Course Content
Detailed Content of Network Security
0/1
Network Security
About Lesson

Threats and Countermeasures:

Network security faces various threats, and countermeasures are implemented to mitigate these risks. Here are some common threats and corresponding countermeasures:

  • Information Gathering
  • Sniffing
  • Spoofing
  • Session Hijacking
  • Denial of Services

ATTACKS:

  1. Port Scanning: Probe a target’s network to identify open ports and services, providing insight into potential entry points.
  2. Social Engineering: Manipulate individuals into revealing sensitive information or credentials through psychological manipulation.
  3. Phishing: Send deceptive emails or messages to trick recipients into divulging confidential information or clicking on malicious links.
  4. Network Mapping: Identify network topology, devices, and services to plan targeted attacks or exploit vulnerabilities.
  5. Dumpster Diving: Physically search through discarded documents or trash to obtain sensitive information about a target organization.
COUNTERMEASURES:
  1. Access Controls: Implement strict access controls to limit access to sensitive information and resources based on the principle of least privilege.
  2. Encryption: Encrypt sensitive data in transit and at rest to prevent unauthorized access and protect confidentiality.
  3. Network Monitoring: Deploy intrusion detection and prevention systems (IDS/IPS) to monitor network traffic and detect suspicious reconnaissance activities.
  4. Privacy Settings: Configure privacy settings on social media platforms and other online accounts to limit the amount of publicly available information.
  5. Physical Security: Implement physical security measures such as surveillance cameras, access control systems, and visitor management to prevent unauthorized access to premises and sensitive areas.

Sniffing is the unauthorized interception and analysis of network traffic to capture sensitive information such as passwords, usernames, or other data transmitted over a network.

ATTACKS:

  1. Packet Sniffing: Monitoring network traffic to capture and analyze data packets containing sensitive information.
  2. Man-in-the-Middle (MitM): Intercepting communication between two parties to eavesdrop on or alter the data being transmitted.
COUNTERMEASURES:
  1. Encryption: Encrypting sensitive data before transmitting it over the network to prevent unauthorized interception.
  2. Use of Virtual Private Networks (VPNs): Employing VPNs to create secure, encrypted tunnels for transmitting data over public networks, protecting it from sniffing.
  3. Network Segmentation: Dividing the network into smaller segments with restricted access controls to limit the scope of sniffing activities.
  4. Network Monitoring: Deploying intrusion detection systems (IDS) and intrusion prevention systems (IPS) to detect and mitigate sniffing attempts in real-time.

Spoofing is when someone fakes or impersonates something or someone else, often to deceive or trick others for malicious purposes.

ATTACKS:

  1. Email Spoofing: Sending emails with forged sender addresses to impersonate a trusted source and trick recipients into divulging sensitive information or performing malicious actions.
  2. IP Spoofing: Manipulating the source IP address in packet headers to impersonate another system, enabling attackers to bypass authentication mechanisms or launch DoS attacks.
  3. Caller ID Spoofing: Falsifying caller ID information to display a different phone number, often used in phishing scams or vishing (voice phishing) attacks to deceive victims into providing personal information.
  4. DNS Spoofing: Modifying DNS records to redirect users to malicious websites or servers, allowing attackers to intercept sensitive information or distribute malware.
COUNTERMEASURES:
  1. Network Segmentation: Segmenting networks and implementing access controls to prevent unauthorized access and mitigate the impact of IP spoofing attacks.
  2. Encryption: Using encryption protocols such as SSL/TLS to secure communication channels and prevent data interception and manipulation.
  3. Network Monitoring: Deploying intrusion detection systems (IDS) and intrusion prevention systems (IPS) to detect and block spoofing attempts in real-time.
  4. Anti-Spoofing Filters: Configuring routers and firewalls to filter out packets with spoofed IP addresses, reducing the effectiveness of IP spoofing attacks.

Session hijacking is when an attacker takes control of a user’s active session on a computer system or network without their consent. This allows the attacker to impersonate the user and potentially access sensitive information or perform malicious actions using the user’s identity.

ATTACKS:

  1. Session Fixation: The attacker forces the user’s session identifier to a known value, allowing them to predict or control the session and gain unauthorized access.
  2. Session Sidejacking: The attacker eavesdrops on unencrypted communication between the user and the server, capturing session cookies to impersonate the user and hijack their session.
  3. Cross-Site Scripting (XSS): The attacker injects malicious scripts into web pages visited by the user, allowing them to steal session cookies and hijack the user’s session.

countermeasures:

  1. Encryption: Implementing SSL/TLS encryption to secure communication between the user and the server, preventing attackers from intercepting session data.
  2. Session Tokens: Using randomly generated and unique session tokens or cookies that expire after a short period or when the user logs out, reducing the window of opportunity for attackers to hijack sessions.
  3. IP Address Checking: Monitoring the IP address of the user during the session and terminating the session if the IP address changes abruptly, indicating a potential hijacking attempt.
  4. HTTP Strict Transport Security (HSTS): Enabling HSTS to enforce secure connections over HTTPS and prevent downgrade attacks that could lead to session hijacking.

e. Denial of Services: Denial of Service (DoS) is a cyber attack aimed at making a computer system or network resource unavailable to its intended users by flooding it with excessive traffic or requests, disrupting its normal operation.

ATTACKS:

  1. The inherent insecurity of the TCP/IP protocol suite.
  2. Weak routers and switch configuration.
  3. Unencrypted communication.
  4. Service software bugs.
COUNTERMEASURES:
  1. Network Filtering: Implementing access control lists (ACLs) or firewalls to filter out malicious traffic and block known attack sources.
  2. Intrusion Prevention Systems (IPS): Deploying IPS solutions to detect and block DoS attack patterns in real-time, preventing them from reaching the target.
  3. Load Balancing: Distributing incoming traffic across multiple servers or network resources to evenly distribute the load and prevent individual resources from becoming overwhelmed.