{"id":244,"date":"2023-05-16T12:37:15","date_gmt":"2023-05-16T12:37:15","guid":{"rendered":"https:\/\/itnotes.apjsoftwares.com\/?p=244"},"modified":"2023-05-16T12:37:15","modified_gmt":"2023-05-16T12:37:15","slug":"network-security-issues","status":"publish","type":"post","link":"https:\/\/itnotes.apjsoftwares.in\/index.php\/2023\/05\/16\/network-security-issues\/","title":{"rendered":"Network Security issues"},"content":{"rendered":"\n<p>Network Security refers to the measures taken by any enterprise or organisation to secure its computer network and data using both hardware and software systems. This aims at securing the confidentiality and accessibility of the data and network. Every company or organisation that handles a large amount of data, has a degree of solutions against many cyber threats.<\/p>\n\n\n\n<p><strong>Types of Network Security:&nbsp;<\/strong><\/p>\n\n\n\n<p>The few types of network securities are discussed below :&nbsp;<\/p>\n\n\n\n<ol>\n<li><strong>Access Control:<\/strong><br>Not every person should have a complete allowance for the accessibility to the network or its data. One way to examine this is by going through each personnel\u2019s details. This is done through Network Access Control which ensures that only a handful of authorised personnel must be able to work with the allowed amount of resources.<br>&nbsp;<\/li>\n\n\n\n<li><strong>Antivirus and Anti-malware Software:<\/strong><br>This type of network security ensures that any malicious software does not enter the network and jeopardise the security of the data. The malicious software like Viruses, Trojans, and Worms is handled by the same. This ensures that not only the entry of the malware is protected but also that the system is well equipped to fight once it has entered.<br>&nbsp;<\/li>\n\n\n\n<li><strong>Cloud Security:<\/strong><br>Nowadays, a lot of organisations are joining hands with cloud technology where a large amount of important data is stored over the internet. This is very vulnerable to the malpractices that few unauthorised dealers might pertain. This data must be protected and it should be ensured that this protection is not jeopardised by anything. Many businesses embrace SaaS applications for providing some of their employees the allowance of accessing the data stored over the cloud. This type of security ensures creating gaps in the visibility of the data.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong>Cryptography&nbsp;<\/strong><\/p>\n\n\n\n<p>Cryptography refers to the science and art of transforming messages to make them secure and immune to attacks. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration but can also be used for user authentication.<\/p>\n\n\n\n<p><strong>Substitution Ciphers<\/strong><\/p>\n\n\n\n<p>A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols. If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns.&nbsp;<\/p>\n\n\n\n<p>The earliest known use of a substitution cipher and the simplest was by Julius Caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter standing 3 places further down the alphabet. e.g.,&nbsp;<\/p>\n\n\n\n<p>plain text : pay more money&nbsp;<\/p>\n\n\n\n<p>Cipher text: SDB PRUH PRQHB&nbsp;<\/p>\n\n\n\n<p><strong>Transposition Ciphers<\/strong><\/p>\n\n\n\n<p>A more complex scheme is to write the message in a rectangle, row by row, and read the message off, column by column, but permute the order of the columns. The order of columns then becomes the key of the algorithm.&nbsp;<\/p>\n\n\n\n<p>e.g., plaintext = meet at the school house&nbsp;<\/p>\n\n\n\n<p>Key = 4 3 1 2 5 6 7&nbsp;<\/p>\n\n\n\n<p>PT = m e e t a t t<\/p>\n\n\n\n<p>h&nbsp; e&nbsp; s&nbsp; c&nbsp; h&nbsp; o&nbsp; o&nbsp;<\/p>\n\n\n\n<p>l&nbsp; h&nbsp; o&nbsp; u&nbsp; s&nbsp; e&nbsp;<\/p>\n\n\n\n<p>CT = ESOTCUEEHMHLAHSTOETO&nbsp;<\/p>\n\n\n\n<p>A pure transposition cipher is easily recognized because it has the same letter frequencies as the original plaintext. The transposition cipher can be made significantly more secure by performing more than one stage of transposition. The result is a more complex permutation that is not easily reconstructed.