Jump to content

Welcome to AstaHost - Dear Guest , Please Register here to get Your own website. - Ask a Question / Express Opinion / Reply w/o Sign-Up!

Toggle shoutbox Shoutbox Open the Shoutbox in a popup

@  yordan : (21 April 2014 - 09:11 PM) Hey, Ritesh, Did You Hear Me?
@  yordan : (14 April 2014 - 05:28 PM) By The Way, This Could Be An Interesting Subject For A Topic, What About Posting This Question? Let's See If Other People Have The Same Feeling Concerning Bootlists!
@  yordan : (13 April 2014 - 09:36 AM) Boot Order : Cd, [Usb,] Hard Drive :D
@  yordan : (11 April 2014 - 07:23 PM) I Simply Let The Bios Do That
@  Ritesh : (11 April 2014 - 10:23 AM) Is It Possible To Launch Fedora Live Cd Or Installation Disk From Hard Drive On Windows Platform Using Grub Mbr File.
@  Ritesh : (11 April 2014 - 10:21 AM) No U Are Not.. Btw.. I Have Question For You.
@  yordan : (10 April 2014 - 08:02 AM) You Are Partially Right.
I Was Not.
Nevertheless, I Am Again :)
@  Ritesh : (09 April 2014 - 07:33 PM) :P
@  Ritesh : (09 April 2014 - 07:33 PM) I Think U R Not..
@  yordan : (09 April 2014 - 09:28 AM) I'm The Master Of The Shoutbox!
@  yordan : (05 April 2014 - 10:32 PM) He-He
@  Ritesh : (04 April 2014 - 06:59 PM) Ha Ha Ha ....
@  yordan : (04 April 2014 - 11:15 AM) Welcome Back, Starscream!
@  yordan : (03 April 2014 - 02:31 PM) And I Hope That He Will Come Back Soon :)
@  yordan : (01 April 2014 - 02:53 PM) Nice, Ritesh Came, I'm Not Home Alone Today.
@  Ritesh : (01 April 2014 - 08:51 AM) Oh!!! Poor Dear Yordan..
@  yordan : (31 March 2014 - 10:02 AM) I'm A Poor Lonesome Cow-Boy
@  yordan : (27 March 2014 - 02:22 PM) He Is Unpatient Due To His Patients!
@  Ritesh : (27 March 2014 - 10:46 AM) :(
@  Ritesh : (27 March 2014 - 10:46 AM) He Is Busy With His Patients.

- - - - -

Network Security Know the Lingo

No replies to this topic

#1 amitbhandari


    Member [ Level 1 ]

  • Members
  • 40 posts

Posted 22 April 2006 - 05:22 PM

The Internet arose out of the natural need of the worldwide to communicate, and has become the backbone of digital age. Now-a-days, the Net has reached to billions of individuals as against in the past when it was envisaged only for scientific community. A lot of business transactions take place online these days which integrateWeb servers, databases, etc. Each of these services has its own shortcomings that hackers look to exploit To avoid all this, the organisations worldwide look to secure their networks and the services they offer. As the existing technologies mature, and new technologies are invented, hackers refine their technology as well, making it more expensive and difficult to detect digital onslaughts. Vulnerability analyses, incident response, forensic analysis, cryptography and monitoring are some of the sub-areas under network security and have evolved as a result of the need for information security.

Vulnerabilities, threats and attacks
Although all these terms seems to be similar, in reality, they differ. A vulnerability is a weakness due to hardware or software shortcomings. A threat can be defined as anything that could cause damage or loss to the assets. The loss could be of any form - financial, a loss of reputation for an organisation, etc. Attacks are active entities. The attacker exploits vulnerabilities and attacks your services/networks.

The network attacks can be classified into various types. An attacker has to put in some groundwork before launching an attack. The groundwork includes identification of the hosts and the vulnerabilities that these hosts have. Later, the attacker uses the gathered information to launch attacks.

Before attacking the network/services, the attacker probes the network/hosts for vulnerabilities. These types of attacks are termed as reconnaissance attacks. For example, an attacker from external network tries to poll your network and to identify the live hosts in your network. Knowing the live hosts is not a big deal. As a next step, the attacker would collect information on various services running on each host. The attacker sends a request to all the ports, and if there is any positive response from the server, it means that the service is running; and if the response is negative, it means that service is not running using that particular port number. Most of the services like Web server, telnet server, SSH server, etc, run using standard port numbers that are pre-defined and standardised.

After getting to know the services running on the host, the next step is to attack the services running, using the vulnerabilities associated with each service. If the vulnerabilities are not properly patched, the host under attack could be compromised.

CIA - the secret
The principles of network/information security revolve around the seemingly simple abbreviation CIA; confidentiality, integrity and availability.

Confidentiality is keeping the resources confidential and not disclosing critical information to any third party not entitled to receiving the information.

Integrity is keeping the information intact by not letting others corrupt the data inappropriately. This includes marking the users with the right previleges require to modify/alter the data. Through integrity, we make sure that data is authentic and complete.

Availability is another area that is often overlooked. Availability is act of keeping the resources available when they are needed most. The resource that is not available when required is as bad as not present at all.

Also, asset is a resource that is of some value to you, and to your organisation. For example, for an organisation that has many online users, a Web server might be a critical resource. A security policy is a document that describes how your organisation will enforce security. It starts with asset identification. The second step is doing a risk analysis - possible risks might be Denial of Service (DoS) to authorised users, unauthorised access to the network/services by attackers, etc.


Reply to this topic


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users