Wednesday, February 11, 2026

UNIT 1 MJ–15 (Th):-(INFORMATION SECURITY) UNIT NAME :- INTRODUCTION TO NETWORK SECURITY


 




DR. AJAY KUMAR PATHAK 

ASSISTANT PROFESSOR

READ  ALL THE NOTES CHAPTER WISE   

SUBJECT : MJ–15 (Th):- INFORMATION SECURITY 

 FOR B. Sc. IT  SEM 6   F.Y.U.G.P. 

UNIT 1  :-         INTRODUCTION TO NETWORK  SECURITY


LEARN NOTES FROM HERE
PREPARED BY DR. AJAY KUMAR PATHAK 
                                ©Copyrights 
MJ–15 (Th):-
 INTRODUCTION TO NETWORK SECURITY   

Copyright © by Dr. Ajay kumar pathak

B. Sc. IT. SEMESTER 6 NOTES BASED ON NEP

SUBJECT : MJ–15 (Th): INTRODUCTION TO NETWORK SECURITY  

(To be selected by the students from)

Course Learning and Outcomes:- Know about the logics and algorithms needed for computer programming

UNIT 1:-  INTRODUCTION TO NETWORK SECURITY 

Objective: The objective of the course is to enable students to 

·   The objective of this course is to provide students with a comprehensive understanding of network security concepts and techniques. The course aims to develop students' skills in identifying network vulnerabilities, implementing security measures, and ensuring the confidentiality, integrity, and availability of networked systems. 

Learning Outcome:- After completion of this course, a student will be able to–

·         Understand the principles and concepts of network security.

·         Identify potential security threats and vulnerabilities in networked systems.

·         Implement security measures to protect network infrastructure.

·         Apply encryption and authentication techniques to secure network communication.

·         Analyze and respond to security incidents in networked environments

 





-:        NOTES READ FROM HERE           :-


UNIT- 1    :- INTRODUCTION TO NETWORK SECURITY

 

INTRODUCTION TO NETWORK SECURITY:-

Network security is the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft, malfunction, modification, destruction or improper disclosure. It involves creating a secure infrastructure for devices, applications, users, and applications to work in a secure manner.

The Internet has indeed become a huge part of our lives. Many people in today’s generation trust on the Internet for many of their professional, social and personal activities. But are you sure your network is secure?

There are many people who attempt to damage our Internet-connected computers, violate our privacy and make it impossible to the Internet services. Given the frequency and variety of existing attacks as well as the threat of new and more destructive future attacks, network security has become a central topic in the field of cybersecurity. Implementing network security measures allows computers, users and programs to perform their permitted critical functions within a secure environment.

Network security has several vital roles within an IT environment:

·         Prevent unauthorized access to assets and data.

·         Stop threats from spreading through the system.

·         Protect network data, infrastructure, and all traffic from external threats.

·         Grant users adequate access to resources.

·         Enable secure data sharing between systems and employees.

·         Detect and respond to suspicious user behavior and software anomalies.

 

What are the main network types?:-

Networks come in a variety of types. Security measures required vary depending on network configurations. Common variants include:

·         LAN – Local Area Networks or intranets are small community devices connected via one or more routing nodes. Router tools handle all network traffic and may also include internet interface modems. LAN networks can include many different devices. A LAN could feature computers, smartphones, printers, IoT devices, televisions, and gaming consoles. Routers assign IP addresses to all devices, which identify them on the network.

·         WAN – Wide Area Networks are more common in modern business. They constitute collections of LANs and cover wide geographical areas. For instance, companies with several branches will usually connect them via WAN technology. The internet itself is defined as a WAN. Every ISP is also technically a WAN.

·    SD-WAN – Software-defined Wide area networks are laid over WAN networks. Agents on connected devices link users to network resources. Managers can control access via secure gateways, and SD-WAN allows in-depth traffic monitoring. Companies also tend to use SD-WAN to secure cloud assets effectively.




Types of network security:-

(1)      Firewalls:- A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Cisco offers both threat-focused firewalls and unified threat management (UTM) devices.

(2)      NetWORK security:- NetWORK security is Cisco's vision for simplifying network, workload, and multicloud security by delivering unified security controls to dynamic environments.

(3)      Network segmentation:- Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated.

(4)      Workload security:- Workload security protects workloads moving across different cloud and hybrid environments. These distributed workloads have larger attack surfaces, which must be secured without affecting the agility of the business.

(5)      Access control:- Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block noncompliant endpoint devices or give them only limited access. This process is network access control (NAC).

