A Model for Network Security

 

                                 A Model for Network Security

 

Network Security

Network security refers to the defensive measures and controls set in place to protect a computer network's integrity and confidential data from unauthorised access, misuse, malware and external threats. It focuses on securing the network infrastructure, including all connected devices, applications, servers, data storage systems, and the entire network's traffic flow.

It includes firewalls that filter incoming and outgoing traffic, antivirus software to detect and block malware, encryption to scramble and unscramble data as required, and access control mechanisms such as credential requirements, permissions levels, and device and user policies.

Robust network security measures safeguard network availability and provide layered defences against a range of cyber threats that can exploit vulnerabilities to breach networks and steal critical data.

 

Network Security Model

A network security model in computer networks refers to the structured defensive mechanisms and protocols implemented to protect the integrity, confidentiality and availability of data transmitted between devices over an interconnected system of networks.

Its core purpose in computer network security (CNS) is to transform plain text data into encrypted ciphertext before sending it over the vulnerable network channel so that potential attackers cannot decipher or make sense of the information.

 

When we send our data from the source side to the destination side we have to use some transfer method like the internet or any other communication channel by which we are able to send our message. The two parties, who are the principals in this transaction, must cooperate for the exchange to take place. When the transfer of data happened from one source to another source some logical information channel is established between them by defining a route through the internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals. When we use the protocol for this logical information channel the main aspect of security has come. who may present a threat to confidentiality, authenticity, and so on. All the techniques for providing security have two components:

1.A security-related transformation on the information to be sent.

2.Some secret information is shared by the two principals and, it is hoped, unknown to the opponent.

A trusted third party may be needed to achieve secure transmission. For example, a third party may be responsible for distributing the secret information to the two principals while keeping it from any opponent. Or a third party may be needed to arbitrate disputes between the two principals concerning the authenticity of a message transmission. This model shows that there are four basic tasks in designing a particular security service:

 

1.Design an algorithm for performing the security-related transformation.

2.Generate the secret information to be used with the algorithm.

3.Develop methods for the distribution and sharing of secret information.

4.Specify a protocol to be used by the two principals that make use of the security algorithm and the secret information to achieve a particular security service.

 

An effective network security model in computer networks has the following key aspects:

 

1.An encryption algorithm encodes plaintext into ciphertext and decodes cypher text back into plain text. The strength of the algorithm relies on its ability to withstand cracking attempts by adversaries.

2.Secure generation, distribution and usage of a secret key exclusively shared between the communicating parties over the computer network. A trusted third party facilitates the secret key exchange in the network security model in CNS.

3.Communication protocols enable the application of the chosen encryption powered by the secretly shared key to deliver security services like confidentiality, integrity and authentication of the sender.

Additionally, a network access security model in CNS focuses on protecting computer systems and network resources from unauthorised access and cyber threats that can damage software, steal data and disable services.

Intrusion detection systems, firewalls and antivirus programs are some common controls that can be found in network security models in computer networks.

 

What are the Components of a Network Security Model?

A strong network security model consists of layered components working together to safeguard the confidentiality, integrity and availability of systems and data. The key components that comprise an effective network security model include:

 

Firewalls: Firewalls monitor all incoming and outgoing network traffic and stop viruses, hackers and DDoS assaults depending on security standards. Firewalls provide perimeter security through traffic filtering and block unauthorised access attempts.

Intrusion Prevention Systems (IPS): IPS monitors traffic patterns to detect malicious activity, policy violations, vulnerability exploits or threats that firewalls can miss. It can analyse packet payloads and block attacks in real-time before the damage is done.

VPN: Virtual Private Networks (VPNs) enable secure remote connections for teleworkers and road warriors and connect distributed sites. VPNs create encrypted tunnels across public networks to ensure data confidentiality and integrity.

Access Controls: Access controls regulate access to networks and systems by implementing strict authentication, authorisation and accounting. Methods like multi-factor authentication, role-based access and device compliance enforcement ensure appropriate resource access.

Data Encryption: Encrypting data secures sensitive information from unauthorised access or modification attempts. It scrambles data using encryption algorithms and keys, ensuring only parties with decryption keys can read it.

Endpoint Security: Hardening endpoints via antivirus software, strict access controls, and patching helps prevent malware, unauthorised access and attacks targeting end users. It blocks threats from entering networks through endpoints.

Network Monitoring: Continuous monitoring using SIEM systems collects and analyses network activity logs to rapidly detect potential attacks and anomalous behaviour indicative of a breach. It enables threat visibility.

Incident Response Plans: Despite defences, breaches can happen, so incident response plans prepare organisations to respond appropriately to security events. Playbooks detailing roles, responsibilities and actions are essential for effective breach containment.

A layered model covering people, processes and technology focused on prevention, timely threat detection, and minimising breach impacts provides in-depth defence against cyber attacks that leverage network access.

Examples of Successful Network Security Model Implementations

Organisations across industries have implemented powerful network security models in computer networks to safeguard their systems and data. Here are some real-world examples of effective security model deployments:

 

Google - The tech giant uses a layered model encompassing perimeter defences, strict access control, data encryption and continuous monitoring. With a dedicated team handling threats, Google has managed to prevent major breaches and ensure data protection.