&nbsp;<\/p>\n\n\n\n<p><strong>Two fundamental cryptographic principles<\/strong><\/p>\n\n\n\n<p><strong>1. Encryption<\/strong><\/p>\n\n\n\n<p>Encryption is to convert the data in some unreadable form. This helps in protecting the privacy while sending the data from sender to receiver. On the receiver side, the data can be decrypted and can be brought back to its original form. The reverse of encryption is called decryption. The concept of encryption and decryption requires some extra information for encrypting and decrypting the data. This information is known as a key. There may be cases when the same key can be used for both encryption and decryption while in certain cases, encryption and decryption may require different keys.<\/p>\n\n\n\n<p><strong>2. Authentication<\/strong><\/p>\n\n\n\n<p>Authentication ensures that the message originated from the originator claimed in the message. Suppose, Alice sends a message to Bob and now Bob wants proof that the message has been indeed sent by Alice. This can be made possible if Alice performs some action on a message that Bob knows only Alice can do.<\/p>\n\n\n\n<p><strong>3. Integrity<\/strong><\/p>\n\n\n\n<p>One problem that a communication system can face is the loss of integrity of messages being sent from sender to receiver. This means that Cryptography should ensure that the messages that are received by the receiver are not altered anywhere on the communication path. This can be achieved by using the concept of cryptographic hash.<\/p>\n\n\n\n<p><strong>4. Non Repudiation<\/strong><\/p>\n\n\n\n<p>What happens if Alice sends a message to Bob but denies that she has actually sent the message? Cases like these may happen and cryptography should prevent the originator or sender to act this way. One popular way to achieve this is through the use of digital signatures.<\/p>\n\n\n\n<p><strong>DES : <\/strong><strong>Data Encryption Standard<\/strong><\/p>\n\n\n\n<p>The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST).<\/p>\n\n\n\n<p>DES is an implementation of a Feistel Cipher. It uses a 16 round Feistel structure. The block size is 64-bit. DES has an effective key length of 56 bits, since 8 of the 64 bits of the key are not used by the encryption algorithm. General Structure of DES is depicted in the following illustration \u2212<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"670\" height=\"561\" src=\"https:\/\/itnotes.apjsoftwares.com\/wp-content\/uploads\/2023\/05\/image-46.png\" alt=\"\" class=\"wp-image-245\" srcset=\"https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-46.png 670w, https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-46-300x251.png 300w\" sizes=\"(max-width: 670px) 100vw, 670px\" \/><\/figure>\n\n\n\n<p>Since DES is based on the Feistel Cipher, all that is required to specify DES is \u2212<\/p>\n\n\n\n<ul>\n<li>Round function<\/li>\n\n\n\n<li>Key schedule<\/li>\n\n\n\n<li>Any additional processing \u2212 Initial and final permutation<\/li>\n<\/ul>\n\n\n\n<p><strong>Initial and Final Permutation<\/strong><\/p>\n\n\n\n<p>The initial and final permutations are straight Permutation boxes (P-boxes) that are inverses of each other. They have no cryptography significance in DES.&nbsp;<\/p>\n\n\n\n<p><strong>Round Function<\/strong><\/p>\n\n\n\n<p>The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-bit output.<\/p>\n\n\n\n<p><strong>Key Generation<\/strong><\/p>\n\n\n\n<p>The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key.&nbsp;<\/p>\n\n\n\n<p><strong>Digital Signature<\/strong><\/p>\n\n\n\n<p>The Digital Signature is a technique which is used to validate the authenticity and integrity of the message. We know that there are four aspects of security: privacy, authentication, integrity, and non-repudiation.<\/p>\n\n\n\n<p>The basic idea behind the Digital Signature is to sign a document. When we send a document electronically, we can also sign it. We can sign a document in two ways: to sign a whole document and to sign a digest.<\/p>\n\n\n\n<ul>\n<li>In Digital Signature, a public key encryption technique is used to sign a document. However, the roles of a public key and private key are different here. The sender uses a private key to encrypt the message while the receiver uses the public key of the sender to decrypt the message.<\/li>\n\n\n\n<li>In Digital Signature, the private key is used for encryption while the public key is used for decryption.<\/li>\n\n\n\n<li>Digital Signature cannot be achieved by using secret key encryption.