(6)      VPN:- A virtual private network encrypts the connection from an endpoint to a network, often over the internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.

(7)      Anti-virus and anti-malware software:- "Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.

(8)      Application security:- Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. Unfortunately, any application may contain holes, or weaknesses, that attackers can use to infiltrate your network. Application security includes the hardware, software, and processes you use to close those holes.

(9)      Cloud security:- Cloud security is a broad set of technologies, policies, and applications applied to defend online IP, services, applications, and other imperative data. It helps you better manage your security by shielding users against threats anywhere they access the internet and securing.

(10)    Email security:- Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.

(11)    Mobile device security:- Cybercriminals are increasingly targeting mobile devices and apps. Within the next three years, 90 percent of IT organizations may support corporate applications on personal mobile devices. Of course, you need to control which devices can access your network. You will also need to configure their connections to keep network traffic private.

(12)    Web security:- A web security solution will control your staff's web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud. "Web security" also refers to the steps you take to protect your own website.

(13)    Wireless security:- Wireless networks are not as secure as wired ones. Without strict security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an exploit from taking hold, you need products specifically designed to protect a wireless network.



BASICS OF NETWORK SECURITY:-

Introduction:- Network Security refers to the set of rules, technologies, hardware, software, and procedures used to protect computer networks from unauthorized access, misuse, modification, destruction, and denial of service. It ensures that data remains safe while being stored or transmitted over a network.

In the modern digital world, computers are connected with each other through networks to share data, resources, and services. These networks may be small, such as a home network, or very large, such as the Internet. As networks grow, the risk of security threats like hacking, data theft, viruses, and unauthorized access also increases. To protect networks and the data transmitted through them, Network Security is required.

Meaning of Network Security:- Network Security is the process of protecting the integrity, confidentiality, and availability of data and network resources by preventing unauthorized access and cyber-attacks. It controls who can access the network, what actions they can perform, and how data is protected during transmission. In simple words, network security acts like a security system for a network, similar to locks, alarms, and guards used to protect a building.

Basic Principles of Network Security (CIA Triad):- In today’s digital era, computer networks play a vital role in communication, data sharing, online transactions, and information storage. With the rapid growth of networking and internet usage, security threats such as hacking, data theft, malware attacks, and unauthorized access have also increased. To protect networks and the information transmitted through them, strong network security mechanisms are required.

The foundation of network security is based on three fundamental principles known as the CIA Triad. CIA stands for Confidentiality, Integrity, and Availability. These three principles define the goals of network security and are essential for designing and implementing secure network systems. Any network that fails to maintain any one of these principles is considered insecure.

(1)      Confidentiality

(2)      Integrity

(3)      Availability

 

(1)      CONFIDENTIALITY:- Confidentiality refers to the protection of information from unauthorized access, disclosure, or exposure. It ensures that sensitive data is accessed only by authorized users, devices, or systems and remains hidden from unauthorized individuals.

In simple words, confidentiality means keeping information secret and private so that only the intended person can see or use it.

Explanation:- When data is transmitted over a network, it may pass through multiple intermediate devices such as routers, switches, gateways, and servers. During this process, attackers may attempt to intercept the data using techniques like packet sniffing or man-in-the-middle attacks. If confidentiality is not ensured, attackers can read confidential information such as passwords, bank details, personal records, or business secrets.

Network security mechanisms are used to protect data by converting it into an unreadable form or by restricting access to authorized users only. Even if an attacker intercepts the data, confidentiality ensures that the information cannot be understood or misused.

Examples of Confidentiality :-

(1)      Online Banking:-  When a user logs into an online banking system, the username, password, and transaction details are encrypted. This ensures that only the bank server and the authorized user can read the data.

(2) Email Communication:- Confidential emails sent within an organization are protected using encryption so that unauthorized persons cannot read sensitive documents.

(3)      Password Protection:- Access to a network is restricted using usernames and passwords to maintain confidentiality.

Techniques Used to Maintain Confidentiality in Network Security:-

1.      Data encryption

2.      User authentication systems

3.      Access control policies

4.      Secure communication protocols such as HTTPS and SSL

 

(1) Data Encryption:- Data encryption is the process of converting readable data (called plaintext) into an unreadable or coded form (called ciphertext) using a mathematical algorithm and a secret key. Only authorized users who possess the correct decryption key can convert the data back into readable form. In simple words, encryption locks the data so that unauthorized users cannot understand it.

Example 1:- Online Banking, When a customer enters login credentials on a banking website, the data is encrypted before transmission. Even if a hacker intercepts the data, it appears as random characters and cannot be read.

