SlideShare ist ein Scribd-Unternehmen logo
1 von 6
NETWORK SECURITY 1
NETWORK SECURITY
WHAT IS A NETWORK?
A ``Network'' has been defined as ``any set of interlinking lines resembling a net, an interconnected system, a
network of alliances.'' This definition suits our purpose well: a computer network is simply a system of
interconnected computers.
WHAT IS SECURITY?
In information technology, Security is the protection of information assets through the use of technology, processes,
and training. Security is of two types as computer security & network security. Network security measures are
needed to protect data during their transmission.
INTRODUCTION TO NETWORK SECURITY:
The network security refers to any activities designed to protect your network. Specifically, these activities protect
the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety
of threats and stops them from entering or spreading on your network.
Network security is typically handled by a network administrator or system administrator who implements
the security policy, network software and hardware needed to protect a network and the resources accessed through
the network from unauthorized access and also ensure that employees have adequate access to the network and
resources to work.
OBJECTIVE TO NETWORK SECURITY:
1. Access – authorized users are provided the means to communicate to and from a particular network
2. Confidentiality – Information in the network remains private
3. Authentication – Ensure the users of the network are who they say they are
4. Integrity – Ensure the message has not been modified in transit
5. Non‐repudiation – Ensure the user does not refute that he used the network
HISTORY:
Several key events contributed to the birth and evolution of computer and network security. The timeline
can be started as far back as the 1930s.
During the 1980s, the hackers and crimes relating to computers were beginning to emerge. Robert Morris, was
convicted for unleashing the Morris Worm to over 6,000 vulnerable computers connected to the Internet.Based on
NETWORK SECURITY 2
concerns that the Morris Worm ordeal could be replicated, the Computer Emergency Response Team (CERT)
was created to alert computer users of network security issues.
TYPES OF NETWORK SECURITY:
Network security includes both public and private computer networks used in business, government agencies and
institutions. Efficient security plans should be implemented to avoid anti-social elements. The following five types
of network security can aid in secure networking.
 Physical security
 Perimeter protection
 User training and education
 Wireless encryption protocol (WEP)
 MAC address filtering
WORKING:
We need multiple layers of security. If one fails, others still stand. Network security is accomplished through
hardware and software. The software must be constantly updated and managed to protect you from emerging threats.
A network security system usually consists of many components. Ideally, all components work together,
which minimizes maintenance and improves security.
Network security components often include:
Anti-virus and anti-spyware
Firewall, to block unauthorized access to your network
Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
Virtual Private Networks (VPNs), to provide secure remote access
SECURITY ATTACKS:
The security attacks compromises the information-system security.
Active attacks : attempts on blockage or modification of data or link.
Passive attacks : involves simply getting access to link, data.
NETWORK SECURITY TOOLS:
Antivirus software packages
Secure network infrastructure
Dedicated network security hardware and software
Virtual private networks
Identity services
Encryption
NETWORK SECURITY 3
Security management
TECHNOLOGY FOR NETWORK SECURITY:
Network threats will continue to be a major issue in the global world as long as information is accessible and
transferred across the Internet. Different defense and detection mechanisms were developed to deal with these
attacks.
 Cryptographic systems –The original message known as plaintext is converted in to cipher text by
Encryption and vice versa can be done by decryption. This area of study is called as cryptography.
Algorithms used:
o Secret Key Cryptography (SKC)-Uses single Key for both encryption and decryption.
o Public Key Cryptography (PKC)-Uses one key for encryption & another for decryption.
o Hash Function-plain text not recoverable from cipher text.
Hash function
Plain text Cipher text
 Firewall- A firewall is a typical border control mechanism or perimeter defense. It is an excellent
metaphor for network security. A firewall is the front line defense mechanism against intruders. It is a
