SlideShare a Scribd company logo
1 of 26
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need For Network Security
What is Network security
Security in Application, Transport and Network Layer
Network Security for Business
Agenda
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need for Network Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
What is Network security?
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both
hardware and software technologies. Effective network security manages access to the network. It targets a variety of
threats and stops them from entering or spreading on your network.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Vulnerabilities in TCP/IP
Transfers are done in plain text
Weak authentication between
client and web-server
No solution to syn-packet flooding
IP layer susceptible to many vulnerabilities
due to IP spoofing attacks
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
The CIA Triad
Confidentiality part
of network security
makes sure that the
data is available only
to the intended and
authorized persons.
Make sure that the data is reliable
and is not changed by unauthorized
persons.
Availability is to make
sure that the data,
network
resources/services are
continuously available
to the legitimate users,
whenever they require.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Achieving Network Security
ENCIPHERMENT DIGITAL SIGNATURE ACCESS CONTROL
This mechanism provides data
confidentiality services by
transforming data into not-
readable forms for the
unauthorized persons. This
mechanism uses encryption-
decryption algorithm with secret
keys.
This mechanism is the
electronic equivalent of
ordinary signatures in
electronic data. It provides
authenticity of the data.
This mechanism is used to
provide access control
services. These
mechanisms may use the
identification and
authentication of an entity
to determine and enforce
the access rights of the
entity.
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Application Layer Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Client-Server Architecture
CLIENT
SERVER
CLIENT
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Email Architecture
MESSAGE TRANSFER AGENT (MTA)
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Email Security
Confidentiality
E-mail should be
read by intended
recipient only
Authentication
E-mail recipient
should be sure of
the identity of
sender
Integrity
E-mail recipient
should be sure of
the identity of
sender
Proof of Delivery
Sender gets a
confirmation that the
recipient received the
message.
Non Repudiation
Sender gets a
confirmation that the
recipient received the
message.
Proof of Submission
Confirmation that
message has been
submitted to the
mailing server
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
PGP
Hi Varun,
Here’s your cash.
df7abea94fcdb49611d7674434b402af
IDEARSAMD5
ksSKs
PKr ks
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Transport Layer Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need
https://www.jabong.com/kart
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need for Network Level Security
https://www.jabong.com/kart
Quantity 1Quantity 100
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
SSL
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online
communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Salient Features of SSL
SSL provides Confidentiality Integrity and
Availability
SSL is available for all TCP applications.
Supported by almost all web browsers
Provides ease in doing business with
new online entities.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
How it Works
Encryption
Identification
Bank Acc/no: 1800 7890 6754 123df7abea94fcdb49611d7674434b402af
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Network Layer Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need
In early 1990s, Internet was used
by few institutions, mostly for
academic purposes.
With the massive growth of Internet,
combined with the inherent security
weaknesses of the TCP/IP protocol, the need
was felt for a technology that can provide
network security on the Internet.
•Protect IP packets
•Data Signing
•Provide defence against network attacks
Goals
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPsec Overview
IPsec Communication Internet Key Exchange
• Encryption
• Communication
Manager
• Communication is not
involved in the creation
of keys
• IKE is the automatic key
management protocol
used for IPsec
• Communication
Manager
• Communication is not
involved in the creation
of keys
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
How IPsec Works
Will IPsec be used by
sending and receiving
computers
Security Negotiation
• Encryption Algorithm
• Decryption Algorithm
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPsec Policies
All computer/server will always request security for all IP based traffic
Computer will only secure the communication when security is
requested.
All IP traffic will only be transferred over a secure connection
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Benefits of Network Security in a Business
Resource Sharing
A business can
reduce the amount of
money spent on
hardware by sharing
components and
peripherals
connected to the
network.
Streamlined
Business Processes
Computer networks
enable businesses to
streamline their
internal business
processes.
Collaboration
Among Departments
When two or more
departments of business
connect selected portions
of their networks, they
can streamline business
processes..
Improved Customer
Relations
When two or more
departments of business
connect selected portions
of their networks, they
can streamline business
processes..
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Nmap Demo
Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka

More Related Content

What's hot

Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscapeJisc
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 

What's hot (20)

Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Information security
Information securityInformation security
Information security
 
Network Security
Network Security Network Security
Network Security
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Physical security
Physical securityPhysical security
Physical security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 

Similar to Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka

Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingBryan Len
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...Edureka!
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security CertificationVskills
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Edureka!
 
email-security-bdm.pptx
email-security-bdm.pptxemail-security-bdm.pptx
email-security-bdm.pptxpunzango73
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxinfosec train
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fieldsankur bhalla
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxinfosec train
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 

Similar to Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka (20)

Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
Network Security
Network SecurityNetwork Security
Network Security
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
 
email-security-bdm.pptx
email-security-bdm.pptxemail-security-bdm.pptx
email-security-bdm.pptx
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Security+
Security+Security+
Security+
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fields
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Security
SecuritySecurity
Security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 

More from Edureka!

