ANUM ILYAS-144
MEHAK MUSHTAQ-116
HAIDER ALI-117
Manahil-138

SUBMITTED TO:
Mam Nudrat Nida

SE (2C)

Network security for securing


your systems
Mehak, Sidra omer, Minahil, Anum, Haider.
Department of Computer Engineering
COMSATS Institute of Information technology,
Wah campus
Pakistan

Abstract ___

Development
of
computer network is growing very
fast, for sharing and receiving
informations from all
over the
world. Also it is rapidly growing
area of interest due to extension
in
networks development
and
weakness measures in that field .
Software system are increasingly
assembled
from components that
are buy from or purchase
from
third parties
for technical and
economic gains. Therefore lot of
security issues appeared. This paper
also include the features of security
network , major security threats and
issues faced by computer networks .
Also explanations
of popular
security technology of Wi-Fi network
is discussed here.
Keywords: Network security, Wi-Fi,
Internet Vulnerabilities, ipV6 security
protocol,
issues
Countermeasures,
Encryption and Authentication.

I.

INTRODUCTION:

When we are talking about network, the


word network security weigh more than
any other concept related to network.
Also network security is a peak term that
describes the terms
of policies and
procedures implemented by network
administrator. Now we see the brief
summary of overall research papers which
we study in team-manner.

II.

COMPUTER
SECURITY:

NETWORK

Computer network security provides


Privacy,
integrity,
facticity
and
availability. Privacy means information
will not be used to non-authorized users,
Integrity means information cannot be
lost and destroy. Facticity means to know
about
the
sender
and
receiver.
Availability means that information used
according to their demand and authorized
user.

III.

SECURITY THREATS:

There are three types of threats. Hostile


attack is a serious threat. There are two
types of hostile attack. First is initiative
attack
means
destroy
network
&
information. Other is passive attack means
get information secretly (illegal).Software
leaks are two types one is made by
propose, which is intently designed to
control system and the other one is
accidentally made because of negligence.
Computer
virus
is
a
specially
programmed computer process that can
be copied and transmitted through various
channels, such as disk, CD and computer
network.

IV.

PRECAUTION
ON
NETWORK SECURITY:

There are various ways for the protection


of network security. Firewall Technology
play a role between local and major
network for the protection of computer.
Encryption Technology is used to
protect data, file, password and controlling
information in network. Access control
technology use for network security

precaution & protection. And sure that


Network resources will not be illegal used
& access. Antivirus software is used to
detect virus and automatically detect &
delete virus. Authentication is usually
used to access the network or networks to
provide services to identify the user before
the legality of identity. Many more
technology will be developed with the
time and in future with the complex
threats engineers will be also able to
develop stronger antiviruss softwares.

V.

ISSUES
FACED
NETWORK :

BY

There are certain issues for network


security but there are given issues and
solution of campus network and Wi-Fi
network.

A. Issues of campus network:

Hacking
Computer destroying viruses.
Attacks in internal environment.

Solution
network:

of

issues

campus

Using network firewall: use such


softwares which can detect your pc when
any problems occur.

Virus
Today

preventative

softwares:

there are many antiviruses


softwares are made which are updating
day by day and hence save your system to
be attacked.
Using authentic system: This is also
kinds of software which are authentic in
their
nature
to
detect
problem
automatically, if occur and resolve it.

B. Wi-Fi Network Security Issues:


There are certain issues.

The
weakness
of
the
WEP
encryption mechanism: WEP is a
security protocol that encrypt transmitted
data for wireless network. WEP is easy to
crack keys by someone else. Key
management is complex, use WEP keys
need
to
accept
an
external
key
management system of control.

Search

wireless

signal

attack:

wireless signal is also a method of


attacking wireless networks. Nets tumbler

software is software that is widely used to


found a wireless network.

Solution
of
issues
Network Security:

Wi-Fi

Wireless
signal
spectrum
expansion
technology: To increase frequency for
the secure transmission of data. Spread
spectrum sent a very low power signal
used in a very wide frequency range of
launch, and narrow-band radio-on the
contrary; it put all the energy into a single
frequency.

WEP data encryption technology:

WEP
is
the
most
basic
wireless
IEEE802.11b protocol security encryption
measures, its main purposes include
providing access control and prevent
unauthorized users from accessing the
network.

VI. NETWORK
SECURITY
SERVICE CLASSIFICATION:

The classification of security services and


network and authentication of network
system:

Availability of services:
Information or services to ensure that
when needed can be a normal visit.
Confidential service:
To ensure that sensitive data or
information will not be leaked or exposed
to unauthorized entities.

Integrity services:
To ensure that data is not the way to
unauthorized alteration or destruction.

Identification:
The identity of an entity to provide the
guarantee the legitimacy of.

Authorized:

The use of system resources for the


implementation of control provisions, such
as the visitor's access permissions.