system designed to prevent unauthorized access to or from a private network.
NETWORK SECURITY 4
Types:
o Packet Filtering Firewall
o State Full Firewall
o Deep packet inspection Firewall
o Application Aware Firewall etc..
 Intrusion Detection Systems- It is a type of security management for computers and networks. In
network-based IDs (NIDS), the sensor are located at the choke in network to be monitored, it captures all
the network traffic and analyze each packets for malicious traffic.
 Steganography-It is art & science of hiding information by embedding messages with in another. It is
secret transmission of message; its goal is to make a message altogether invisible.
 Anti‐Malware Software and scanners- Viruses, worms and Trojan horses are all examples of malicious
software, or Malware for short. Special so‐called anti‐Malware tools are used to detect them and cure an
infected system.
 Secure Socket Layer (SSL) - The Secure Socket Layer (SSL)
is a suite of protocols that is a standard way to achieve a good
level of security between a web browser and a website.
There is a tunnel or security channel between them. Clients
present a certificate to the server to prove their identity.
NETWORK SECURITY 5
WIRELESS NETWORK SECURITY:
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.
Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into
wired networks.
Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) are
commonly used to enforce wireless security policies. The primary purpose of a WIP is to prevent unauthorized
network access to LAN and other information assets by wireless devices.
Implementation: It has three components: sensor, server, and console.
Sensor : They scan wireless spectrum for packets & are installed throughout areas to be protected.
Server : analyzes packet captured by sensor.
Console : provides primary user interface in to the system for administrating & reporting.
SECURITY PROTOCOLS:
It is a short program aiming at securing communication over a network.
Some examples:
Transport layer security (TLS) to secure web connections.
Internet Protocols security (IPSec) for securing internet protocols communication.
PPP / Point-to-Point Protocol provide a authentication, transmission encryption privacy and compression.
Transport layer security (TLS) provides security and data integrity in network such as internet.
IMPLEMENTATION:
Network Security Services (NSS) comprises a set of libraries designed to the development of security-enabled
client and server applications. Below use NSS in a variety of products, including the following:
Mozilla client products, including Firefox, Thunderbird etc.
Google Chrome (Linux version; Windows version since at least v8) .
Sun server products from the Sun Java Enterprise System, including Sun Java System Web Server, Sun
Java System Directory Server, etc.
CURRENT DEVELOPMENTS:
The network security field is continuing down the same route.
1. Hardware Developments
Biometric systems and smart cards are the only new hardware technologies that are widely impacting security.
NETWORK SECURITY 6
The most obvious use of biometrics for network security is for secure workstation logons for a
workstation connected to a network. The main use of Biometric network security will be to replace the current
password system.
Smart cards are usually a credit‐card‐sized digital electronic media. The main idea behind smart cards is to
provide undeniable proof of a user’s identity. Smart cards can be used for everything from logging in to the
network to providing secure Web communications and secure e‐mail transactions.
2. Software Developments
The software aspect of network security is very vast. It includes firewalls, antivirus, vpn, intrusion detection, and
much more. When new viruses emerge, the antivirus is updated to be able to guard against those threats. Current
research is being performed on security software using neural networks. The objective of the research is to use
neural networks for the facial recognition software.
FUTURE TREND:
The network security will be able to function as an immune system. The trend towards biometrics could have taken
place a while ago, but it seems that it isn’t being actively pursued. Many security developments that are taking place
are within the same set of security technology that is being used today with some minor adjustments.
CONCLUSION:
Network security is an important field that is increasingly gaining attention as the internet expands. Originally it was
assumed that with the importance of the network security field, new approaches to security, both hardware and
software, would be actively researched. The network security field may have to evolve more rapidly to deal with the
threats further in the future.
THANK U!

