Date post: | 31-Dec-2015 |
Category: |
Documents |
Upload: | jemima-marsh |
View: | 215 times |
Download: | 0 times |
INTRODUCTION.
The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication and other applications.
WHAT IS WIRE-LESS NETWORK?
Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections—without requiring network or peripheral cabling.
Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks
TYPES OF WIRE-LESS NETWORK.
Wireless Personal Area Networks (WPAN)
Wireless local area networks (WLAN)
Wireless Wide Area Networks (WWAN)
WHY WE NEED SECURITY SYSTEM
when an unauthorized user gains access to the network and consumes network resources.
Malicious hackers, sometimes called crackers, are individuals who break into a system without authorization, usually for personal gain or to do harm.
WHY WE NEED SECURITY SYSTEM
Malicious code involves viruses,Trojan horses, logic bombs, or other unwanted software that is designed to damage files or bring down a system.
Different types of threats to network:
Application backdoors . Operating system bugs . E-mail bombs . Macros . Viruses . Spam . Trojan/key logger attacks.
Threats to network:
Application backdoors: Some programs have special features that
allow for backdoor or hidden access , that provides some level of access of data.
Operating system bugs: some operating systems Have backdoors
with insufficient security controls .
Threats to network:
E-mail bombs : An e-mail bomb is usually a personal attack .
Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages.
Macros: A script of commands that the application can run.
Hackers have taken advantage of this to create their
own macros that , depending on the application , can
destroy your data or crash your computer.
Threats to network:VIRSUSES: Probably the most well-known threat is
computer viruses . A virus is a small program that can copy itself
to other computers .
SPAM: spam is the electronic equivalent of mail.
TROJAN / KEY ATTACKS: Trojan is a tool which when installed in a system, can
be misused for malicious purposes by the attacker.
Network security can be done by various methods.
Virtual Private Network. Firewalls. Internet Protocol Security (IP Sec). AAA Server.
Virtual Private Network
(VPN). A virtual private network ( VPN ) is a way
to use a public telecommunication infrastructure.
In Internet , to provide remote offices or individual users with secure access to their organization's network.
The goal of a VPN is to provide the organization with the security , but at a much lower cost.
INTERNET FIREWALLS.
FireWallFireWall
A firewall provides a strong barrier between your private network and the Internet .
Set firewalls to restrict the number of open ports , what type of packets are passed and what are blocked .
INTERNET PROTOCOL SECURITY. (IP SEC) It provides enhanced security
features such as better encryption algorithms and more comprehensive authentication.
IP Sec can encrypt data between various devices , such as :
Firewall to server Server to PC
AAA Server. AAA (authentication , authorization and
accounting) When a request to establish a session
comes in from a dial up client ,the Request is proxies to the AAA server.
AAA then checks the following : Who you are (authentication) What you are allowed to do
(authorization) What you actually do (accounting)
CONCLUSION:
There is no gain saying the fact that SECURITY plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers.