Network Security – Security Problems and Solutions, even after adhering to all types of security policies, various security issues can arise. This can lead to data loss, disruption of the entire network, or trafficking in your ebb. Now we know about various such problems.
This is most often the case in local area networks. Users or external cats in the corner of the network can steal important data from your network. The digital data feature makes it easy to copy and does not change the actual data. You can stop using removable or removable storage devices on different workstations on the network to prevent image copying. The first step is to remove or lock floppy drives from all workstations. The floppy drive can be disabled from the computer’s BIOS or a hardware lock can use. It is convenient to use a hardware lock. The administrator may have the key, the administrator may open it if necessary.
Your company may have employees who can pass on confidential company data to competitors. It does not have to be in digital format. Suppose you are submitting a tender somewhere. If someone tells your opponent the price you mentioned there, then you can lose in that tender. In order to smuggle this information, the user can look at the file only once and write down the amount of money on a piece of paper or memorize it.
There is no software or hardware solution to stop such data smuggling. For this, you have to rely on the honesty of the staff. To bring this honesty and fidelity can awaken a sense of morality in them.
This is another type of attack on the network. Someone may launch such an attack on your network in retaliation. Suppose I was the administrator of your network. You hired me to replace me for some reason. I don’t want to let you be happy for a moment now. I am carrying out various attacks every day to harass you. If you are not aware of these attacks, you will be killed in two days and you will have to leave. To find out what kind of attacks can come to your network.
We can divide the attacks on TCP / IP networks into two main categories: Denial of Service and Stealth attacks. The first type of attack is aimed at disabling your server or network, while the second type of attack is aimed at gathering, modifying, or deleting some information by entering the network. The details of the various attacks on the TCP / IP network are given below. [WHAT IS NETWORKING]
In the TCP / IP discussion, we learned that one computer sends a request to another computer during connection using TCP / IP. When the computer responds to that request, a connection is established between them. These messages before synchronization are synchronization messages known as SYN packets. Now if a computer sends an SYN packet to another computer that does not have its own address, then the destination recipient computer will not be able to reply to that SYN packet after receiving it.
If the sender’s computer continues to send SYN packets in this way, the recipient’s computer may go crazy. This is SYN flooding. This attack can disable any server or computer. In real life, you can be a victim of this attack. You just went to bed at the end of the day. At that time the phone rang. Quickly picked up the receiver, there was no response on the other end. Left the receiver.
It rang again, again that silence, left again. What would you do if it kept ringing for a few seconds? You may use your intellect to pick up the receiver of the phone or tear it off. But the computer can’t do that, so Kona loses control of the SYN packet at some point. Patches are used on many operating systems to prevent this attack. You must use this patch to avoid such attacks.
Ping of Death
TCP / IP uses the ping utility to test connectivity with other hosts. This is an important utility for troubleshooting on TCP / IP networks. Through ping, we send a specific size ICMP message to an IP address in the corner. When this message reaches the Host, the reply is available from there. This ping method is used in Ping of Death attacks. [NETWORK SECURITY]
In such an attack, ping messages are sent to the target computer by increasing the size of the ping packet. The maximum valid size of a ping packet is 65,536 bytes. When a large packet of it reaches a TCP / IP hast, the hast becomes crippled. Hopefully, patches have been created on various operating systems to prevent ping attacks. You can save yourself from this attack by applying these patches.
IP spoofing is one of the hallmarks of smuggling. Each TCP packet header flowing in the TCP / IP protocol contains the destination and source address. In an IP spoofing attack, someone monitors the arrival and departure of each data packet in the corner network until the IP address of the IP packet source is known. In this way, once the IP address of the machine is known in the inner corner of the firewall, it becomes easier for the attacker to connect to that machine.
IP spoofing attacks lead to illegal trafficking of information, so these attacks are quite deadly for sensor networks. IP spoofing can occur on almost all types of networks. This can prevent by using appropriate firewalls and proxy servers.
An attacker can send thousands of emails at once if he knows your e-mail address. The weight of this mail may cause your mail server to become useless or your mailbox quota to run out. Mailbox cannot receive new mail when the quota expires. It is not as deadly as other attacks. There are various tools available on the internet for such bombings.
Failure to take appropriate action against such attacks in a timely manner can lead to disaster in your network. So you need to check various files and logs regularly to see if anything unwanted is happening.