Visa - The payments leader implements numerous controls like application security, database encryption, DDoS protection and fraud analytics. Stringent compliance with payment industry standards has minimised risk exposure despite handling sensitive financial data.

DoD - The U.S. Department of Defense leverages advanced tools for threat visibility, access management and endpoint security. Together with ongoing employee training, the DoD limits attack surfaces despite adversaries constantly attempting intrusions.

Apple - From secure hardware to encrypted data transmissions, Apple prioritises building security into its products and services. Its bug bounty program also allows reporting vulnerabilities for responsible disclosure rather than exploitation.

AWS - Amazon Web Services adopts a shared responsibility model to secure the cloud. With customer data separation, DDoS-resistant infrastructure and regular patching, AWS ensures high availability and integrity across its global cloud network.

 

The Importance of Cryptography in Network Security Models

Strong network security models extensively use cryptography and data encryption techniques to safeguard confidential data against cyber attacks. Cryptography refers to securing digital information and communications through code-making techniques.

 

It focuses on developing schemes and protocols called cryptosystems to convert plain text data into unintelligible ciphertext form and back again. A model for network security in cryptography utilises cryptographic algorithms and protocols to provide confidentiality, integrity, authentication and non-repudiation of data over networks and systems.

 

Encryption algorithms scramble data by combining it with randomly generated secret keys, ensuring only authorised parties with the decryption keys can make sense of the information. Decryption reverses the scrambling to reveal original data.

 

Types of Network Security Models

Network Access Control (NAC)

NAC is a security technique applied to computer networks at the most basic level. For example, network administrators can grant full network access to users but restrict access to specific confidential files or prevent their systems from connecting to certain networks.

 

Antivirus and Antimalware Software

Antivirus and antimalware software are specifically available to protect computer systems from various types of malware and malicious software, including viruses, worms, ransomware, and Trojans.

 

Virtual Private Networks (VPN)

VPNs help users establish secure and reliable private connections between their computer or device networks and other networks across the internet.

 

Firewall Protection

Firewalls act as defence barriers between trusted internal networks and untrusted external networks, such as viruses, worms, Trojans, and brute force attacks.

 

Zero Trust Network Access (ZTNA)

The Zero Trust security model goes with the principle that a user should only be granted access and permissions necessary to perform their duties. This contrasts with conventional security solutions, such as VPNs, that provide users with complete access.

 

Application Security

Each device or software product used in a networking environment has a potential entry point for hackers. Application security involves using a combination of hardware, software, and best practices to monitor potential security issues and address vulnerabilities.

 

Email Security

Many threat vectors, including scams, phishing, malware, and suspicious links, can be attached to or incorporated into emails. Email security systems can be customised to block the exchange of specific data types in reliable transmission and filter incoming risks.

Other components or types of network security models include Intrusion Detection and Prevention Systems (IDPS), Unified Threat Management (UTM), Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Network Segmentation, etc.

 

A MODEL FOR NETWORK SECURITY

• A security-related transformation on the information to be sent. Examples include the encryption of the message, which scrambles the message so that it is unreadable by the opponent, and the addition of a code based on the contents of the message, which can be used to verify the identity of the sender.

• Some secret information shared by the two principals and, it is hoped, unknown to the opponent. An example is an encryption key used in conjunc-tion with the transformation to scramble the message before transmission and unscramble it on reception.

This general model shows that there are four basic tasks in designing a particular security service:

 

1. Design an algorithm for performing the security-related transformation. The algorithm should be such that an opponent cannot defeat its purpose.

2. Generate the secret information to be used with the algorithm.

3. Develop methods for the distribution and sharing of the secret information.

4.Specify a protocol to be used by the two principals that makes use of the security algorithm and the secret information to achieve a particular security service.

 

You are well aware of the attackers who attack your system that is accessible through the internet. These attackers fall into two categories:

 

1. Hacker: The one who is only interested in penetrating into your system. They do not cause any harm to your system they only get satisfied by getting access to your system.

 

2. Intruders: These attackers intend to do damage to your system or try to obtain the information from the system which can be used to attain financial gain.

 

The attacker can place a logical program on your system through the network which can affect the software on your system. This leads to two kinds of risks:

 

a. Information threat: This kind of threats modifies data on the user’s behalf to which actually user should not access. Like enabling some crucial permission in the system.

 

b. Service threat: This kind of threat disables the user from accessing data on the system.

 

Well, these kinds of threats can be introduced by launching worms and viruses and may more like this on your system. Attack with worms and viruses are the software attack that can be introduced to your system through the internet.

 

Network Access Security Model

Conclusion

Securing client data and information is crucial; network security plays a significant role in achieving this. A network security model ensures shared data is kept safe, protects against viruses, and helps improve network performance by reducing overhead costs and losses resulting from data breaches.

SUBMITTED BY:

    Vivekanadhan S.(21USC030).

     Arun Karthick S.(21USC032).

REVIEWED BY:

          C R SHATHIVEL ,MCA.,M.Phil., Ph.D

Comments

Post a Comment

Popular posts from this blog

DISPLAY CONTROLLER

multiple inheritance

Constructors and Destructors in c++