Safety First: Network security systems critical to combat cyber attacks
With the internet becoming all-pervasive, a large amount of information, both personal and public, is generated on a day-to-day basis. More information is being created, stored, processed and communicated using computers and networks. In this context, ensuring network security has become critical.
Today, the development of large open networks has significantly increased security threats, with hackers discovering new vulnerabilities in these networks. Not only has the number of network security threats increased, their level of sophistication has also become much higher. Organisations, both large and small, have started realising the importance of network security systems and have thus increased their investment in this area.
Network security needs
The most common forms of security threats faced by all types of networks are network eavesdropping, malicious data modification, address spoofing, interception of data, and denial of service (DoS). tele.net evaluates the various risks and threats that different kinds of networks are exposed to.
Telecommunications: Telecommunication networks have become an inseparable component of social interaction and are thus a critical part of national infrastructure. These networks often face malicious attacks by antisocial elements, leading to loss of integrity and confidentiality of network services. Further, as telecom technologies advance and next-generation networks are deployed more widely, communication among different devices and access methods is progressing every day. Service providers are offering new services at higher speeds and with greater reliability. While these advances create revenue opportunities, they also entail advanced security threats.
Earlier, carrier grade telecom networks ensured user and network security. However, today’s communications infrastructure is more vulnerable as the internet is becoming an integral part of all communication. Attacks can come in various forms such as user malware, fraudulent calls, spam, viruses, data and identity theft, and DoS. As the long term evolution (LTE) architecture is much flatter and more IP centric, fewer steps are required to gain access to the core network. In addition, the wide range of end-user devices that can connect to telecom networks has added to network complexity, thereby increasing risks and vulnerabilities. It is, therefore, essential that operators conduct periodic risk assessments of their networks and upgrade their security programmes to adapt to the ever-changing security environment.
Cloud: There are a number of threats to the security of the cloud, the biggest being data breach. If a multitenant cloud service database is not designed properly, a flaw in one client’s application can allow an attacker to gain access to not just that client’s data but also the data of other clients. A related threat is data loss, which can be managed by keeping offline backups. However, if one keeps offline backups, exposure to data breaches is increased. Another risk to cloud security is account or service traffic hijacking. An insecure interface also poses threats to cloud security. Moreover, cloud service providers share infrastructure, platforms and applications to deliver their services in a scalable way, thereby exposing all users to shared vulnerabilities.
While security and privacy concerns pertaining to cloud computing services are similar to those for non-cloud services, they are further amplified by external control over organisational assets, which can lead to potential mismanagement. As consumers transition their applications and data from traditional IT to cloud computing, it is critical that the level of security provided in the cloud environment is equal to or better than that provided by the earlier environment. Failure to ensure effective protection would ultimately result in higher costs and potential loss for users, thus eliminating the possible benefits of cloud computing.
Optical network: While it is widely acknowledged that the security of copper wire networks can be breached quite easily, even fibre optic networks are not immune to hacking risks. In fact, the technology required for tapping into optical networks is becoming simpler and more readily available. Optical network exploits are accomplished by gaining access to the targeted optic fibre cable, and then first extracting light from ultra-thin glass fibres, and ultimately, data from the cable. This method is also considered the most undetectable.
Most traditional security measures are ineffective in controlling optical network hacks. Therefore, it is essential for new ways to prevent network hacking to be devised.
Wireless networks: Wireless communication networks and devices are convenient, flexible and easy to use as they allow users to share data and applications with network systems and other users with compatible devices, without being tied to printer cables and other peripheral device connections. However, wireless networks and hand-held devices are vulnerable to many of the same threats as those faced by conventional wired networks. Wireless networks are most susceptible to access by unauthorised users, which can lead to network slowdown. Such users can also get access to private data and use the networks for unlawful activities. Intruders who gain access to information systems via wireless communications can bypass firewall protection. Once they break into these systems, intruders can launch DoS attacks, steal identities, violate the privacy of legitimate users, insert viruses or malicious codes, and disable operations. Sensitive information that is transmitted between two wireless devices can be intercepted and leaked if it is not protected by strong encryption.
Globally, there is a trend towards the increasing use of wireless technology for meeting communication needs. Therefore, it becomes essential to secure these networks against possible misuse.
Enterprise: Enterprise networks comprise all types of communications infrastructure mentioned above and hence are prone to all the elements that threaten the security of telecom, cloud, wireless and optical networks. Effective security allows businesses to add new services and applications without disrupting the performance of their networks.
One of the most common risks that enterprise networks face is from malicious hardware. This risk can be mitigated by sourcing equipment from only trusted partners and constantly monitoring all hardware components for unexpected behaviour. Further, with the bring-your-own-device trend catching on in most businesses, the risk of mobile malware cropping up has increased greatly. In addition, cloud computing, which is fast gaining traction, brings with it its own set of threats. Another common threat reported by a large number of enterprises is search engine filter bubble poisoning, which compromises a user’s system by directing them to a malicious site that exploits vulnerabilities in the browser or other software. Any breach of security can risk the data of an enterprise and hence impact its ability to deliver services. A proactive approach is needed to safeguard the network to ensure that businesses remain up and running.