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaEdureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaEdureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaEdureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaEdureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaEdureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaEdureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaEdureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaEdureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaEdureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaEdureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | EdurekaEdureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEdureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEdureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaEdureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaEdureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaEdureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaEdureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaEdureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | EdurekaEdureka!
 

More from Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka

  • 1. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
  • 2. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Need For Network Security What is Network security Security in Application, Transport and Network Layer Network Security for Business Agenda
  • 3. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Need for Network Security
  • 4. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training What is Network security? Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
  • 5. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Vulnerabilities in TCP/IP Transfers are done in plain text Weak authentication between client and web-server No solution to syn-packet flooding IP layer susceptible to many vulnerabilities due to IP spoofing attacks
  • 6. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training The CIA Triad Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons. Make sure that the data is reliable and is not changed by unauthorized persons. Availability is to make sure that the data, network resources/services are continuously available to the legitimate users, whenever they require.
  • 7. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Achieving Network Security ENCIPHERMENT DIGITAL SIGNATURE ACCESS CONTROL This mechanism provides data confidentiality services by transforming data into not- readable forms for the unauthorized persons. This mechanism uses encryption- decryption algorithm with secret keys. This mechanism is the electronic equivalent of ordinary signatures in electronic data. It provides authenticity of the data. This mechanism is used to provide access control services. These mechanisms may use the identification and authentication of an entity to determine and enforce the access rights of the entity.
  • 8. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Application Layer Security
  • 9. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Client-Server Architecture CLIENT SERVER CLIENT
  • 10. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Email Architecture MESSAGE TRANSFER AGENT (MTA)
  • 11. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Email Security Confidentiality E-mail should be read by intended recipient only Authentication E-mail recipient should be sure of the identity of sender Integrity E-mail recipient should be sure of the identity of sender Proof of Delivery Sender gets a confirmation that the recipient received the message. Non Repudiation Sender gets a confirmation that the recipient received the message. Proof of Submission Confirmation that message has been submitted to the mailing server
  • 12. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training PGP Hi Varun, Here’s your cash. df7abea94fcdb49611d7674434b402af IDEARSAMD5 ksSKs PKr ks
  • 13. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Transport Layer Security
  • 14. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Need https://www.jabong.com/kart
  • 15. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Need for Network Level Security https://www.jabong.com/kart Quantity 1Quantity 100
  • 16. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training SSL SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
  • 17. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Salient Features of SSL SSL provides Confidentiality Integrity and Availability SSL is available for all TCP applications. Supported by almost all web browsers Provides ease in doing business with new online entities.
  • 18. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training How it Works Encryption Identification Bank Acc/no: 1800 7890 6754 123df7abea94fcdb49611d7674434b402af
  • 19. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Network Layer Security
  • 20. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Need In early 1990s, Internet was used by few institutions, mostly for academic purposes. With the massive growth of Internet, combined with the inherent security weaknesses of the TCP/IP protocol, the need was felt for a technology that can provide network security on the Internet. •Protect IP packets •Data Signing •Provide defence against network attacks Goals
  • 21. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training IPsec Overview IPsec Communication Internet Key Exchange • Encryption • Communication Manager • Communication is not involved in the creation of keys • IKE is the automatic key management protocol used for IPsec • Communication Manager • Communication is not involved in the creation of keys
  • 22. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training How IPsec Works Will IPsec be used by sending and receiving computers Security Negotiation • Encryption Algorithm • Decryption Algorithm
  • 23. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training IPsec Policies All computer/server will always request security for all IP based traffic Computer will only secure the communication when security is requested. All IP traffic will only be transferred over a secure connection
  • 24. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training Benefits of Network Security in a Business Resource Sharing A business can reduce the amount of money spent on hardware by sharing components and peripherals connected to the network. Streamlined Business Processes Computer networks enable businesses to streamline their internal business processes. Collaboration Among Departments When two or more departments of business connect selected portions of their networks, they can streamline business processes.. Improved Customer Relations When two or more departments of business connect selected portions of their networks, they can streamline business processes..
  • 25. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Nmap Demo