0% found this document useful (0 votes)
3 views

Network Security

Uploaded by

Ahmed Amr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Network Security

Uploaded by

Ahmed Amr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Network Security

Here’s a beginner-friendly explanation of network security concepts with key


points highlighted:

1. What is Network Security?


Goal: Protect computer networks from attackers (“bad guys”) who aim to
disrupt, steal, or damage information.

Main Areas:

Attack Methods: Understand how attackers exploit networks.

Defense Strategies: Learn how to block or defend against these


attacks.

Design Secure Architectures: Create networks that are resistant to


attacks.

Why Network Security is Challenging:

The Internet wasn’t originally designed with strong security; it was built
for trusted, cooperative users. Now, security measures are being added
across all layers to address modern threats.

2. How Attackers Compromise Computers and Networks


Malware: Malicious software that can infect computers in different ways:

Virus: Spreads by attaching itself to files like email attachments. The


virus replicates when a user opens the infected file.

Worm: Similar to a virus but spreads on its own without user action
(passively).

Spyware: A type of malware that secretly records information, like


keystrokes or visited websites, and sends it to the attacker.

Botnets: A network of compromised computers (infected by malware) that


attackers control remotely.

Usage: Attackers can use botnets to send spam or launch large-scale


attacks, like DDoS (explained below).

Network Security 1
3. Types of Attacks on Network Infrastructure
Denial of Service (DoS) Attack:

Goal: Overwhelm a server or network resource, making it unavailable


for legitimate users.

Process:

1. The attacker chooses a target.

2. Compromises multiple computers to act as “zombies” in a botnet.

3. Sends a flood of data (packets) to the target, overwhelming its


capacity.

Packet Sniffing:

What it is: In shared networks (e.g., Wi-Fi), attackers can use software
to intercept and read data packets traveling through the network.

Risk: If data isn’t encrypted, attackers could see sensitive information,


like passwords.

Example Tool: Wireshark is a free tool used to analyze network traffic


and often demonstrates packet-sniffing for educational purposes.

IP Spoofing:

What it is: Sending packets with a fake source IP address to disguise


the attacker’s identity or to impersonate another device.

Purpose: Can be used in attacks to mislead defenses or to launch


attacks under a false identity.

Key Points to Remember


Network Security Goals: Stop attackers from damaging, stealing, or
controlling network data.

Types of Malware:

Virus: Needs user action to spread (e.g., opening an infected file).

Worm: Spreads automatically.

Spyware: Secretly collects user data.

Network Security 2
Botnets: A group of infected computers attackers can control remotely,
used for spam or large attacks like DDoS.

Attack Methods:

DoS Attack: Overloads a server to make it unavailable.

Packet Sniffing: Intercepting data on shared networks.

IP Spoofing: Sending packets with a fake source address.

Analogy:

DoS Attack: Like a crowd blocking the entrance to a store so real


customers can’t get in.

Packet Sniffing: Like eavesdropping on a conversation in a crowded room.

IP Spoofing: Like putting a fake return address on a letter to hide the


sender's identity.

Network security aims to prevent and defend against these kinds of threats,
ensuring safer and more reliable communication on the Internet.

Network Security 3

You might also like