A Model for Network Security
A
Model for Network Security
Network Security
Network security refers
to the defensive measures and controls set in place to protect a computer
network's integrity and confidential data from unauthorised access, misuse,
malware and external threats. It focuses on securing the network
infrastructure, including all connected devices, applications, servers, data
storage systems, and the entire network's traffic flow.
It includes firewalls
that filter incoming and outgoing traffic, antivirus software to detect and
block malware, encryption to scramble and unscramble data as required, and
access control mechanisms such as credential requirements, permissions levels,
and device and user policies.
Robust network security measures
safeguard network availability and provide layered defences against a range of
cyber threats that can exploit vulnerabilities to breach networks and
steal critical data.
Network Security Model
A network security model
in computer networks refers to the structured defensive mechanisms and
protocols implemented to protect the integrity, confidentiality and
availability of data transmitted between devices over an interconnected system
of networks.
Its core purpose in
computer network security (CNS) is to transform plain text data into encrypted
ciphertext before sending it over the vulnerable network channel so that
potential attackers cannot decipher or make sense of the information.
When we send our data
from the source side to the destination side we have to use some transfer
method like the internet or any other communication channel by which we are
able to send our message. The two parties, who are the principals in this
transaction, must cooperate for the exchange to take place. When the transfer
of data happened from one source to another source some logical information
channel is established between them by defining a route through the internet
from source to destination and by the cooperative use of communication
protocols (e.g., TCP/IP) by the two principals. When we use the protocol for
this logical information channel the main aspect of security has come. who may
present a threat to confidentiality, authenticity, and so on. All the
techniques for providing security have two components:
1.A security-related
transformation on the information to be sent.
2.Some secret information
is shared by the two principals and, it is hoped, unknown to the opponent.
A trusted third party may
be needed to achieve secure transmission. For example, a third party may be
responsible for distributing the secret information to the two principals while
keeping it from any opponent. Or a third party may be needed to arbitrate
disputes between the two principals concerning the authenticity of a message
transmission. This model shows that there are four basic tasks in designing a
particular security service:
1.Design an algorithm for
performing the security-related transformation.
2.Generate the secret
information to be used with the algorithm.
3.Develop methods for the
distribution and sharing of secret information.
4.Specify a protocol to
be used by the two principals that make use of the security algorithm and the
secret information to achieve a particular security service.
An effective network security model in computer networks has
the following key aspects:
1.An encryption algorithm
encodes plaintext into ciphertext and decodes cypher text back into plain text.
The strength of the algorithm relies on its ability to withstand cracking
attempts by adversaries.
2.Secure generation,
distribution and usage of a secret key exclusively shared between the
communicating parties over the computer network. A trusted third party
facilitates the secret key exchange in the network security model in CNS.
3.Communication protocols
enable the application of the chosen encryption powered by the secretly shared
key to deliver security services like confidentiality, integrity and
authentication of the sender.
Additionally, a network
access security model in CNS focuses on protecting computer systems and network
resources from unauthorised access and cyber threats that can damage software,
steal data and disable services.
Intrusion detection
systems, firewalls and antivirus programs are some common controls that can be found
in network security models in computer networks.
What
are the Components of a Network Security Model?
A strong network security
model consists of layered components working together to safeguard the
confidentiality, integrity and availability of systems and data. The key
components that comprise an effective network security model include:
Firewalls: Firewalls monitor all incoming and
outgoing network traffic and stop viruses, hackers and DDoS assaults depending
on security standards. Firewalls provide perimeter security through traffic
filtering and block unauthorised access attempts.
Intrusion Prevention Systems (IPS):
IPS monitors traffic patterns to detect malicious activity, policy violations,
vulnerability exploits or threats that firewalls can miss. It can analyse
packet payloads and block attacks in real-time before the damage is done.
VPN: Virtual Private Networks (VPNs) enable
secure remote connections for teleworkers and road warriors and connect
distributed sites. VPNs create encrypted tunnels across public networks to
ensure data confidentiality and integrity.
Access Controls: Access controls
regulate access to networks and systems by implementing strict authentication,
authorisation and accounting. Methods like multi-factor authentication,
role-based access and device compliance enforcement ensure appropriate resource
access.
Data Encryption: Encrypting data secures
sensitive information from unauthorised access or modification attempts. It
scrambles data using encryption algorithms and keys, ensuring only parties with
decryption keys can read it.
Endpoint Security: Hardening endpoints via
antivirus software, strict access controls, and patching helps prevent malware,
unauthorised access and attacks targeting end users. It blocks threats from
entering networks through endpoints.
Network Monitoring: Continuous monitoring
using SIEM systems collects and analyses network activity logs to rapidly
detect potential attacks and anomalous behaviour indicative of a breach. It
enables threat visibility.
Incident Response Plans: Despite defences,
breaches can happen, so incident response plans prepare organisations to
respond appropriately to security events. Playbooks detailing roles,
responsibilities and actions are essential for effective breach containment.
A layered model covering
people, processes and technology focused on prevention, timely threat
detection, and minimising breach impacts provides in-depth defence against
cyber attacks that leverage network access.
Examples
of Successful Network Security Model Implementations
Organisations across
industries have implemented powerful network security models in computer
networks to safeguard their systems and data. Here are some real-world examples
of effective security model deployments:
Google - The tech giant uses a layered model
encompassing perimeter defences, strict access control, data encryption and
continuous monitoring. With a dedicated team handling threats, Google has
managed to prevent major breaches and ensure data protection.
