SlideShare a Scribd company logo
Network
&
Information
Security
DEFINITION
◈ The protection of information and its elements including
systems, hardware that use, store and transmit the information.
◈ Computer facilities have been physically protected for three
reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
PRINCIPLES OF COMPUTER SECURITY
◈ Guarantee data CONFIDENT
◈Protect the information INTEGRITY
◈ Assure resources AVAILABILITY
Ensuring that information is
accessible only to those authorized
to have access
Safeguarding the accuracy and
completeness of information and
processing methods
Ensuring that authorized users
have access to information and
associated assets when required
PASSIVE Attacks
◈Passive attack attempts to learn
or make use of information from
the system but does not affect
system resources.
◈Two types of passive attacks are
release of message contents and
traffic analysis.
NETWORK SECURITY THREATS
ACTIVE Attacks
◈ Active attacks involve some
modification of the data stream
or the creation of a false stream
and can be subdivided into four
categories : masquerade , replay,
modification of messages, and
denial of service.
1
PASSIVE Attacks
2
ACTIVE Attacks
VULNERABILITIES
◈Malicious Software
🔨
 Trap Doors
 Logic Bomb
 Trojan Horses
 Viruses
 Worms & Bacteria
Malicious Software
◈ Software deliberately designed to harm computer systems.
◈ Malicious software program causes undesired actions in
information systems.
◈ Spreads from one system to another through:
1. E-mail (through attachments)
2. Infected Pen drives
3. Downloading / Exchanging of corrupted files
4. Embedded into computer games
🔨
Trap Doors
◈ Secret undocumented entry point to the program.
 An example of such feature is so called back door, which enables
intrusion to the target by passing user authentication methods.
 A hole in the security of a system deliberately left in place by
designers or maintainers.
 Trapdoor allows unauthorized access to the system.
 Only purpose of a trap door is to "bypass" internal controls. It is up
to the attacker to determine how this circumvention of control can be
utilized for his benefit.
Logic Bomb
◈ A logic bomb is a piece of code intentionally inserted into a
software system that will set off a malicious function when specified
conditions are met.
◈Piggybacking: Many viruses, worms, and other code that are
malicious in nature, often carry a logic bomb that “detonates” under
given conditions. This may help the code on it’s journey as it worms
through your system undetected.
💣
Trojan Horse
◈ This is a malicious program with unexpected additional
functionality. It includes harmful features of which the user is not
aware.
Perform a different function than what these are advertised to do
(some malicious action e.g., steal the passwords).
Infects when user installs and executes infected programs.
Some types of Trojan horses include Remote Access Trojans (RAT),
Key Loggers, Password-Stealers (PSW), and logic bombs.
Virus
◈ These are the programs that spread to other software in the
system .i.e., program that incorporates copies of itself into other
programs.
Two major categories of viruses:
1. Boot sector virus : infect boot sector of systems.
become resident.
activate while booting machine
2. File virus : infects program files.
activates when program is run.
Worm /Bacteria
◈ Computer worms are similar to viruses in that they replicate
functional copies of themselves and can cause the same type of
damage.
◈ In contrast to viruses, which require the spreading of an infected
host file, worms are standalone software and do not require a host
program or human help to propagate.
◈ worm is faster than virus. E.g. The code red worm affected 3 lack
PCs in just 14 Hrs.
Preventing infection by malicious software
Use only trusted software, not pirated software.
Regularly take backup of the programs.
Use anti-virus software to detect and remove viruses.
Update virus database frequently to get new virus signatures.
Install firewall software, which hampers or prevents the functionality of
worms and Trojan horses.
Make sure that the e-mail attachments are secure.
Thank
you !

More Related Content

What's hot

Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
HardikBhandari7
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 

What's hot (20)

Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Security policy
Security policySecurity policy
Security policy
 
Application Security
Application SecurityApplication Security
Application Security
 
Network security
Network securityNetwork security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Similar to Basics of Network Security

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
SusmitaSaha812194
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
KloudLearn
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdf
AyanMujawar2
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 

Similar to Basics of Network Security (20)

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Unit 7
Unit 7Unit 7
Unit 7
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Computer security
Computer securityComputer security
Computer security
 
Mitppt
MitpptMitppt
Mitppt
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Malicious
MaliciousMalicious
Malicious
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdf
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

More from Dushyant Singh

Traditional shopping (offline shop)
Traditional shopping (offline shop)Traditional shopping (offline shop)
Traditional shopping (offline shop)
Dushyant Singh
 
Apache Hadoop Architecture (2016-17)
Apache Hadoop Architecture (2016-17)Apache Hadoop Architecture (2016-17)
Apache Hadoop Architecture (2016-17)
Dushyant Singh
 
Technology impact on learning
Technology impact on learning Technology impact on learning
Technology impact on learning
Dushyant Singh
 