Example 2: WhatsApp Messages, Messages sent through WhatsApp are encrypted so that only the sender and receiver can read them.

(2)        User Authentication Systems:- User authentication is the process of verifying the identity of a user before allowing access to a network or system. It ensures that only legitimate users can access confidential data. In simple words, authentication answers the question:“Who are you?”

Example 1: Email Login, When a user logs into an email account, the system verifies the username and password. Without correct credentials, access is denied.

Example 2: Two-Factor Authentication (2FA), After entering a password, the user receives an OTP on their mobile phone. Only after entering the OTP is access granted.

(3)      Access Control Policies:- 
Access control policies define who can access what resources in a network and what actions they are allowed to perform. It ensures that users access only the data they are authorized to use. In simple words, access control decides permissions.

 
Example 1: College Network, Students can view their marks, Teachers can upload marks, Administrators can modify records

 
Example 2: Office Network, Employees can access project files, Managers can approve , documents, IT administrators can manage servers

(4)      Secure Communication Protocols (HTTPS and SSL):- 
Secure communication protocols protect data transmitted over networks by encrypting communication between client and server. The most common secure protocols are HTTPS (Hypertext Transfer Protocol Secure) and SSL (Secure Sockets Layer). In simple words, these protocols secure data while it is traveling over the network.

Example 1: Secure Websites, Websites with “https://” and a lock symbol in the browser use HTTPS and SSL to protect login details and payment information.

Example 2: Online Shopping, When customers enter credit card details on e-commerce websites, HTTPS encrypts the data to prevent theft.


(2)      INTEGRITY:- Integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that information is not altered, modified, or destroyed in an unauthorized manner during storage or transmission. In simple words, integrity means data should remain correct and unchanged unless modified by an authorized user.

Explanation:- During data transmission, information can be changed either accidentally due to transmission errors or intentionally by attackers. Unauthorized modification of data can lead to serious consequences such as incorrect records, financial loss, or wrong decision-making. Integrity mechanisms ensure that any change in data is detected and that only authorized users can modify the data.

If data integrity is compromised, the system may process incorrect information, which can damage the credibility of the network.

Examples of Integrity :-

(1)      Online Examination System:- When a student submits exam answers online, integrity ensures that the answers are not modified by any attacker during transmission.

(2)      Online Money Transfer:- If a user transfers Rs. 5,000 to another account, integrity ensures that the amount is not changed to Rs. 50,000 during transmission.

(3)      Database Records:- Student marks stored in a university database must remain accurate and unchanged unless updated by an authorized administrator.

Techniques Used to Maintain Integrity:-

1.      Hash functions

2.      Digital signatures

3.      Checksums

4.      Message authentication codes (MAC)

 

(1)      Hash Functions:- A hash function is a mathematical algorithm that converts data of any size into a fixed-length value, known as a hash value or message digest. Even a small change in the original data results in a completely different hash value. In simple words, a hash function creates a digital fingerprint of data.

Example 1: File Download, When you download software from a website, a hash value (such as SHA-256) is provided. After downloading, your system calculates the hash value of the file. If the two hash values match, it confirms that the file has not been altered.

Example 2: Online Examination, Exam answers submitted by a students are hashed before transmission. If the data is altered, the hash value at the server will differ, indicating a loss of integrity.




(2)      Digital Signatures:- A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message. It ensures that the data has not been altered and confirms the identity of the sender. In simple words, a digital signature is like a handwritten signature in electronic form.

Example 1: Online Contracts, Digital signatures are used to sign online agreements. Any change in the document invalidates the signature, ensuring integrity.

Example 2: Government Documents, Digital signatures are used in income tax filing systems to ensure documents are not altered.

(3)      Checksums:- A checksum is a simple mathematical value calculated from the data and used to detect errors or changes during transmission. In simple words, a checksum is a basic integrity check value.

Example 1: Data Transmission, When data packets are transmitted over a network, checksums help detect transmission errors.

Example 2: File Transfer, If a file is corrupted during download, the checksum value changes, indicating data corruption.

(4)      Message Authentication Codes (MAC):- A Message Authentication Code (MAC) is a cryptographic value used to ensure data integrity and authenticity. It is generated using a secret key and a message. In simple words, MAC ensures that data comes from a trusted sender and is not modified.

Example 1: Secure Network Communication, MAC is used in secure communication protocols to verify that messages have not been altered.

Example 2: Banking Systems, MAC ensures that financial transaction messages are not modified.

 

   

(3)      AVAILABILITY:- Availability ensures that network systems, services, and data are accessible to authorized users whenever required. It focuses on maintaining uninterrupted access to resources even in the presence of failures or attacks. In simple words, availability means the system should always be operational and usable.

