SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Presentation On



NETWORK SECURITY

    PRESENTED BY:-

   MISS.PALLAVI SONONE.
       (Branch-CSE.)
                          1
       PLIT, Buldana
What is network security?
• Network security is preventing attackers from achieving
  objectives through unauthorized access or unauthorized
  use of computers and networks.
           Basic Security Measures
• The basic security measures for computer systems fall
  into four categories:
• External security:- Protection from environmental
  damage.
• Surveillance:- Proper placement of security cameras can
  deter theft
• Auditing:- Creating a computer or paper audit can help
  detect wrongdoing
• Viruses/worms:- Many different types of viruses, such as
  parasitic, boot sector, stealth, polymorphic, and macro.
                                                             2
What is a firewall?
• Used to control the flow of traffic (both inflows
  and outflows, but primarily inflows) between
  networks
• The connected networks can be internal or a
  combination of internal and external networks
                Firewalls
  A system or combination of systems that
  supports an access control policy between two
  networks.
  A firewall can limit the types of transactions
  that enter a system, as well as the types of
  transactions that leave a system.                   3
Characteristics of Good Firewalls

• All traffic from inside the    •Only authorized traffic, as
  corporate network to outside   defined by the security policy, is
  the network, and vice-versa,   allowed to pass through it; and
  must pass through it;          the system itself is immune to
                                 penetration.




                                                               4
Firewalls – 2 types


A packet filter firewall is essentially a router that has been
programmed to filter out or allow to pass certain IP addresses
or TCP port numbers.
A proxy server is a more advanced firewall that acts as a
doorman into a corporate network. Any external transaction
that request something from the corporate network must enter
through the proxy server.
Proxy servers are more advanced but make external accesses
slower.

                                                                 5
Components of Firewalls

• Chokes - limit the flow of packets between
  networks. Read packets and determine,
  based on the rules, if the traffic should pass
• Gates - act as a control point for external
  connections. They control the external
  connections.


                                                   6
TELNET FTP SMTP SMTP
                                                                                                         T TP
                                                                                                     H

    SM
                                                                                                TP

      TP
                                                                                              SM

         FT
                                                                                         TP

           P
                                                                                       F

           FT
                                                                                  TP                        PACKETS

             P
                                                                                F

               SM
                                                                           ET

                 TP
                                                                    E LN

                   TE
Rejected Packets                                                   T

                      LN
                                                              TP

                      ET
 SMTP HTTP SMTP                                             T
                                                        H
                           CHOKE
                                                                                                                    GATE
                           DEFAULT
                            DENY
                             FTP FTP TELNET


                                                        Application Level                                   Corporate
                                                        Filtering Rule -                                    Internal
                                                        Deny everything except                              Network
                                                        Telnet & FTP

                                                                                                                7
Firewall Functions
• Packet Filtering            •Stateful Inspection
• Network Address             •Virtual Private Networks
  Translation                 •Real-time Monitoring
• Application-level Proxies




                                                          8
Hence we conclude that NETWORK SECURITY
prevents attackers from achieving the objectives through
unauthorized access…….


Firewall is very useful to provide the security in
NETWORKING.



                                                       9
10

Weitere ähnliche Inhalte

Andere mochten auch

Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Andere mochten auch (19)

Iptables presentation
Iptables presentationIptables presentation
Iptables presentation
 
Iptables
IptablesIptables
Iptables
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 

Ähnlich wie Network Security

Web Presentation Week11 GroupB
Web Presentation Week11 GroupBWeb Presentation Week11 GroupB
Web Presentation Week11 GroupB
guest8b0554
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 

Ähnlich wie Network Security (19)

Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
Voip
VoipVoip
Voip
 
Ieee 1588 ptp
Ieee 1588 ptpIeee 1588 ptp
Ieee 1588 ptp
 
Hardware8
Hardware8Hardware8
Hardware8
 
presentationweek11
presentationweek11presentationweek11
presentationweek11
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
 
Web Presentation Week11 GroupB
Web Presentation Week11 GroupBWeb Presentation Week11 GroupB
Web Presentation Week11 GroupB
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Web Presen
Web PresenWeb Presen
Web Presen
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
At1 All Things Wan Introductory Presentation
At1 All Things Wan Introductory PresentationAt1 All Things Wan Introductory Presentation
At1 All Things Wan Introductory Presentation
 
Fit project
Fit projectFit project
Fit project
 
null Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunnelingnull Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunneling
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Network Security

  • 1. Presentation On NETWORK SECURITY PRESENTED BY:- MISS.PALLAVI SONONE. (Branch-CSE.) 1 PLIT, Buldana
  • 2. What is network security? • Network security is preventing attackers from achieving objectives through unauthorized access or unauthorized use of computers and networks. Basic Security Measures • The basic security measures for computer systems fall into four categories: • External security:- Protection from environmental damage. • Surveillance:- Proper placement of security cameras can deter theft • Auditing:- Creating a computer or paper audit can help detect wrongdoing • Viruses/worms:- Many different types of viruses, such as parasitic, boot sector, stealth, polymorphic, and macro. 2
  • 3. What is a firewall? • Used to control the flow of traffic (both inflows and outflows, but primarily inflows) between networks • The connected networks can be internal or a combination of internal and external networks Firewalls A system or combination of systems that supports an access control policy between two networks. A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system. 3
  • 4. Characteristics of Good Firewalls • All traffic from inside the •Only authorized traffic, as corporate network to outside defined by the security policy, is the network, and vice-versa, allowed to pass through it; and must pass through it; the system itself is immune to penetration. 4
  • 5. Firewalls – 2 types A packet filter firewall is essentially a router that has been programmed to filter out or allow to pass certain IP addresses or TCP port numbers. A proxy server is a more advanced firewall that acts as a doorman into a corporate network. Any external transaction that request something from the corporate network must enter through the proxy server. Proxy servers are more advanced but make external accesses slower. 5
  • 6. Components of Firewalls • Chokes - limit the flow of packets between networks. Read packets and determine, based on the rules, if the traffic should pass • Gates - act as a control point for external connections. They control the external connections. 6
  • 7. TELNET FTP SMTP SMTP T TP H SM TP TP SM FT TP P F FT TP PACKETS P F SM ET TP E LN TE Rejected Packets T LN TP ET SMTP HTTP SMTP T H CHOKE GATE DEFAULT DENY FTP FTP TELNET Application Level Corporate Filtering Rule - Internal Deny everything except Network Telnet & FTP 7
  • 8. Firewall Functions • Packet Filtering •Stateful Inspection • Network Address •Virtual Private Networks Translation •Real-time Monitoring • Application-level Proxies 8
  • 9. Hence we conclude that NETWORK SECURITY prevents attackers from achieving the objectives through unauthorized access……. Firewall is very useful to provide the security in NETWORKING. 9
  • 10. 10