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by FortinetAtlantic Training, LLC.
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber security
Cyber securityCyber security
Cyber securityabithajayavel
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxChandanChandu928137
 
Cyber security
Cyber securityCyber security
Cyber securitySapna Patil
 
Cyber security
Cyber securityCyber security
Cyber securitySamsil Arefin
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Network security
Network securityNetwork security
Network securitytoamma
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network securityIGZ Software house
 
cyber security
cyber securitycyber security
cyber securityabithajayavel
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

Was ist angesagt? (20)

Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Network security
Network securityNetwork security
Network security
 
Information security
Information securityInformation security
Information security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Network security
Network securityNetwork security
Network security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Ähnlich wie Network security

NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptxSunilNagar42
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................MuhammadKhalil858111
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.pptgirmawodajo
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptographyprosunghosh7
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSKatie Robinson
 
Cyber security
Cyber securityCyber security
Cyber securityAman Pradhan
 
Network security
Network securityNetwork security
Network securityPooja Dewangan
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
Network security
Network securityNetwork security
Network securitySimalike Peter
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptxME1923SoumyaSouravNa
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 

Ähnlich wie Network security (20)

NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 
Cyber security
Cyber securityCyber security
Cyber security
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Network security
Network securityNetwork security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
Network security
Network securityNetwork security
Network security
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
information security technology
information security technologyinformation security technology
information security technology
 

Mehr von Madhumithah Ilango

Mehr von Madhumithah Ilango (8)

Project confiration-letter-sample
Project confiration-letter-sampleProject confiration-letter-sample
Project confiration-letter-sample
 
4 g technology
4 g technology4 g technology
4 g technology
 
Clientserver
ClientserverClientserver
Clientserver
 
Bit info
Bit infoBit info
Bit info
 
Network simulator
Network  simulatorNetwork  simulator
Network simulator
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Gps
GpsGps
Gps
 
4 g technology
4 g technology4 g technology
4 g technology
 

KĂŒrzlich hochgeladen

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

KĂŒrzlich hochgeladen (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Network security