VII.

IMPLEMENTATION
SECURITY:

OF

Generated as a result of the early stage of


the Internet has not been designed for the
specific IP security program, it is
necessary to network security, services
and products to improve the IP network,
Internet Protocol in order to weaken the

inherent security risks, and the following


precautions.

systems and how well he can avoid from


detection.in short we can say that actually
attacker can judger the penalty power in
this phase .

This research is related to how attacker


attack and how you can monitor your
system and thus made measures to keep
check and balance on your system.

In this phase he attack on your system .e


can accessed you data directly or
indirectly and used them for illegal
purpose. He can attack on your pc by
making different logics and using IP
addresses.

VIII.

NETWORK
MONITOR:

SECURITY

PHASES OF ATTACKER:
Attacker basically attack
system in three phases.
Analysis phase.
Attack phase.
Post attack phase.

on

your

ANALYSIS PHASE:
In this phase .attacker try to know that
how well he can
penetrate in your

IX.

ATTACK PHASE:

POST_ATTACK PHASE:
In this phase, the effects will remains or
signs are left after attack .your system
may slow down in his working .this is due
to reason that attacker may use your
system memory.

COMPARISON B/W LAN & WAN:

COMPAR
ISION

LAN

WAN

Stands
for
Covers

Local Area
Network
Local area
only just like
in home etc.
It has a faster
speed
I-e. (1000
mbps)
It is a
computer
network and
covers small
area
high

Wide Area Network

Speed

Definiti
on

Data
transfe
r rate
Exampl
e
SECURI
TY

How we
provide
securit
y?

Network
within a
building
It is more
secure
because it all
the resources
are under
control.
Verify
that your
network
is
segmente
d
Make sure
that there
is a
guests
network
so that
vendors
(Seller)
can be
attached
to it if
needed.
Setting
some
type of
switch
security
that may
disable a
port.

It covers large area comparatively

Its speed is slow as compared to LAN


I-e. (150 mbps)

It is a computer network and covers large geographical area

low

internet

It is less secure because all the resources are not under the
control due to large geographical area.

Control all keys,


Encryption policies
Control traffic integrity.
Crypto Flow WAN encryption ensures that data is safe from
hackers and meet with privacy requirements.

X.

NETWORK SECURITY INCREASES SHOWING BY GRAPH:

XI.

CONCLUSION:

With the rapid development of technology,


network security technology has become a
key
point
in
information
network
development. Network operating system
security and database management
systems security and security is closely
integrated. The application must be
tailored to specific needs of the
environment matched analysis and the
development
of
various
safety
management strategy to ensure network
security. Combination of Technology and
Management to build a secure network.

REFERENCES:

Wu, Cuihong. "The problems in


campus
network
information
security
and
its
solutions." Industrial
and
Information Systems (IIS), 2010
2nd International Conference on.
Vol. 1. IEEE, 2010.
Yan, Gao. "Computer Remote
Control System of Network Security
Research." Intelligent
Transportation, Big Data and Smart
City (ICITBS), 2015 International
Conference on. IEEE, 2015.
Wang, Jinhua, and Xiaodong Liu.
"Computer network security of
university
and
preventive
strategy." Communication Software
and Networks (ICCSN), 2011 IEEE
3rd International Conference on.
IEEE, 2011.
Yan-ping, Chen, Liu Dong-liang, and
GuoRui. "Security and precaution
on
computer
network." 2010
International Conference on Future

Information
Technology
and
Management Engineering.
Gong, Yishan, Guanghong Yue, and
Quansheng Xu. "Network Security
and Safety Precautions." Future
Networks, 2010. ICFN'10. Second
International Conference on. IEEE,
2010.
Purboyo, Tito Waluyo. "Methods for
strengthening a Computer network
security." Rural
Information
&
Communication Technology and
Electric-Vehicle
Technology
(rICT&ICeV-T),
2013
Joint
International Conference on. IEEE,
2013.
Peng, Haishen. "WIFI network
Information
security
analysis
research." 2012 2nd International
Conference
on
Consumer
Electronics, Communications and
Networks, CECNet, April. 2012.
Heberlein, L. Todd, et al. "A network
security
monitor." Research
in
Security
and
Privacy,
1990.
Proceedings., 1990 IEEE Computer
Society Symposium on. IEEE, 1990.
Li,Fuguo. "Study on security and
prevention strategies of computer
network." Computer Science and
Information Processing (CSIP), 2012
International Conference on. IEEE,
2012.
Yan, Fan, Yang Jian-Wen, and Cheng
Lin. "Computer Network Security
and
Technology
Research." Measuring
Technology
and
Mechatronics
Automation
(ICMTMA),
2015
Seventh
International Conference on. IEEE,
2015.

S-ar putea să vă placă și