Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SE (2C)
Network security for securing your systems
Mehak, Sidra omer, Minahil, Anum, Haider.
Department of Computer Engineering
COMSATS Institute of Information technology,
Wah campus
Pakistan
Abstract ___ Development of computer information used according to their demand and
network is growing very fast, for sharing and authorized user.
receiving information’s from all over the world. III. SECURITY THREATS:
Also it is rapidly growing area of interest due to There are three types of threats. Hostile attack is a
extension in networks development and
serious threat. There are two types of hostile attack.
weakness measures in that field . Software
First is initiative attack means destroy network &
system are increasingly assembled from
information. Other is passive attack means get
components that are buy from or purchase from
third parties for technical and economic gains. information secretly (illegal).Software leaks are two
Therefore lot of security issues appeared. This types one is made by propose, which is intently
paper also include the features of security designed to control system and the other one is
network , major security threats and issues faced accidentally made because of negligence. Computer
by computer networks . Also explanations of virus is a specially programmed computer process
popular security technology of Wi-Fi network is that can be copied and transmitted through various
discussed here. channels, such as disk, CD and computer network.
Keywords: Network security, Wi-Fi, Internet IV. PRECAUTION ON NETWORK
Vulnerabilities, ipV6 security protocol, issues
Countermeasures, Encryption and Authentication. SECURITY:
I. INTRODUCTION: There are various ways for the protection of network
security. Firewall Technology play a role between
When we are talking about network, the word
local and major network for the protection of
network security weigh more than any other
computer. Encryption Technology is used to protect
concept related to network. Also network security data, file, password and controlling information in
is a peak term that describes the terms of policies network. Access control technology use for network
and procedures implemented by network security precaution & protection. And sure that
administrator. Now we see the brief summary of Network resources will not be illegal used & access.
overall research papers which we study in team- Antivirus software is used to detect virus and
manner. automatically detect & delete virus. Authentication
II. COMPUTER NETWORK is usually used to access the network or networks to
provide services to identify the user before the
SECURITY: legality of identity. Many more technology will be
Computer network security provides Privacy, developed with the time and in future with the
integrity, facticity and availability. Privacy means complex threats engineers will be also able to
information will not be used to non-authorized develop stronger antivirus’s software’s.
users, Integrity means information cannot be lost
V. ISSUES FACED BY NETWORK :
and destroy. Facticity means to know about the
sender and receiver. Availability means that
There are certain issues for network security but • Availability of services:
there are given issues and solution of campus Information or services to ensure that when needed
network and Wi-Fi network. can be a normal visit.
• Confidential service:
A. Issues of campus network: To ensure that sensitive data or information will not
Hacking be leaked or exposed to unauthorized entities.
Computer destroying viruses.
• Integrity services:
Attacks in internal environment.
To ensure that data is not the way to unauthorized
Solution of issues campus network: alteration or destruction.
Using network firewall: use such software’s which • Identification:
can detect your pc when any problems occur.
The identity of an entity to provide the guarantee
Virus preventative software’s: Today there are the legitimacy of.
many antiviruses software’s are made which are • Authorized:
updating day by day and hence save your system to
The use of system resources for the implementation
be attacked.
of control provisions, such as the visitor's access
Using authentic system: This is also kinds of permissions.
software which are authentic in their nature to
detect problem automatically, if occur and resolve it.
VII. IMPLEMENTATION OF SECURITY:
Generated as a result of the early stage of the
B. Wi-Fi Network Security Issues: Internet has not been designed for the specific IP
There are certain issues.
security program, it is necessary to network security,
The weakness of the WEP encryption services and products to improve the IP network,
mechanism: WEP is a security protocol that encrypt Internet Protocol in order to weaken the inherent
transmitted data for wireless network. WEP is easy security risks, and the following precautions.
to crack keys by someone else. Key management is VIII. NETWORK SECURITY MONITOR:
complex, use WEP keys need to accept an external This research is related to how attacker attack and
key management system of control. how you can monitor your system and thus made
Search wireless signal attack: wireless signal is measures to keep check and balance on your
also a method of attacking wireless networks. Nets system.
tumbler software is software that is widely used to PHASES OF ATTACKER:
found a wireless network. Attacker basically attack on your system in three
Solution of issues Wi-Fi Network Security: phases.
Analysis phase.
Wireless signal spectrum expansion
Attack phase.
technology: To increase frequency for the secure
Post attack phase.
transmission of data. Spread spectrum sent a very
low power signal used in a very wide frequency
ANALYSIS PHASE:
In this phase .attacker try to know that how well he
range of launch, and narrow-band radio-on the
can penetrate in your systems and how well he can
contrary; it put all the energy into a single frequency.
avoid from detection.in short we can say that
WEP data encryption technology: WEP is the
actually attacker can judger the penalty power in this
most basic wireless IEEE802.11b protocol security phase .
encryption measures, its main purposes include ATTACK PHASE:
providing access control and prevent unauthorized In this phase he attack on your system .e can
users from accessing the network. accessed you data directly or indirectly and used
them for illegal purpose. He can attack on your pc by
VI. NETWORK SECURITY SERVICE
making different logics and using IP addresses.
CLASSIFICATION: POST_ATTACK PHASE:
The classification of security services and network In this phase, the effects will remains or signs are left
and authentication of network system: after attack .your system may slow down in his
working .this is due to reason that attacker may use your system memory.