This preview shows page 1. Sign up to view the full content.
Unformatted text preview: t will actually have some malicious purpose. Trojans usually carry some payload such as a virus . Cryptography is a useful and widely used tool in security engineering today. It involved the use of codes and ciphers to transform information into unintelligible data. 2.2.2 Firewall 2.1.5 Phishing Phishing is an attempt to obtain confidential A firewall is a typical border control mechanism or information from an individual, group, or perimeter defense. The purpose of a firewall is to organization . Phishers trick users into disclosing block traffic from the outside, but it could also be 8 used to block traffic from the inside. A firewall is the front line defense mechanism against intruders. It is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both . areas of the IPv6 protocol still pose a potential security issue. The new internet protocol does not protect against misconfigured servers, poorly designed applications, or poorly protected sites. The possible security problems emerge due to the following : 1. Header manipulation issues 2. Flooding issues 3. Mobility issues Header manipulation issues arise due to the IPsec’s embedded functionality . Extension headers deter some common sources of attacks because of header manipulation. The problem is that extension headers need to be processed by all stacks, and this can lead to a long chain of extension headers. The large number of extension headers can overwhelm a certain node and is a form of attack if it isdeliberate. Spoofing continues to be a security threat on IPv6 protocol. A type of attack called port scanning occurs when a whole section of a network is scanned to find potential targets with open services . The address space of the IPv6 protocol is large but the protocol is still not invulnerable to this type of attack. Mobility is a new feature that is incorporated into the internet protocol IPv6. The feature requires special security measures. Network administrators need to be aware of these security needs when using IPv6’s mobility feature. 2.2.3 Intrusion Detection Systems An Intrusion Detection System (IDS) is an additional protection measure that helps ward off computer intrusions. IDS systems can be software and hardware devices used to detect an attack. IDS products are used to monitor connection in determining whether attacks are been launched. Some IDS systems just monitor and alert of an attack, whereas others try to block the attack. 2.2.4 Anti‐Malware Software and scanners Viruses, worms and Trojan horses are all examples of malicious software, or Malware for short. Special so‐called anti‐Malware tools are used to detect them and cure an infected system. 2.2.5 Secure Socket Layer (SSL) The Secure Socket Layer (SSL) is a suite of protocols that is a standard way to achieve a good level of security between a web browser and a website. SSL is designed to create a secure channel, or tunnel, between a web browser and the web server, so that any information exchanged is protected within the secured tunnel. SSL provides authentication of clients to server through the use of certificates. Clients present a certificate to the server to prove their identity. SECURITY IN DIFFERENT NETWORKS 3. Security Issues of IP Protocol IPv6 The businesses today use combinations of firewalls, encryption, and authentication mechanisms to create “intranets” that are connected to the internet but protected from it at the same time. From a security point of view, IPv6 is a considerable advancement over the IPv4 internet protocol. Despite the IPv6’s great security mechanisms, it still continues to be vulnerable to threats. Some 9 Intranet is a private computer network that uses internet protocols. Intranets diff...
View Full Document
- Fall '13