Explanation:- Even if confidentiality and integrity are well maintained, a network becomes useless if authorized users cannot access it. Availability can be affected by hardware failures, software crashes, natural disasters, or cyber-attacks such as Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. Network security measures ensure that systems remain available and continue functioning under such conditions. Availability is especially important for critical services such as banking, healthcare, education, and government systems.

Examples of Availability:-

(1)      University Admission Portal:- During online admissions, the university website must remain accessible to thousands of students. If the server crashes due to an attack, availability is lost.

(2)      Online Banking Services:-Customers should be able to access banking services at any time. Server downtime affects availability.

(3)      Hospital Systems:- Medical records and systems must be available 24/7 for patient care.

Techniques Used to Maintain Availability:-

1.      Backup servers and systems

2.      Data backups and recovery plans

3.      Load balancing

4.      Protection against DoS and DDoS attacks


(1)      Backup Servers and Systems:- Backup servers and systems are additional servers or hardware systems that are kept ready to take over operations when the primary system fails. In simple words, backup servers act as standby systems.

Example 1: Banking System, Banks use backup servers to ensure that ATM and online banking services remain available even if the main server fails.

Example 2: University Website, If a university admission portal crashes due to high traffic, a backup server takes over and keeps the website running.

(2)      Data Backups and Recovery Plans:-Data backups involve creating copies of important data and storing them in a secure location. A recovery plan defines the steps required to restore data and systems after a failure or attack. In simple words, this technique ensures that data can be recovered if something goes wrong.

Example 1: Hospital Records, Hospitals back up patient records regularly. If the system crashes, data can be restored quickly without affecting patient care.

Example 2: Office Files, Companies back up their data daily so that work can continue even after system failure.

(3)      Load Balancing:- Load balancing is the process of distributing network traffic evenly across multiple servers to prevent overload. In simple words, load balancing shares the workload.

Example 1: E-Commerce Website, During festival sales, millions of users access shopping websites. Load balancing ensures smooth service by distributing traffic across multiple servers.

Example 2: Online Examination System, During online exams, load balancing helps manage thousands of students accessing the system simultaneously.

(4)      Protection Against DoS and DDoS Attacks:- A Denial of Service (DoS) attack attempts to make a system unavailable by overwhelming it with fake traffic.

A Distributed Denial of Service (DDoS) attack uses multiple compromised systems to launch a large-scale attack.

Example 1: Government Websites, Government portals are often targeted by DDoS attacks. Security mechanisms ensure that legitimate users can still access services.

Example 2: Online Gaming Platforms, Gaming servers use DDoS protection to ensure uninterrupted gameplay.

 

SECURITY THREATS AND VULNERABILITIES:-

 

SECURITY THREATS :- Cyber security threats are malicious acts designed to steal or destroy sensitive data, compromise computer systems or identities, disrupt or damage business operations, and in general, disturb digital life. Common types of cyber threats include malware, ransomware, denial of service (DoS), and SQL injection attacks.

Another meaning of the term cyber threats refers to the potential for successful cyberattacks on organizations. This is also known as the attack surface. For example, any computing system that has a known security vulnerability (weakness) is exposed to imminent cyber threats. To address threats and security weaknesses, both present and future, many organizations are adopting practices and technologies for advanced threat protection.

Cyber threats are performed by a variety of threat actors, both inside and outside an organization. Threat actors can include individual hackers, organized cybercrime groups, state sponsored hacks, hacktivists (who attack in the name of a social cause), and malicious insiders who abuse their privileges to access an organization’s computing systems.


Types of Security Threats and How to Protect Against Them :-

Types of Security Threats:-

1.      Malware Attacks

2.      Phishing and Social Engineering

3.      Data Breaches

4.      Denial of Service (DoS) Attacks

5.      Man-in-the-Middle (MitM) Attacks

6.      Insider Threats

7.      IoT Vulnerabilities

8.      Password Attacks

9.      E-commerce and Online Transaction Risks

10.  Identity Theft and Fraud


(1)      Malware Attacks:- Malware, short for malicious software, takes various forms, including viruses, worms, Trojans, and ransomware. These programs are designed to infiltrate systems, steal data, or disrupt operations. Malware often spreads through infected emails, websites, or software downloads.

Types of Malware:

ü  Viruses: Attach themselves to legitimate programs and spread when those programs are executed.

ü  Worms: Self-replicating programs that spread across networks without user interaction.

ü  Trojans: Deceptive software that appears legitimate but performs malicious actions.