How ICT causing pollution in our environment
How ICT causing pollution in our environment How ICT causing pollution in our environment
How ICT causing pollution in our environment
Dushyant Singh
 
Visualization in 4th dimension ( The 4D concept)
 Visualization in 4th dimension ( The 4D concept)  Visualization in 4th dimension ( The 4D concept)
Visualization in 4th dimension ( The 4D concept)
Dushyant Singh
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
Dushyant Singh
 
E-voting
E-votingE-voting
E-voting
Dushyant Singh
 
Blue Brain Project
Blue Brain Project Blue Brain Project
Blue Brain Project
Dushyant Singh
 
Types of computers
Types of computers Types of computers
Types of computers
Dushyant Singh
 

More from Dushyant Singh (9)

Traditional shopping (offline shop)
Traditional shopping (offline shop)Traditional shopping (offline shop)
Traditional shopping (offline shop)
 
Apache Hadoop Architecture (2016-17)
Apache Hadoop Architecture (2016-17)Apache Hadoop Architecture (2016-17)
Apache Hadoop Architecture (2016-17)
 
Technology impact on learning
Technology impact on learning Technology impact on learning
Technology impact on learning
 
How ICT causing pollution in our environment
How ICT causing pollution in our environment How ICT causing pollution in our environment
How ICT causing pollution in our environment
 
Visualization in 4th dimension ( The 4D concept)
 Visualization in 4th dimension ( The 4D concept)  Visualization in 4th dimension ( The 4D concept)
Visualization in 4th dimension ( The 4D concept)
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
E-voting
E-votingE-voting
E-voting
 
Blue Brain Project
Blue Brain Project Blue Brain Project
Blue Brain Project
 
Types of computers
Types of computers Types of computers
Types of computers
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

Basics of Network Security

  • 2. DEFINITION ◈ The protection of information and its elements including systems, hardware that use, store and transmit the information. ◈ Computer facilities have been physically protected for three reasons: • To prevent theft of or damage to the hardware • To prevent theft of or damage to the information • To prevent disruption of service
  • 3. PRINCIPLES OF COMPUTER SECURITY ◈ Guarantee data CONFIDENT ◈Protect the information INTEGRITY ◈ Assure resources AVAILABILITY Ensuring that information is accessible only to those authorized to have access Safeguarding the accuracy and completeness of information and processing methods Ensuring that authorized users have access to information and associated assets when required
  • 4. PASSIVE Attacks ◈Passive attack attempts to learn or make use of information from the system but does not affect system resources. ◈Two types of passive attacks are release of message contents and traffic analysis. NETWORK SECURITY THREATS ACTIVE Attacks ◈ Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.
  • 7. VULNERABILITIES ◈Malicious Software 🔨  Trap Doors  Logic Bomb  Trojan Horses  Viruses  Worms & Bacteria
  • 8. Malicious Software ◈ Software deliberately designed to harm computer systems. ◈ Malicious software program causes undesired actions in information systems. ◈ Spreads from one system to another through: 1. E-mail (through attachments) 2. Infected Pen drives 3. Downloading / Exchanging of corrupted files 4. Embedded into computer games 🔨
  • 9. Trap Doors ◈ Secret undocumented entry point to the program.  An example of such feature is so called back door, which enables intrusion to the target by passing user authentication methods.  A hole in the security of a system deliberately left in place by designers or maintainers.  Trapdoor allows unauthorized access to the system.  Only purpose of a trap door is to "bypass" internal controls. It is up to the attacker to determine how this circumvention of control can be utilized for his benefit.
  • 10. Logic Bomb ◈ A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. ◈Piggybacking: Many viruses, worms, and other code that are malicious in nature, often carry a logic bomb that “detonates” under given conditions. This may help the code on it’s journey as it worms through your system undetected. 💣
  • 11. Trojan Horse ◈ This is a malicious program with unexpected additional functionality. It includes harmful features of which the user is not aware. Perform a different function than what these are advertised to do (some malicious action e.g., steal the passwords). Infects when user installs and executes infected programs. Some types of Trojan horses include Remote Access Trojans (RAT), Key Loggers, Password-Stealers (PSW), and logic bombs.
  • 12. Virus ◈ These are the programs that spread to other software in the system .i.e., program that incorporates copies of itself into other programs. Two major categories of viruses: 1. Boot sector virus : infect boot sector of systems. become resident. activate while booting machine 2. File virus : infects program files. activates when program is run.
  • 13. Worm /Bacteria ◈ Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. ◈ In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. ◈ worm is faster than virus. E.g. The code red worm affected 3 lack PCs in just 14 Hrs.
  • 14. Preventing infection by malicious software Use only trusted software, not pirated software. Regularly take backup of the programs. Use anti-virus software to detect and remove viruses. Update virus database frequently to get new virus signatures. Install firewall software, which hampers or prevents the functionality of worms and Trojan horses. Make sure that the e-mail attachments are secure.