  • 1. NETWORK SECURITY 1 NETWORK SECURITY WHAT IS A NETWORK? A ``Network'' has been defined as ``any set of interlinking lines resembling a net, an interconnected system, a network of alliances.'' This definition suits our purpose well: a computer network is simply a system of interconnected computers. WHAT IS SECURITY? In information technology, Security is the protection of information assets through the use of technology, processes, and training. Security is of two types as computer security & network security. Network security measures are needed to protect data during their transmission. INTRODUCTION TO NETWORK SECURITY: The network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work. OBJECTIVE TO NETWORK SECURITY: 1. Access – authorized users are provided the means to communicate to and from a particular network 2. Confidentiality – Information in the network remains private 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non‐repudiation – Ensure the user does not refute that he used the network HISTORY: Several key events contributed to the birth and evolution of computer and network security. The timeline can be started as far back as the 1930s. During the 1980s, the hackers and crimes relating to computers were beginning to emerge. Robert Morris, was convicted for unleashing the Morris Worm to over 6,000 vulnerable computers connected to the Internet.Based on
  • 2. NETWORK SECURITY 2 concerns that the Morris Worm ordeal could be replicated, the Computer Emergency Response Team (CERT) was created to alert computer users of network security issues. TYPES OF NETWORK SECURITY: Network security includes both public and private computer networks used in business, government agencies and institutions. Efficient security plans should be implemented to avoid anti-social elements. The following five types of network security can aid in secure networking.  Physical security  Perimeter protection  User training and education  Wireless encryption protocol (WEP)  MAC address filtering WORKING: We need multiple layers of security. If one fails, others still stand. Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats. A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security. Network security components often include: Anti-virus and anti-spyware Firewall, to block unauthorized access to your network Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks Virtual Private Networks (VPNs), to provide secure remote access SECURITY ATTACKS: The security attacks compromises the information-system security. Active attacks : attempts on blockage or modification of data or link. Passive attacks : involves simply getting access to link, data. NETWORK SECURITY TOOLS: Antivirus software packages Secure network infrastructure Dedicated network security hardware and software Virtual private networks Identity services Encryption
  • 3. NETWORK SECURITY 3 Security management TECHNOLOGY FOR NETWORK SECURITY: Network threats will continue to be a major issue in the global world as long as information is accessible and transferred across the Internet. Different defense and detection mechanisms were developed to deal with these attacks.  Cryptographic systems –The original message known as plaintext is converted in to cipher text by Encryption and vice versa can be done by decryption. This area of study is called as cryptography. Algorithms used: o Secret Key Cryptography (SKC)-Uses single Key for both encryption and decryption. o Public Key Cryptography (PKC)-Uses one key for encryption & another for decryption. o Hash Function-plain text not recoverable from cipher text. Hash function Plain text Cipher text  Firewall- A firewall is a typical border control mechanism or perimeter defense. It is an excellent metaphor for network security. A firewall is the front line defense mechanism against intruders. It is a system designed to prevent unauthorized access to or from a private network.
  • 4. NETWORK SECURITY 4 Types: o Packet Filtering Firewall o State Full Firewall o Deep packet inspection Firewall o Application Aware Firewall etc..  Intrusion Detection Systems- It is a type of security management for computers and networks. In network-based IDs (NIDS), the sensor are located at the choke in network to be monitored, it captures all the network traffic and analyze each packets for malicious traffic.  Steganography-It is art & science of hiding information by embedding messages with in another. It is secret transmission of message; its goal is to make a message altogether invisible.  Anti‐Malware Software and scanners- Viruses, worms and Trojan horses are all examples of malicious software, or Malware for short. Special so‐called anti‐Malware tools are used to detect them and cure an infected system.  Secure Socket Layer (SSL) - The Secure Socket Layer (SSL) is a suite of protocols that is a standard way to achieve a good level of security between a web browser and a website. There is a tunnel or security channel between them. Clients present a certificate to the server to prove their identity.
  • 5. NETWORK SECURITY 5 WIRELESS NETWORK SECURITY: Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks. Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) are commonly used to enforce wireless security policies. The primary purpose of a WIP is to prevent unauthorized network access to LAN and other information assets by wireless devices. Implementation: It has three components: sensor, server, and console. Sensor : They scan wireless spectrum for packets & are installed throughout areas to be protected. Server : analyzes packet captured by sensor. Console : provides primary user interface in to the system for administrating & reporting. SECURITY PROTOCOLS: It is a short program aiming at securing communication over a network. Some examples: Transport layer security (TLS) to secure web connections. Internet Protocols security (IPSec) for securing internet protocols communication. PPP / Point-to-Point Protocol provide a authentication, transmission encryption privacy and compression. Transport layer security (TLS) provides security and data integrity in network such as internet. IMPLEMENTATION: Network Security Services (NSS) comprises a set of libraries designed to the development of security-enabled client and server applications. Below use NSS in a variety of products, including the following: Mozilla client products, including Firefox, Thunderbird etc. Google Chrome (Linux version; Windows version since at least v8) . Sun server products from the Sun Java Enterprise System, including Sun Java System Web Server, Sun Java System Directory Server, etc. CURRENT DEVELOPMENTS: The network security field is continuing down the same route. 1. Hardware Developments Biometric systems and smart cards are the only new hardware technologies that are widely impacting security.
  • 6. NETWORK SECURITY 6 The most obvious use of biometrics for network security is for secure workstation logons for a workstation connected to a network. The main use of Biometric network security will be to replace the current password system. Smart cards are usually a credit‐card‐sized digital electronic media. The main idea behind smart cards is to provide undeniable proof of a user’s identity. Smart cards can be used for everything from logging in to the network to providing secure Web communications and secure e‐mail transactions. 2. Software Developments The software aspect of network security is very vast. It includes firewalls, antivirus, vpn, intrusion detection, and much more. When new viruses emerge, the antivirus is updated to be able to guard against those threats. Current research is being performed on security software using neural networks. The objective of the research is to use neural networks for the facial recognition software. FUTURE TREND: The network security will be able to function as an immune system. The trend towards biometrics could have taken place a while ago, but it seems that it isn’t being actively pursued. Many security developments that are taking place are within the same set of security technology that is being used today with some minor adjustments. CONCLUSION: Network security is an important field that is increasingly gaining attention as the internet expands. Originally it was assumed that with the importance of the network security field, new approaches to security, both hardware and software, would be actively researched. The network security field may have to evolve more rapidly to deal with the threats further in the future. THANK U!