Computer Network
Topic:
Introduction to Network security, Vulnerability, Threats,
Attacks, IDS, Firewall, Public key cryptography
Submitted To:
Prof. Muhammad Sufyan
Submitted By:
Group D:Rida, Muqaddas, Shamsa
Department: ADP-CS
Program: Computer Science
Semester: Second
Network security
It is the process of protecting
networking infrastructure from
unauthorized access, misuse, or
theft.
Ensures confidentiality, integrity,
and availability of data.
• Example:
Using passwords and encryption
on a Wi-Fi network.
In network security, three
common terms are used as:
• Vulnerability
• Threats
• Attacks
Vulnerability
• A vulnerability is a weakness
that allows an attacker to
reduce a system
Information assurance
• Example:
Using “123456” as a
password is a vulnerability.
Primary Vulnerabilities in Network
• Technology Vulnerability: Weaknesses or flaws
in hardware or software that attackers can exploit
(e.g., outdated software, insecure protocols).
• Configuration Vulnerability: Security gaps due
to improper system settings, like open ports or
default passwords.
• Security Policy Vulnerability: Risks arising
from weak, unclear, or poorly enforced security
rules and procedures.
THREATS
The people eager , willing
and qualified to take
advantage of each
security vulnerability and
they continuously search
for new exploits and
weaknesses.
Classes Of Threats
There are main four
classes of Threats:
• Structured Threats
• Unstructured Threats
• External Threats
• Internal Threats
1.Structured threats
Implemented by a technically skilled person who is trying to gain
access to your network.
2. Unstructured threats.
Created by an inexperience/non technical person who is trying to
gain access to your network.
3. Internal threats
Occurs when someone from inside your network creates a security
threat to your network.
4. External threats
Occurs when someone from outside your network creates a security
threat to your network.
ATTACKS
• In computer networks, attacks are
malicious attempts to disrupt,
damage, or gain unauthorized
access to network resources or
data.
• These attacks can range from
simple disruptions to sophisticated
data breaches, and they are a
major concern for individuals and
organizations alike due to the
increasing reliance on digital
systems.
Types Of Attacks
There are two main types of attack:
1. Active attack
. Replay Analysis
. Masquerade Attack
. DOS Attack
2. Passive attack
. Traffic Attack
. Eves dropping
1. Passive Attacks :
These attacks do not alter data; they only monitor or listen
• Traffic Analysis: Observing communication patterns without reading
actual content.
• Eavesdropping: Listening to private communication to gather sensitive
info.
🔸 Goal: Information gathering
🔸 Detection: Difficult to detect
2. Active Attacks
These attacks alter, interrupt, or fake communication.
• Replay Attack: Re-sending previously captured data to trick a system.
• Masquerade Attack: Pretending to be an authorized user.
• Denial of Service (DoS): Flooding system with traffic to make it
unavailable.
🔸 Goal: Disruption, fraud, or damage
🔸 Detection: Easier to detect
Intrusive System
Detection
Intrusion Detection Systems (IDs) are
security tools used to monitor
network or system activities for
malicious activities, policy violations,
or security breaches
Purpose
Detect unauthorized access
Alert administrators of suspicious
behavior
• Complement firewalls and
antivirus software
Classification Of IDS
1. Based on Monitoring Location:
a. Network-based IDs (NIDs):Monitor traffic on an entire network .Detect
attacks like DoS, port scans Example: Snorts.
b. Host-based IDs (HIDs):Installed on individual devices Monitor system
logs, file changes.
Example: OSSEC
2. Based on Detection technique:
3. a. Signature-based IDs: Detect known threats using predefined
patterns. Fast but can’t detect new attacks
b. Anomaly-based IDs: Detect deviations from normal behavior. Can
identify unknown threat, but may raise false alarms
Firewall
A firewall is a network security
device that monitors and
controls incoming and
outgoing traffic based on
predefined security rules.
Purpose of a Firewall:
To prevent unauthorized
access to or from a private
network and protect
systems from cyber
threats.
Types of Firewalls:
1. Packet-Filtering Firewall:
Checks data packets against rules (IP, port, protocol).
2. Stateful Inspection Firewall:
Tracks active connections and makes decisions based on context.
3. Proxy Firewall:
Acts as an intermediary between users and the internet
4. Next-Generation Firewall (NGFW):
Offers advanced features like deep packet inspection and intrusion
prevention.
5. Software Firewall:
Installed on devices; protects individual systems.
6. Hardware Firewall:
Physical device placed between network and gateway.