ü  Ransomware: Encrypts user data and demands payment for its release.

Prevention and Mitigation:-

·         Keep software and systems up to date.

·         Use reputable antivirus and antimalware software like McAfee, NortonLifeLock, or Trend Micro.

·         Be cautious when clicking on links or downloading files from unknown sources.

(2)      Phishing and Social Engineering:- Phishing is a tactic where attackers impersonate legitimate entities to deceive individuals into revealing sensitive information, such as passwords or credit card numbers. Social engineering exploits human psychology to manipulate victims into taking actions that benefit the attacker.

Common Phishing Techniques:-

ü  Spear Phishing: Targets specific individuals with tailored messages.

ü  Whaling: Targets high-profile individuals, like CEOs or government officials.

ü  Baiting: Offers something enticing in exchange for personal information.

Protection Strategies:-

·         Be skeptical of unsolicited emails.

·         Verify the legitimacy of websites before entering credentials.

·         Educate employees about phishing techniques.




(3)      Data Breaches:-  A data breach occurs when unauthorized parties gain access to sensitive information. Breaches can lead to identity theft, financial fraud, and reputational damage for individuals and organizations.

Causes of Data Breaches:

ü  Weak passwords and lack of proper authentication.

ü  Unpatched software vulnerabilities.

ü  Insider negligence or malicious intent.

Mitigation Measures:

·         Encrypt sensitive data.

·         Implement multi-factor authentication.

·         Regularly update and patch software.

(4)      Denial of Service (DoS) Attacks:- DoS attacks overwhelm a system or network with excessive traffic, causing services to become unavailable. This can lead to financial losses, downtime, and tarnished reputation.

Types of DoS Attacks:

ü  TCP SYN Flood: Exploits the TCP handshake process.

ü  Ping Flood: Overwhelms the target with ICMP echo request packets.

ü  Distributed DoS (DDoS): Coordinated attack from multiple sources.

Defensive Tactics:

·         Use firewalls and intrusion detection systems.

·         Partner with a content delivery network (CDN) to absorb traffic spikes.

(5)      Man-in-the-Middle (MitM) Attacks:- MitM attacks involve intercepting communications between two parties without their knowledge. Attackers can eavesdrop, alter, or inject malicious content into the communication flow.

Common MitM Scenarios:

ü  Unsecured public Wi-Fi networks.

ü  Tampered hardware or software.

ü  Compromised routers or switches.

Preventive Steps:

·         Use secure, encrypted connections (HTTPS).

·         Regularly update and secure networking equipment.

·         Employ VPNs (Virtual Private Networks) for secure browsing on public networks.

(6)      Insider Threats:- Insider threats originate from within an organization and can be either malicious or unintentional. Malicious insiders exploit their access for personal gain, while unintentional threats stem from human error.

Forms of Insider Threats:

ü  Sabotage or theft by disgruntled employees.

ü  Accidental data exposure due to negligence.

Mitigating Insider Threats:

ü  Implement strict access controls.

ü  Conduct regular security awareness training.

ü  Monitor user activity for suspicious behavior.

(7)      IoT Vulnerabilities:- The Internet of Things (IoT) encompasses interconnected devices that communicate over the internet. Vulnerabilities (weakness) in IoT devices can expose users to privacy breaches and unauthorized access.

IoT Security Challenges:

·         Lack of robust security measures in many IoT devices.

·         Vulnerable firmware and lack of regular updates.

Securing IoT Devices:

·         Change default passwords.

·         Update device firmware regularly.

·         Segment IoT devices from critical networks.

(8)     Password Attacks:- Password attacks involve attempts to gain unauthorized access by exploiting weak passwords. Attackers can use techniques like brute force and dictionary attacks to crack passwords.

Protecting Passwords:-

·         Use strong, unique passwords for each account.

·         Enable multi-factor authentication (MFA) whenever possible.

·         Employ password managers to securely store passwords.

9. E-commerce and Online Transaction Risks:- Online shopping and financial transactions are convenient but also expose users to various risks, including fraudulent websites, fake payment gateways, and stolen financial information.

Online Transaction Security:

·         Ensure the website uses HTTPS encryption.

·         Verify the legitimacy of online merchants.

·         Use secure payment methods like credit cards with fraud protection.

10. Identity Theft and Fraud :- Identity theft involves stealing someone’s personal information for financial gain. Cybercriminals use stolen identities to commit fraud, open accounts, and make unauthorized transactions.

Preventive Measures:-

·         Monitor your financial accounts and credit reports for suspicious activity.

·         Shred sensitive documents before disposing of them.

