network security tutorial | network security basics
This page of tutorials section covers network security tutorial. In our discussion we will cover following sub-topics.
• Why security is needed
• Types of Security including definition of network security
• Attack sources (Active vs Passive)
• Network attack types(Internal,external,wireless)
• Layered security and attack mitigation methods
• Network security algorithms
Why Security is needed
The security has become very essential due to widespread use of internet in our daily life. Initially internet was developed for connectivity purpose. Now all the critical information related to banking, business correspondence, money transactions, online purchasing happens with the use of internet. Hence it is very important to protect subscriber personal information, confidential data, passwords, credit or savings card information (used for online purchasing) etc.
Today internet is evolving very fast and use of application specific online contents has become predominant on various networks. Security companies are working on different ways to handle security related aspects.
Types of Security
Security can be divided into three types viz. computer security, network security and internet security.
Computer security: It is related to collection of tools developed to
protect data available in the computer.
Network security: It is related to protect data during their
transmission.
Internet Security: It is related to protect data during their transmission over a collection
of inter-connected network of networks (i.e. internet).
Attack Sources
There are two attack source types viz. active attack and passive attack.
The active attack involves writing data to the network in order to steal identity of traffic sender as well as
other information. Active attacks include spoofing, ARP poisoning, smurf attacks, SQL injection, buffer overflow etc.
Passive attack involves reading data from the network in order to breach confidentiality.
Passive attacks include port scanning, eavesdropping, reconnaissance etc.
Network attack types

As shown in the figure-1 there are three ways to sniff the network viz. internal sniffer,
external sniffer and wireless sniffer. Sniffing can be run on all the layers of OSI stack.
In internal sniffer type, hacker can run the tools on the LAN to capture the
network traffic directly.
In external sniffer type, hacker can attack through the firewall from outside of the LAN to
steal the network information. This is possible with the use of spoofing techniques and
analysis of intercepted network packets.
In wireless sniffer type, hacker just sits nearby to the wireless network and penetrate to hack the
network information. The packet sniffer software tools designed to capture and
analyze the network related issues are being utilized by the hackers.
Wireless networks are evolving quite rapidly in the internet infrastructure.
The common wireless networks are based on WLAN, zigbee, bluetooth, GSM, 3G, LTE, z-wave etc.
Layered Security and attack mitigation methods

As we have learnt in article on OSI and TCPIP basics, TCPIP packet contains informations required to establish the network connection. It contains source IP address, destination IP address, port numbers, sequence numbers, protocol type etc. All these fields are very important for network layer of OSI stack to function properly.
As mentioned TCPIP protocol basically helps in reliable packet transmission over ethernet. It does not provide any mechanism to ensure network data security. It is the responsibility of the upper network layers to ensuer packet is not tempered over transmission path. Figure-2 depicts OSI layers and what information at each layers hackers can steal by way of sniffing.
Let us understand points to mitigate network security attacks:
➨Avoid using insecure protocols like basic HTTP
authentication and telnet.
➨If you have to use an insecure protocol, try tunneling it
through something to encrypt the sensitive data.
➨Run ARPwatch.
➨Try running tools like sniffdet and Sentinel to detect network
cards in promiscuous mode that may be running sniffing
software.
➨Use wireless networks which has built-in security algorithms such as WEP, WPA etc.
➨Use very strong password consisting of upper and lower case letters, numbers
and symbols.
➨Do not reveal user-ID to any one.
➨Use secured application layer security protocols such as HTTPS, PGP, SMIME etc.
Network Security algorithms
Various algorithms and protocols exists at hardware and software level in order to provide efficient network security. It include cryptography, symmetric key algorithms (DES, 3DES, AES, RC4, RC6, Blowfish), block and stream cipher etc.
Security Related Links
DES vs AES algorithms Web application security testing tools Zigbee Home Security WLAN Security Bluetooth Security 3G security GSM security LTE security z-wave security WBAN security
IoT Wireless Technologies
➤THREAD ➤EnOcean ➤LoRa ➤SIGFOX ➤WHDI ➤NFC ➤Lonworks ➤CEBus ➤UPB