Sei sulla pagina 1di 10

NETWORK SECURITY

GROUP MEMBERS NAME:


 SIDRA OMER(GROUP LEADER)-109
 ANUM ILYAS-144
 MEHAK MUSHTAQ-116
 HAIDER ALI-117
 Manahil-138
SUBMITTED TO:
Mam Nudrat Nida

SE (2C)
Network security for securing your systems
Mehak, Sidra omer, Minahil, Anum, Haider.
Department of Computer Engineering
COMSATS Institute of Information technology,
Wah campus
Pakistan

Abstract ___ Development of computer information used according to their demand and
network is growing very fast, for sharing and authorized user.
receiving information’s from all over the world. III. SECURITY THREATS:
Also it is rapidly growing area of interest due to There are three types of threats. Hostile attack is a
extension in networks development and
serious threat. There are two types of hostile attack.
weakness measures in that field . Software
First is initiative attack means destroy network &
system are increasingly assembled from
information. Other is passive attack means get
components that are buy from or purchase from
third parties for technical and economic gains. information secretly (illegal).Software leaks are two
Therefore lot of security issues appeared. This types one is made by propose, which is intently
paper also include the features of security designed to control system and the other one is
network , major security threats and issues faced accidentally made because of negligence. Computer
by computer networks . Also explanations of virus is a specially programmed computer process
popular security technology of Wi-Fi network is that can be copied and transmitted through various
discussed here. channels, such as disk, CD and computer network.
Keywords: Network security, Wi-Fi, Internet IV. PRECAUTION ON NETWORK
Vulnerabilities, ipV6 security protocol, issues
Countermeasures, Encryption and Authentication. SECURITY:
I. INTRODUCTION: There are various ways for the protection of network
security. Firewall Technology play a role between
When we are talking about network, the word
local and major network for the protection of
network security weigh more than any other
computer. Encryption Technology is used to protect
concept related to network. Also network security data, file, password and controlling information in
is a peak term that describes the terms of policies network. Access control technology use for network
and procedures implemented by network security precaution & protection. And sure that
administrator. Now we see the brief summary of Network resources will not be illegal used & access.
overall research papers which we study in team- Antivirus software is used to detect virus and
manner. automatically detect & delete virus. Authentication
II. COMPUTER NETWORK is usually used to access the network or networks to
provide services to identify the user before the
SECURITY: legality of identity. Many more technology will be
Computer network security provides Privacy, developed with the time and in future with the
integrity, facticity and availability. Privacy means complex threats engineers will be also able to
information will not be used to non-authorized develop stronger antivirus’s software’s.
users, Integrity means information cannot be lost
V. ISSUES FACED BY NETWORK :
and destroy. Facticity means to know about the
sender and receiver. Availability means that
There are certain issues for network security but • Availability of services:
there are given issues and solution of campus Information or services to ensure that when needed
network and Wi-Fi network. can be a normal visit.

• Confidential service:
A. Issues of campus network: To ensure that sensitive data or information will not
 Hacking be leaked or exposed to unauthorized entities.
 Computer destroying viruses.
• Integrity services:
 Attacks in internal environment.
To ensure that data is not the way to unauthorized
Solution of issues campus network: alteration or destruction.
 Using network firewall: use such software’s which • Identification:
can detect your pc when any problems occur.
The identity of an entity to provide the guarantee
 Virus preventative software’s: Today there are the legitimacy of.
many antiviruses software’s are made which are • Authorized:
updating day by day and hence save your system to
The use of system resources for the implementation
be attacked.
of control provisions, such as the visitor's access
 Using authentic system: This is also kinds of permissions.
software which are authentic in their nature to
detect problem automatically, if occur and resolve it.
VII. IMPLEMENTATION OF SECURITY:
Generated as a result of the early stage of the
B. Wi-Fi Network Security Issues: Internet has not been designed for the specific IP
There are certain issues.
security program, it is necessary to network security,
 The weakness of the WEP encryption services and products to improve the IP network,
mechanism: WEP is a security protocol that encrypt Internet Protocol in order to weaken the inherent
transmitted data for wireless network. WEP is easy security risks, and the following precautions.
to crack keys by someone else. Key management is VIII. NETWORK SECURITY MONITOR:
complex, use WEP keys need to accept an external This research is related to how attacker attack and
key management system of control. how you can monitor your system and thus made
 Search wireless signal attack: wireless signal is measures to keep check and balance on your
also a method of attacking wireless networks. Nets system.
tumbler software is software that is widely used to PHASES OF ATTACKER:
found a wireless network. Attacker basically attack on your system in three
Solution of issues Wi-Fi Network Security: phases.
 Analysis phase.
 Wireless signal spectrum expansion
 Attack phase.
technology: To increase frequency for the secure
 Post attack phase.
transmission of data. Spread spectrum sent a very
low power signal used in a very wide frequency
 ANALYSIS PHASE:
In this phase .attacker try to know that how well he
range of launch, and narrow-band radio-on the
can penetrate in your systems and how well he can
contrary; it put all the energy into a single frequency.
avoid from detection.in short we can say that
 WEP data encryption technology: WEP is the
actually attacker can judger the penalty power in this
most basic wireless IEEE802.11b protocol security phase .
encryption measures, its main purposes include  ATTACK PHASE:
providing access control and prevent unauthorized In this phase he attack on your system .e can
users from accessing the network. accessed you data directly or indirectly and used
them for illegal purpose. He can attack on your pc by
VI. NETWORK SECURITY SERVICE
making different logics and using IP addresses.
CLASSIFICATION:  POST_ATTACK PHASE:
The classification of security services and network In this phase, the effects will remains or signs are left
and authentication of network system: after attack .your system may slow down in his
working .this is due to reason that attacker may use your system memory.