·         Use identity theft protection services to detect and respond to threats.


SECURITY VULNERABILITIES:-

A security vulnerability is any unintended characteristic of a computing component that can be easily exploited by a threat actor. It is a weakness or flaw (A flaw is unintended functionality. This may either be a result of poor design or through mistakes made during implementation. Flaws may go undetected for a significant period of time.) in a system, network, or software application that can potentially harm your entire IT infrastructure. These vulnerabilities can range from software bugs to weak authentication mechanisms.

Vulnerabilities can also affect government agencies, industry, and critical infrastructure, such as power or water-treatment plants, local and federal government agencies, hospitals, banking institutions, and more. A successful attack against any of these entities could be catastrophic, resulting in massive data breaches or even injuries and death.

Causes of Software Vulnerabilities:-

1.      Lack of input validation

2.      Unverified uploads

3.      Cross-site scripting

4.      Unencrypted data, etc.

Type of Vulnerabilities:-

(1)        Hardware Vulnerability:- Weaknesses or flaws in physical devices (like computers or routers) that hackers can exploit to gain unauthorized access or cause damage.

For example:-

(a)        Physical Attacks:- Hardware devices like servers, laptops, or smartphones are susceptible to physical attacks. Attackers may gain access to critical systems by stealing or tampering with hardware.

(b)        Firmware Vulnerabilities: The software that runs on hardware, known as firmware, can have vulnerabilities. Flaws in firmware can lead to persistent attacks, as they are not always detected or patched as frequently as software.

Causes of Hardware Vulnerability:-

(a)        Old version of systems or devices

(b)        Unprotected storage

( c)       Unencrypted devices, etc.

 

(2)        Software Vulnerability:- Flaws or bugs in software (such as apps or operating systems) that can be used by hackers to compromise the system, often due to coding mistakes or outdated software.

For example:

(a)        Unpatched Software:-  One of the most common vulnerabilities is the failure to install security updates or patches. Software vendors frequently release updates to address security flaws, and neglecting to apply these patches can leave systems open to exploitation.

(b)        Weak Authentication:- Many systems trust on weak authentication methods such as simple passwords or unencrypted login forms, which can be exploited by attackers to gain unauthorized access.

Causes of Software Vulnerabilities:-

(a)        Lack of input validation

(b)        Unverified uploads

( c)       Cross-site scripting

(d)       Unencrypted data, etc.



(3)        Network Vulnerability:- A network vulnerability is a weakness or flaw in the design, implementation, or configuration of a computer network that attackers can exploit to gain unauthorized access, steal data, or disrupt services. These vulnerabilities can exist in hardware (routers, switches), software (servers, protocols), or network configurations.

For example:-

(a)        Unsecured Wireless Networks:- Wi-Fi networks that are not properly secured with strong passwords or encryption can be easily accessed by attackers. Once inside the network, an attacker can intercept communications, gain access to devices, or launch attacks against connected systems.

(b)        Open Ports:- Unnecessary or open ports on a device can serve as gateways for attackers to exploit. Proper configuration of firewalls is essential to ensure only necessary ports are open and accessible.

 

Causes of Network Vulnerability:-

(a)        Unprotected communication

(b)        Malware or malicious software (e.g.:Viruses, Keyloggers, Worms, etc)

(c )       Social engineering attacks

(d)       Misconfigured firewalls

 (4)        Human Vulnerabilities:- Security risks caused by human behavior, such as falling for phishing attacks, using weak passwords, or not being aware of security threats, making it easier for hackers to exploit the system.

For Example:-

(a)        Social Engineering:- Human behavior is often the weakest link in cyber security. Attackers use social engineering tactics to manipulate individuals into disclosing confidential information or performing actions that compromise security. Phishing, baiting, and pretexting are common social engineering methods.

(b)        Lack of Security Awareness:- A lack of training and awareness about cyber security best practices can leave individuals and organizations vulnerable to attacks. Users may fail to recognize phishing emails or may click on malicious links without thinking.

 (5)        Procedural Vulnerability:- Weaknesses in the processes or rules organizations follow, like using default passwords or failing to monitor activities, which can allow attackers to bypass security.

For example:-

(a)        Default Configurations:- Many devices, applications, and systems come with default settings that are not optimized for security. Leaving these defaults unchanged, such as using default administrator passwords, can provide attackers with an easy way into the system.

(b)        Inadequate Logging and Monitoring:- Failure to implement adequate logging and monitoring can prevent organizations from detecting unauthorized access or malicious activities in a timely manner. A lack of monitoring can allow an attacker to maintain persistent access without detection.