Visa - The payments leader implements numerous
controls like application security, database encryption, DDoS protection and
fraud analytics. Stringent compliance with payment industry standards has
minimised risk exposure despite handling sensitive financial data.
DoD - The U.S. Department of Defense leverages
advanced tools for threat visibility, access management and endpoint security.
Together with ongoing employee training, the DoD limits attack surfaces despite
adversaries constantly attempting intrusions.
Apple - From secure hardware to encrypted data
transmissions, Apple prioritises building security into its products and
services. Its bug bounty program also allows reporting vulnerabilities for
responsible disclosure rather than exploitation.
AWS - Amazon Web Services adopts a shared
responsibility model to secure the cloud. With customer data separation,
DDoS-resistant infrastructure and regular patching, AWS ensures high
availability and integrity across its global cloud network.
The
Importance of Cryptography in Network Security Models
Strong network security
models extensively use cryptography and data encryption techniques to safeguard
confidential data against cyber attacks. Cryptography refers to securing
digital information and communications through code-making techniques.
It focuses on developing
schemes and protocols called cryptosystems to convert plain text data into
unintelligible ciphertext form and back again. A model for network security in
cryptography utilises cryptographic algorithms and protocols to provide
confidentiality, integrity, authentication and non-repudiation of data over
networks and systems.
Encryption algorithms
scramble data by combining it with randomly generated secret keys, ensuring
only authorised parties with the decryption keys can make sense of the
information. Decryption reverses the scrambling to
reveal original data.
Types
of Network Security Models
Network Access Control
(NAC)
NAC is a security
technique applied to computer networks at the most basic level. For example,
network administrators can grant full network access to users but restrict
access to specific confidential files or prevent their systems from connecting
to certain networks.
Antivirus and Antimalware Software
Antivirus and antimalware
software are specifically available to protect computer systems from various
types of malware and malicious software, including viruses, worms, ransomware,
and Trojans.
Virtual Private Networks (VPN)
VPNs help users establish
secure and reliable private connections between their computer or device
networks and other networks across the internet.
Firewall Protection
Firewalls act as defence
barriers between trusted internal networks and untrusted external networks,
such as viruses, worms, Trojans, and brute force attacks.
Zero Trust Network Access (ZTNA)
The Zero Trust security
model goes with the principle that a user should only be granted access and
permissions necessary to perform their duties. This contrasts with conventional
security solutions, such as VPNs, that provide users with complete access.
Application Security
Each device or software
product used in a networking environment has a potential entry point for
hackers. Application security involves using a combination of hardware,
software, and best practices to monitor potential security issues and address
vulnerabilities.
Email Security
Many threat vectors,
including scams, phishing, malware, and suspicious links, can be attached to or
incorporated into emails. Email security systems can be customised to block the
exchange of specific data types in reliable transmission and filter incoming
risks.
Other components or types
of network security models include Intrusion Detection and Prevention Systems
(IDPS), Unified Threat Management (UTM), Security Information and Event
Management (SIEM), Data Loss Prevention (DLP), Network Segmentation, etc.
A MODEL FOR NETWORK SECURITY
• A security-related
transformation on the information to be sent. Examples include the encryption
of the message, which scrambles the message so that it is unreadable by the
opponent, and the addition of a code based on the contents of the message,
which can be used to verify the identity of the sender.

• Some secret information
shared by the two principals and, it is hoped, unknown to the opponent. An
example is an encryption key used in conjunc-tion with the transformation to
scramble the message before transmission and unscramble
it on reception.
This general model shows
that there are four basic tasks in designing a particular security service:
1. Design an algorithm
for performing the security-related transformation. The algorithm should be
such that an opponent cannot defeat its purpose.
2. Generate the secret
information to be used with the algorithm.
3. Develop methods for the
distribution and sharing of the secret information.
4.Specify a protocol to
be used by the two principals that makes use of the security algorithm and the
secret information to achieve a particular security service.
You are well aware of the
attackers who attack your system that is accessible through the internet. These
attackers fall into two categories:
1. Hacker: The one who is only interested in
penetrating into your system. They do not cause any harm to your system they
only get satisfied by getting access to your system.
2. Intruders: These attackers intend to do damage
to your system or try to obtain the information from the system which can be
used to attain financial gain.
The attacker can place a
logical program on your system through the network which can affect the
software on your system. This leads to two kinds of risks:
a. Information threat: This kind of threats
modifies data on the user’s behalf to which actually user should not access.
Like enabling some crucial permission in the system.
b. Service threat: This kind of threat
disables the user from accessing data on the system.
Well, these kinds of
threats can be introduced by launching worms and viruses and may more like this
on your system. Attack with worms and viruses are the software attack that can
be introduced to your system through the internet.

Conclusion
Securing client data and
information is crucial; network security plays a significant role in achieving
this. A network security model ensures shared data is kept safe, protects
against viruses, and helps improve network performance by reducing overhead
costs and losses resulting from data breaches.
SUBMITTED BY:
Vivekanadhan S.(21USC030).
Arun Karthick S.(21USC032).
REVIEWED BY:
C R SHATHIVEL ,MCA.,M.Phil., Ph.D
Good Topic, Easy to Learn.
ReplyDeleteNice topic to learn in easy way
ReplyDeleteIt's easy to understand
ReplyDeleteEasy to learn and understand the concept
ReplyDeleteExcellent work and easy to understand.
ReplyDeleteEasy to learn and understand.
ReplyDeleteIt is helpful to take a reference in website
ReplyDeleteEasy to understand
ReplyDelete