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"806\" height=\"361\" src=\"https:\/\/itnotes.apjsoftwares.com\/wp-content\/uploads\/2023\/05\/image-48.png\" alt=\"\" class=\"wp-image-247\" srcset=\"https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-48.png 806w, https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-48-300x134.png 300w, https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-48-768x344.png 768w\" sizes=\"(max-width: 806px) 100vw, 806px\" \/><\/figure>\n\n\n\n<p>Digital Signature is used to achieve the following three aspects:<\/p>\n\n\n\n<ul>\n<li><strong>Integrity:<\/strong> The Digital Signature preserves the integrity of a message because, if any malicious attack intercepts a message and partially or totally changes it, then the decrypted message would be impossible.<\/li>\n\n\n\n<li><strong>Authentication:<\/strong> We can use the following reasoning to show how the message is authenticated. If an intruder (user X) sends a message pretending that it is coming from someone else (user A), user X uses her own private key to encrypt the message. The message is decrypted by using the public key of user A.&nbsp;<\/li>\n\n\n\n<li><strong>Non-Repudiation:<\/strong> Digital Signature also provides non-repudiation. If the sender denies sending the message, then her private key corresponding to her public key is tested on the plaintext. If the decrypted message is the same as the original message, then we know that the sender has sent the message.<\/li>\n<\/ul>\n\n\n\n<p><strong>Firewalls<\/strong><\/p>\n\n\n\n<p>A firewall is a network security device; it is a protective layer for the server that monitors and filters all the incoming and outgoing network traffic. It uses a set of rules to determine whether to allow or block a specific network traffic. Firewalls can prevent unauthorised use before reaching the servers. Firewalls can be hardware or software-based.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"531\" height=\"274\" src=\"https:\/\/itnotes.apjsoftwares.com\/wp-content\/uploads\/2023\/05\/image-47.png\" alt=\"\" class=\"wp-image-246\" srcset=\"https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-47.png 531w, https:\/\/itnotes.apjsoftwares.in\/wp-content\/uploads\/2023\/05\/image-47-300x155.png 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/figure>\n\n\n\n<p>To protect private networks and individual machines, a firewall can be employed to filter incoming or outgoing traffic based on a predefined set of rules known as firewall policies.<\/p>\n\n\n\n<p>Packet flowing through a firewall can have one of the following three outcomes \u2212<\/p>\n\n\n\n<ul>\n<li>Accepted \u2212 Permitted through the firewall.<\/li>\n\n\n\n<li>Dropped \u2212 Not allowed through with no indication of failure<\/li>\n\n\n\n<li>Rejected \u2212 Not allowed through accompanied by an attempt to inform the source that the packet was rejected.<\/li>\n<\/ul>\n\n\n\n<p>Types of Firewall<\/p>\n\n\n\n<ul>\n<li><strong>Packet Filters (Stateless Firewall)<\/strong> \u2212 In the packet filters, if a packet matches then the packet filters a set of rules and filters will drop or accept it.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>Stateful firewall filters<\/strong> \u2212 It is also known as a network firewall; this filter maintains a record of all the connections passing through. It can determine if a packet is either the start of a new connection or a part of an existing connection or is an invalid packet.<\/li>\n<\/ul>\n\n\n\n<p><strong>Application firewall <\/strong>\u2212 A web application firewall is used for HTTP applications. There are sets of rules that are applied to monitor or block data packets from HTTP network traffic. For example, these rules can help block cross-site scripting (XSS) and SQL injections.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Security refers to the measures taken by any enterprise or organisation to secure its&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/posts\/244"}],"collection":[{"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":1,"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/posts\/244\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/posts\/244\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/media?parent=244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/categories?post=244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itnotes.apjsoftwares.in\/index.php\/wp-json\/wp\/v2\/tags?post=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}