[go: up one dir, main page]

0% found this document useful (0 votes)
5 views6 pages

Computer Security Note 3

Network traffic is the flow of data across a network, consisting of data packets sent between devices. Monitoring network traffic is essential for performance, security, and resource utilization, utilizing tools like network monitoring software and packet analysis tools. Additionally, vulnerability assessments identify and prioritize security weaknesses in IT systems, helping organizations improve their security posture.

Uploaded by

5rr4xtpvcj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views6 pages

Computer Security Note 3

Network traffic is the flow of data across a network, consisting of data packets sent between devices. Monitoring network traffic is essential for performance, security, and resource utilization, utilizing tools like network monitoring software and packet analysis tools. Additionally, vulnerability assessments identify and prioritize security weaknesses in IT systems, helping organizations improve their security posture.

Uploaded by

5rr4xtpvcj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

NETWORK TRAFFIC

Network traffic refers to the amount of data moving across a computer network at any given
time, broken down into packets and transmitted between devices.

Network traffic, also known as data traffic, is the flow of information (data) across a network,
from one device to another.

Data Packets: This data is broken down into smaller segments called data packets, which are then
sent over the network and reassembled by the receiving device.

Examples of network traffic: sending emails, browsing the web, downloading files, streaming
videos, and more.

Monitoring of network traffic can be monitored to understand how much bandwidth is being
used, identify performance issues, and detect potential security threats. Understanding and
managing network traffic is crucial for ensuring network performance, security, and efficient
resource utilization.

To monitor your network, you can use various tools and methods. These include network
monitoring software, packet analysis tools, and hardware monitoring solutions. By utilizing these
tools, you can track network traffic, identify performance issues, and ensure network security.

Breakdown of how to monitor your network

1. Network Monitoring Software: These tools provide real-time visibility into your network
infrastructure, allowing you to track key metrics like bandwidth usage, latency, and packet loss.

Examples: SolarWinds, PRTG, Nagios, Wireshark, and various cloud-based monitoring services.

Benefits: Helps identify bottlenecks, troubleshoot issues, and optimize network performance.

2. Packet Analysis Tools: These tools capture and analyze individual data packets flowing
through your network, allowing you to identify potential security threats and analyze network
behavior in detail.

Examples: Wireshark, Network Monitor (Windows), and various open-source tools.

Benefits: Provides a granular view of network traffic, helping you identify malicious activity and
troubleshoot specific issues.

3. Hardware Monitoring: Monitors the performance and health of your network devices, such
as routers, switches, and access points.

Method: Utilizes protocols like Simple Network Management Protocol (SNMP) to gather data
from network devices.
Benefits: Helps identify hardware issues early, ensuring the reliability and performance of your
network infrastructure.

4. Other Methods: Network Traffic Analysis: Analyzing flow data (e.g., NetFlow) and packet
data to understand network usage patterns and identify potential security issues.

User Activity Monitoring: Tracking user behavior on the network to identify unusual patterns or
potential security breaches.

Firewall Logs: Reviewing firewall logs to identify blocked traffic and potential security threats.

Centralized Logging: Collecting and analyzing logs from various network devices and
applications to gain a comprehensive view of network activity.

5. Key Metrics to Monitor:

Bandwidth Usage: Tracks how much data is being transmitted across your network.

Latency: Measures the time it takes for data to travel across the network, impacting application
performance.

Packet Loss: Identifies data packets that are lost during transmission, impacting network
reliability.

CPU and Memory Usage: Monitors the performance of your network devices.

Disk Space: Tracks the storage capacity of your network devices.

System Uptime: Ensures the availability of your network devices.

6. Steps to Implement Network Monitoring:

1. Identify Network Components and Data Sources: Determine which devices, applications, and
users you need to monitor.

2. Set Monitoring Goals: Define what you want to achieve with network monitoring (e.g.,
optimize performance, improve security).

3. Choose and Deploy Monitoring Tools:Select the appropriate tools based on your needs and
budget.

4. Set Up Monitoring Rules: Configure alerts and thresholds to notify you of potential issues.

5. Collect and Analyze Traffic Data: Gather data from your chosen tools and analyze it to
identify trends and anomalies.
6. Respond to Monitoring Alerts: Take action based on the alerts you receive to address potential
issues.

7. Refine and Improve Monitoring: Continuously evaluate and improve your monitoring strategy
to ensure it's effective.

By implementing a comprehensive network monitoring strategy, you can ensure the


performance, security, and reliability of your network infrastructure.

Network analysis involves studying the relationships between entities (nodes) and their
connections (edges) within a network to understand its structure, function, and dynamics. It can
be applied to various fields like social networks, infrastructure, and information flow. Key steps
include defining the network, mapping relationships, identifying key players or influencers, and
analyzing the network's overall structure and dynamics.

Steps:

1. Define the Network: Clearly identify the entities (nodes) and the types of relationships (edges)
you want to analyze. For example, in a social network, nodes could be individuals, and edges
could be friendships or social connections.