 

SECURITY CONTROLS AND DEFENSE MECHANISMS:-

Security controls are parameters implemented to protect various forms of data and infrastructure important to an organization. Security controls refer to any type of safeguard or countermeasure used to avoid, detect, counteract or minimize security risks to physical property, information, computer systems or other assets. Security controls are countermeasures or safeguards used to reduce the chances that a threat will exploit a vulnerability (weakness).

Security controls help organizations comply with regulations and standards, ensuring business continuity and safeguarding organizational assets. Properly implemented, these controls manage risk by preventing unauthorized access, data breaches, and other cyber threats. They form the backbone of an organization’s approach to building a secure operational environment, laying the groundwork for monitoring and incident response strategies.

 TYPES OF SECURITY CONTROLS:-

There are three main types of IT security controls including:-

(1)        Physical           (2)        Technical         (3) Administrative      

 (1)        Physical Controls:- Physical controls are tangible protections implemented to safeguard hardware and facilities from unauthorized access or damage. These include barriers such as locks, fences, biometrics, surveillance systems, and guards. Their primary function is to prevent physical intrusion that could lead to data breaches or equipment theft. These controls are essential in controlling access to sensitive areas, ensuring that only authorized personnel can reach critical infrastructure components.

Physical controls play a role in disaster recovery planning by safeguarding backup systems and maintaining continuity during power outages or natural disasters. Environmental monitoring systems also fall under this category, protecting assets from temperature fluctuations, humidity, and other conditions that might compromise equipment integrity.

Examples of physical controls are:-

·         Closed-circuit surveillance cameras

·         Motion or thermal alarm systems

·         Security guards

·         Picture IDs

·         Locked and dead-bolted steel doors

·         Biometrics (includes fingerprint, voice, face, iris, handwriting, and other automated methods used to recognize individuals)

(2)        Technical Controls:- Technical controls use technology to protect information systems and networks from cyber threats. These include tools like firewalls, encryption, antivirus software, intrusion detection systems, and access controls. They automate the process of monitoring and responding to cyber threats, managing the vast volume of data and potential vulnerabilities (weakness). Technical controls are often the first line of defense in identifying and mitigating threats.

Technical controls adapt to new threats, often through regular updates and patches that address known vulnerabilities. This adaptability is crucial, especially in environments experiencing rapid technological changes or facing sophisticated cyber-attacks. Continual assessment and fine-tuning are necessary to maintain the efficacy of these technical measures.

Examples of technical controls include:-

·         Encryption

·         Antivirus And Anti-Malware Software

·         Firewalls

·         Security Information And Event Management (SIEM)

·         Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)



(3)        Administrative Controls:- Administrative controls involve policies, procedures, and practices that manage the security framework within an organization. These include security policies, training programs, access management, and risk assessments designed to guide personnel on best practices for data protection. Administrative controls set the organizational tone, influencing the security culture and ensuring compliance through structured oversight.

Administrative controls are critical for incident response planning and executing regular security audits. They establish roles and responsibilities, ensuring everyone understands their part in maintaining security. By emphasizing employee training and devotion to security policies, these controls reduce human error and improve the overall effectiveness of security measures.

The processes that monitor and enforce the administrative controls are:-

·         Management controls:-           The security controls that focus on the management of risk and the management of information system security.

·         Operational controls:-             The security controls that are primarily implemented and executed by people (as opposed to systems).

 

(4)        Cloud security:- It is controls include measures that you take in cooperation with a cloud services provider to offer the necessary protection for data and workloads. If your organization runs workloads on the cloud, you must meet their corporate or business policy security requirements and industry regulations.

 

CYBER SECURITY- DEFENSE MECHANISM:-

BASIC DEFENSE MECHANISM:-

(1)        Anti-Viruses/Anti-Malware/Anti-Spyware:- Malwares are malicious software or piece of code, that damages our system. Anti- Viruses or Anti-Malwares are a type of utility used for scanning and removing viruses from your computer. The definition of the viruses are uploaded into the antivirus software’s database, and the program scans the database for potential theft and filters them out of the system.

(2)        Biometric Security:- Our biometrics are unique and it is something that we are and can’t be taken from us by any means. So, it is one of the best possible way to secure our data as no one in the world except us can open or unlock our data. Of course, there are ways to forge our biometrics, but it requires lots of resources and skills which is not easily accessible to every attackers.

(3)        Multifactor Authentication:- It uses more than authentication factor to ensure maximum security to our data.

