Network Security Methods
- Network security is essential for protecting data, ensuring privacy, and maintaining the integrity of communication systems.
- As networks grow more complex, the risks of attacks increase, and so do the methods used to defend against them.
Here are examples of a few widely used techniques for the defence.
Encryption
Encryption
The process of converting data into a coded format to prevent unauthorised access.
Encryption works by transforming readable data (plaintext) into an unreadable code (ciphertext) using a mathematical algorithm and a key.`
It can be of two types.
Symmetrical:
- Uses the same key for both encryption and decryption.
- Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard).
- Advantages:
- Fast and efficient, especially for large amounts of data.
- Requires less computational power than asymmetric encryption.
- Disadvantages
- Key distribution problem: How can two parties securely share the key?
- Scalability: More users = more keys to manage.
Banks often use AES for encrypting transactions because it is fast and efficient, making it ideal for large-scale real-time systems.
And asymmetrical (public key):
- Uses a pair of keys: a public key for encryption and a private key for decryption.
- Examples: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography).
- Advantages:
- Secure key exchange — no need to share secret keys.
- Easier to scale for large networks.
- Disadvantages:
- Slower than symmetric encryption.
- Requires key verification to prevent man-in-the-middle attacks.
While encryption itself has many advantages and disadvantages, there are also other problems when it comes to security risks.
Authentication and Access Control
OWASP Top 10 declares that the top vulnerability found in 94% cases is broken access control.
Hence, it is essential to understand what policies we can introduce to fix the issue:
- User IDs
- Each user has a unique identifier.
- Used with passwords or multi-factor authentication (MFA).
- Ensures only authorised individuals have access to resources.
- Trusted Media Access Control (MAC) Addresses
- Each device has a unique hardware identifier.
- Networks can restrict access to specific MAC addresses.
- Such methods are simple to implement in small networks, but are vulnerable to spoofing, where attackers fake a MAC address.
- Although simple to implement in small networks, it becomes challenging to manage on large networks.
- Such countermeasures are vulnerable to spoofing, where attackers fake a MAC address.
- Additionally, for some critical applications, such as banks or government internal documentation, some agencies might require biometric authentication to access and/or modify specific information.
- For instance, scanning your fingerprint, eye or entire face.