IX. COMPARISON B/W LAN & WAN:


COMPARISI LAN WAN
ON
Stands Local Area Wide Area Network
for Network
Covers Local area only It covers large area comparatively
just like in home
etc.
Speed It has a faster Its speed is slow as compared to LAN
speed I-e. (150 mbps)
I-e. (1000 mbps)

Definitio It is a computer It is a computer network and covers large geographical area


n network and
covers small
area
Data high low
transfer
rate
Example Network within internet
a building
SECURITY It is more secure It is less secure because all the resources are not under the control due to large
because it all the geographical area.
resources are
under control.

How we  Verify that  Control all keys,


provide your  Encryption policies
security? network is  Control traffic integrity.
segmented  Crypto Flow WAN encryption ensures that data is safe from hackers and
 Make sure meet with privacy requirements.
that there is
a guest’s
network so
that
vendors
(Seller) can
be attached
to it if
needed.
 Setting
some type
of switch
security that
may disable
a port.
X. NETWORK SECURITY INCREASES SHOWING BY GRAPH:
XI. CONCLUSION:  Gong, Yishan, Guanghong Yue, and
Quansheng Xu. "Network Security and
With the rapid development of technology, network
Safety Precautions." Future Networks,
security technology has become a key point in
2010. ICFN'10. Second International
information network development. Network
Conference on. IEEE, 2010.
operating system security and database
 Purboyo, Tito Waluyo. "Methods for
management systems security and security is closely
strengthening a Computer network
integrated. The application must be tailored to
security." Rural Information &
specific needs of the environment matched analysis
Communication Technology and Electric-
and the development of various safety management
Vehicle Technology (rICT&ICeV-T), 2013
strategy to ensure network security. Combination of
Joint International Conference on. IEEE,
Technology and Management to build a secure
2013.
network.
 Peng, Haishen. "WIFI network Information
REFERENCES: security analysis research." 2012 2nd
 Wu, Cuihong. "The problems in campus International Conference on Consumer
network information security and its Electronics, Communications and Networks,
solutions." Industrial and Information CECNet, April. 2012.
Systems (IIS), 2010 2nd International  Heberlein, L. Todd, et al. "A network
Conference on. Vol. 1. IEEE, 2010. security monitor." Research in Security and
 Yan, Gao. "Computer Remote Control Privacy, 1990. Proceedings., 1990 IEEE
System of Network Security Computer Society Symposium on. IEEE,
Research." Intelligent Transportation, Big 1990.
Data and Smart City (ICITBS), 2015  Li,Fuguo. "Study on security and prevention
International Conference on. IEEE, 2015. strategies of computer network." Computer
 Wang, Jinhua, and Xiaodong Liu. "Computer Science and Information Processing (CSIP),
network security of university and 2012 International Conference on. IEEE,
preventive strategy." Communication 2012.
Software and Networks (ICCSN), 2011 IEEE  Yan, Fan, Yang Jian-Wen, and Cheng Lin.
3rd International Conference on. IEEE, "Computer Network Security and
2011. Technology Research." Measuring
 Yan-ping, Chen, Liu Dong-liang, and GuoRui. Technology and Mechatronics Automation
"Security and precaution on computer (ICMTMA), 2015 Seventh International
network." 2010 International Conference on Conference on. IEEE, 2015.
Future Information Technology and
Management Engineering.

Potrebbero piacerti anche