( Edureka Cybersecurity Course: https://www.edureka.co/cybersecurity-certification-training)
This Edureka video gives an introduction to Network Security and its nuances. Topics covered in this video are:
1. Need for Network Security
2. What is Network Security
3. Security in the Network, Transport and Application Layer
4. Network Security for Business
2. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need For Network Security
What is Network security
Security in Application, Transport and Network Layer
Network Security for Business
Agenda
4. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
What is Network security?
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both
hardware and software technologies. Effective network security manages access to the network. It targets a variety of
threats and stops them from entering or spreading on your network.
5. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Vulnerabilities in TCP/IP
Transfers are done in plain text
Weak authentication between
client and web-server
No solution to syn-packet flooding
IP layer susceptible to many vulnerabilities
due to IP spoofing attacks
6. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
The CIA Triad
Confidentiality part
of network security
makes sure that the
data is available only
to the intended and
authorized persons.
Make sure that the data is reliable
and is not changed by unauthorized
persons.
Availability is to make
sure that the data,
network
resources/services are
continuously available
to the legitimate users,
whenever they require.
7. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Achieving Network Security
ENCIPHERMENT DIGITAL SIGNATURE ACCESS CONTROL
This mechanism provides data
confidentiality services by
transforming data into not-
readable forms for the
unauthorized persons. This
mechanism uses encryption-
decryption algorithm with secret
keys.
This mechanism is the
electronic equivalent of
ordinary signatures in
electronic data. It provides
authenticity of the data.
This mechanism is used to
provide access control
services. These
mechanisms may use the
identification and
authentication of an entity
to determine and enforce
the access rights of the
entity.
11. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Email Security
Confidentiality
E-mail should be
read by intended
recipient only
Authentication
E-mail recipient
should be sure of
the identity of
sender
Integrity
E-mail recipient
should be sure of
the identity of
sender
Proof of Delivery
Sender gets a
confirmation that the
recipient received the
message.
Non Repudiation
Sender gets a
confirmation that the
recipient received the
message.
Proof of Submission
Confirmation that
message has been
submitted to the
mailing server
12. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
PGP
Hi Varun,
Here’s your cash.
df7abea94fcdb49611d7674434b402af
IDEARSAMD5
ksSKs
PKr ks
15. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need for Network Level Security
https://www.jabong.com/kart
Quantity 1Quantity 100
16. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
SSL
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online
communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
17. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Salient Features of SSL
SSL provides Confidentiality Integrity and
Availability
SSL is available for all TCP applications.
Supported by almost all web browsers
Provides ease in doing business with
new online entities.
18. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
How it Works
Encryption
Identification
Bank Acc/no: 1800 7890 6754 123df7abea94fcdb49611d7674434b402af
20. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need
In early 1990s, Internet was used
by few institutions, mostly for
academic purposes.
With the massive growth of Internet,
combined with the inherent security
weaknesses of the TCP/IP protocol, the need
was felt for a technology that can provide
network security on the Internet.
•Protect IP packets
•Data Signing
•Provide defence against network attacks
Goals
21. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPsec Overview
IPsec Communication Internet Key Exchange
• Encryption
• Communication
Manager
• Communication is not
involved in the creation
of keys
• IKE is the automatic key
management protocol
used for IPsec
• Communication
Manager
• Communication is not
involved in the creation
of keys
22. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
How IPsec Works
Will IPsec be used by
sending and receiving
computers
Security Negotiation
• Encryption Algorithm
• Decryption Algorithm
23. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPsec Policies
All computer/server will always request security for all IP based traffic
Computer will only secure the communication when security is
requested.
All IP traffic will only be transferred over a secure connection
24. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Benefits of Network Security in a Business
Resource Sharing
A business can
reduce the amount of
money spent on
hardware by sharing
components and
peripherals
connected to the
network.
Streamlined
Business Processes
Computer networks
enable businesses to
streamline their
internal business
processes.
Collaboration
Among Departments
When two or more
departments of business
connect selected portions
of their networks, they
can streamline business
processes..
Improved Customer
Relations
When two or more
departments of business
connect selected portions
of their networks, they
can streamline business
processes..