2. Map the Network: Represent the network visually or mathematically, often using a diagram or
a matrix. This helps visualize the connections and relationships between entities.

3. Analyze Network Structure:

Centrality Measures: Identify key nodes or influential individuals within the network. This can
be done using metrics like degree centrality (number of connections), between centrality (how
often a node lies on the shortest path between other nodes), and closeness centrality (how close a
node is to all other nodes).

Density: Calculate the proportion of actual connections compared to the total possible
connections. This provides an overview of the network's connectivity.

Clustering Coefficient: Measure the tendency of a node's neighbors to be connected to each


other, indicating the presence of clusters or groups within the network.

Modularity: Assess how well the network can be divided into distinct modules or communities
based on the density of connections within and between them.

Further Studies on NIDS

What is Network Intrusion Detection System (NIDS)? - it is a security tool that detects,
monitors, and analyses traffic for suspicious activity or malicious attacks.
What it does: NIDS continuously monitors network traffic, looking for patterns that deviate from
established norms or match known attack signatures.

How it works: NIDS systems typically deploy sensors at strategic points within the network,
analyzing inbound and outbound traffic.

Detection methods:

Signature-based detection: This method relies on predefined databases of known attack


signatures to identify malicious activity.

Anomaly-based detection: This approach analyzes network traffic for deviations from
established baselines, detecting unusual behaviors that might indicate a threat.

Alerting and Response: When NIDS detects suspicious activity, it alerts administrators or
security teams, allowing for timely investigation and response.

Benefits: NIDS provides early warning of potential intrusions, helping organizations to


strengthen security measures and prevent breaches.

Network intrusion detection systems are used to detect suspicious activity to catch hackers
before damage is done to the network. There are network-based and host-based intrusion
detection systems. Host-based IDSes are installed on client computers; network-based IDSes are
on the network itself.

COMPUTER NETWORK VULNERABILITY

A vulnerability assessment is a systematic process to identify, classify, and prioritize security


weaknesses (vulnerabilities) within an organization's IT systems, network, and applications. It
helps organizations understand their security posture and make informed decisions about where
to focus resources to improve security.

Vulnerability Assessment:

Identification: identifying potential vulnerabilities through various methods like automated


scanning tools, manual audits, and penetration testing.

Classification: Categorizing vulnerabilities based on severity (e.g., critical, high, medium, low)
and potential impact.

Prioritization: Ranking vulnerabilities based on their risk (severity and likelihood of exploitation)
to focus on the most critical issues first.

Remediation: Implementing measures to fix identified vulnerabilities, such as patching software,


updating configurations, or implementing compensating controls.
Continuous Monitoring: Regularly conducting vulnerability assessments and monitoring for new
vulnerabilities and threats to maintain a strong security posture.

Why is vulnerability assessment important?

Proactive Security: Identifies vulnerabilities before they can be exploited by attackers

Risk Reduction: Helps organizations understand and manage their security risks.

Improved Security Posture: Enables organizations to take proactive steps to strengthen their
security defenses.

Compliance: Many security standards and regulations require organizations to conduct


vulnerability assessments

Cost Savings: Addressing vulnerabilities early can prevent costly security breaches and
downtime.

Types Vulnerability Assessments

Vulnerability assessments can be categorized by the target of the assessment, including network,
host, application, database, and wireless assessments, or by the approach, such as external,
internal, or penetration testing.

By Target:

Network-Based Vulnerability Assessment: Focuses on identifying vulnerabilities within the


network infrastructure, including devices, protocols, and configurations.

Host-Based Vulnerability Assessment: Examines individual servers, workstations, and other


network hosts for vulnerabilities, including outdated software and misconfigurations.

Application-Based Vulnerability Assessment: Identifies security flaws in web applications and


their source code, often using automated scanning tools or static/dynamic analysis.

Database Vulnerability Assessment: Evaluates databases and big data systems for vulnerabilities
and misconfigurations, including rogue databases or insecure development environments.

Wireless Network Vulnerability Assessment: Scans Wi-Fi networks and infrastructure for
vulnerabilities, such as rogue access points and insecure configurations.

API-Based Vulnerability Assessment: Focuses on identifying vulnerabilities within APIs, which


are increasingly important targets for attackers.

Physical Vulnerability Assessment: Examines the physical security measures of a facility, such
as access controls and surveillance systems.
By Approach:

External Vulnerability Assessment: Conducted from the perspective of an external attacker,


simulating attacks from outside the network.

Internal Vulnerability Assessment: Conducted from the perspective of an insider or privileged


user, focusing on vulnerabilities that can be exploited from within the network.

Penetration Testing: A security test that simulates real-world attacks to identify vulnerabilities
and assess their potential impact.

Vulnerability Scanning: An automated process that scans systems and applications for known
vulnerabilities.

Manual Analysis: Involves security analysts manually reviewing system code, configuration
files, and log files to identify vulnerabilities.

Risk Management: The process of identifying, assessing, and mitigating risks to an


organization's IT systems.

You might also like