Most common authentication factors are:-

(a)        Something we have[OTP, Decryption Key, etc]

(b)        Something we know[Passcode, Password, etc]

(c )       Something we are[Biometrics]

(4)        Cryptography:- It is a method of changing a plain text into a cipher text using different encryption algorithm, so that if there is a breach in confidentiality, the attacker cannot decipher the text, as they do not possess the decryption key.

Cryptography + Cryptanalysis = Cryptology



(a)        Symmetric Key Cryptography:- The key for the encryption and decryption is same and it is known as secret key. Some common Symmetric key algorithm are: AES, DES, IDEA, RC4

(b)        Asymmetric Key Cryptography:- The key for encryption and decryption are different. Both the sender and receiver have a private [Both Sender and Receiver has different Private Key] and public key[Same for everyone]. The keys are combined together to form the encryption and decryption key. Some common algorithm for asymmetric key encryption are: RSA, ECC.

Applications of Cryptography are:-

·         Authentication /  Digital Signature.

·         Password Protection.

·         PGP (Pretty Good Privacy), SMIME- Email Security.

·         IPSec, SSL & TLS.

·         Encrypting File Systems.

 

(5)        Firewalls:- Firewall is a security system that monitors the incoming and outgoing traffic based on the predetermined security rules. It is like a semipermeable wall between a client and the server or internet. It filters out all the untrusted network from accessing the client’s data.

Types of firewalls:-

(i)         Packet-Filtering Firewalls: It filters the packets that are incoming and outgoing the system.

(ii)        Circuit-Level Gateways:- A circuit-level gateway is a type of firewall. Circuit-level gateways work at the session layer of the OSI model, or as a “shim-layer” between the application layer and the transport layer of the TCP/IP stack. They monitor TCP handshaking between packets to determine whether a requested session is legitimate.

(iii)       Stateful Inspection Firewall:- In computing, a stateful firewall is a network-based firewall that individually tracks sessions of network connections traversing it. Stateful packet inspection, also referred to as dynamic packet filtering, is a security feature often used in non-commercial and business networks.

(iv)       Application-Level Gateway(Proxy Firewalls):- An application-proxy firewall is a server program that understands the type of information being transmitted — for example, HTTP or FTP. It functions at a higher level in the protocol stack than do packet-filtering firewalls, thus providing more opportunities for the monitoring and control of accessibility.

(v)        Next-Gen Firewalls:- A next-generation firewall is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functions, such as an application firewall using in-line deep packet inspection, an intrusion prevention system.

 

Critical Defense Mechanism:-

(1)        Risk Management:- To understand risk, we need to first understand, vulnerability and threat. Vulnerability is the weakness of a system. The exploitation of a system’s vulnerability is known as threat. So, after knowing vulnerability and threat, the formula of risk stands out to be:

Risk = Known Vulnerability + Possible Threat

The process of reducing risk is known as risk management.

The risk management process include:-

(i)         Identification of Risks

(ii)        Risk Assessment steps are:-

Step 1: Determine Information Value

Step 2: Identify and Prioritize Assets

Step 3: Identify Threats

Step 4: Identify Vulnerability

Step 5: Analyze controls and implement new controls

Step 6: Calculate the likelihood and impact of various Scenarios on a per year basis.

Step 7: Prioritize risks based on the cost of prevention vs information value.

Step 8: Document results in risk assessment report

(iii)       Risk Mitigation Plans:- plans are

·         Risk Acceptance

·         Risk Transfer

·         Risk Avoidance

·         Risk Reduction

(iv)       Implementation and Monitoring

(v)        Review and Update Risks

 

(2)        Security Control:- The particular mechanisms implemented in order to mitigate the risk, in order to implement security into the system is known as security control.

(9)        Incidence Response:- Security incidence is an event that complies that the particular system might be compromised.

(i)         Incidence Response Plan:-

·         Preparation

·         Identification

·         Containment

·         Eradication

·         Recovery

·         Lessons Learned

(ii)        Digital Forensics:-

·         Identification

·         Preservation

·         Collection

·         Analyze

·         Documentation

(iii)       Backup and Recovery:-

 

 THE END, UNIT-1 (  INTRODUCTION TO NETWORK SECURITY )






No comments:

Post a Comment

PLEASE DO LEAVE YOUR COMMENTS

UNIT 5 SOFTWARE TESTING (UNIT NAME) :- TEST AUTOMATION TOOLS AND EMERGING TRENDS

  DR. AJAY KUMAR PATHAK  ASSISTANT PROFESSOR READ  ALL THE NOTES CHAPTER WISE   MINOR PAPER   SUBJECT NAME:-   MN–2C (Th):- SOFTWARE TESTING...