Security solutions architecture and trends
Most network security systems do not rely on one method, but use a set of barriers to defend the network in different ways. Even if one solution fails, others still exist, guarding a network from a variety of attacks. Network security is maintained through hardware and software. The software must be constantly updated and managed to deal with emerging threats. A network security system usually consists of many components that work together to minimise maintenance and improve security.
Any security solution has the following key functions:
- Offers layers of security on the network to ensure that valuable information is readily available and is protected from malicious threats.
- Protects against internal and external network attacks. An effective security system monitors all network activity, flags aberrant behaviour and makes the appropriate response.
- Ensures privacy in all communications, at every place and at all times.
- Controls access to information by accurately identifying not only users, but their systems as well.
- Enables a network to prevent known attacks and adapt to new threats.
Network security components typically include:
- Antivirus and antispyware.
- Firewalls to block unauthorised access to a network.
- Intrusion prevention systems to identify fast spreading threats, such as zero-day or zero-hour attacks.
- Virtual private networks to provide secure remote access.
Globally, a number of firms are engaged in providing network security solutions. According to US-based technology market research firm Infonetics Research, the top four vendors in 2014 were Check Point, Cisco, Fortinet and Palo Alto. It also stated that the global network security appliance and software revenue increased by 6 per cent in 2014 to $6.9 billion, as enterprises and network operators deployed security solutions aimed at protecting data and network infrastructure. The research firm estimates the global network security market to be worth $7.5 billion in 2019, increasing at a compound annual growth rate of 1.5 per cent during 2014-19.
According to US-based technology research firm Gartner, mobile and cloud-based computing will present many of the main challenges. The internet of things is also expected to drive the need for security over the next few years. The industry will need to constantly innovate to stay ahead on the security curve.
The Indian context
In Indian government has increasingly been focusing on promoting internet connectivity through its Digital India programme. The initiative seeks to build full-fledged IT infrastructure in the country by adopting technological innovations, which is expected to fuel further economic and social growth. While this is a step in the right direction, it is important to be cognisant of the fact that for the success of such an initiative, effective security solutions need to be put in place. For instance, the digital locker system, which aims to enable online transfer of documents in order to reduce the use of physical documents and promote ease of accessibility, will need to be secured against cybercriminals to prevent system breach and misuse of public information. Similarly, people are increasingly making financial transactions online. Further, a host of online ventures have been launched and existing businesses are also going the digital way. With the country relying more on digital services, there will be a convergence of information and high-end technologies. In such a scenario, it will become imperative for the government to put in place a cybersecurity framework to protect critical infrastructure. Building a security infrastructure and monitoring it at each level will be crucial for ensuring continued availability of services. India will also need to develop technological capabilities to put a robust security framework in place.
Conclusion
Network security has become paramount in the digital age. It has transitioned from merely protecting computers at each end of the communication chain to safeguarding the entire network architecture. When transmitting data, the communication channel should not be vulnerable to attacks. A possible hacker could target the communication channel, obtain the data, decrypt it and reinsert a false message. Securing the network is just as important as securing computers and encrypting messages. Therefore, businesses across the world are using a number of tools such encryption, authentication mechanisms, intrusion detection, security management and firewalls to guard their networks against threats.
At the same time, malware is becoming quite complex and difficult to deal with. For instance, hackers have developed malware that can lock itself to a particular system by encrypting its binary portions using specific attributes of the infected system to generate a key. Once a certain malware has infected a system, it will only run on that machine and cannot be copied and run on any other machine. This makes it even more difficult for antivirus vendors to take a sample of the code from an infected machine and run it on their own systems for analysing it and, ultimately, producing a solution for it. In such a scenario, an understanding of the security issues associated with various types of networks can greatly assist in developing new security technologies and approaches.
In sum, as new vulnerabilities in networks are discovered and new threats emerge, it is essential that new security products are developed so that users can safely log on to a network and fulfil their communication needs.
- Most Viewed
- Most Rated
- Most Shared
- Related Articles
- Manufacturing Hub: India emerges as a ke...
- TRAI performance indicator report for Se...
- Prashant Singhal, partner, telecom indus...
- 2G spectrum scam: continuing controversy
- An Eventful Year: Telecom highlights of ...
- Telecom Round Table: TRAI’s spectrum p...
- Manufacturing Hub: TRAI recommends indig...
- Linking Up: ITIL to merge with Ascend
- High Speed VAS - Killer applications w...
- Bharti Airtel seals deal with Zain - Zai...