SlideShare ist ein Scribd-Unternehmen logo
1 von 18
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Network security
 Introduction
 What is Network Security
 History
 Basic Network Security
 Need for Network Security
 Types
 Authentication
 Network Attacks Methods
 Advantages
 Problems
 Network Security Architecture
 Conclusion
 Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
 However, as more and more people become
``wired'', an increasing number of people
need to understand the basics of security in a
networked world.
Network security is a level of guarantee that all
the machines in a network are working optimally
and the users of these machines only possess
the rights that were granted to them.
This can include:
 preventing unauthorized people from acting on
the system maliciously
 preventing users from performing involuntary
operations that are capable of harming the
system
 securing data by anticipating failures
 guaranteeing that services are not interrupted
 Internet security has been an issue since the
Internet rose to an international phenomenon.
 By 1996, the Internet already connected 13
million computers, so early security protocols
were required.
 These protocols required computer information
to be confidential, available, and have integrity.
 Because the Internet made information
available to everyone, people needed network
security to make their information confidential.
 When connecting a matching to a network, we need
to make sure no one will easily break in to it.
 Even if you don't think anyone will try to break into
your machines - chances are that someone might try.
 Crackers often run network scan utilities that check a
large range of IP addresses, and automatically try to
find machines running servers with security holes.
 To protect against that, one could simply disable any
unnecessary network service they are running.
 In the past, hackers were highly skilled programmers
who understood the details of computer
communications and how to exploit vulnerabilities.
Today almost anyone can become a hacker by
downloading tools from the Internet.
 These complicated attack tools and generally open
networks have generated an increased need for network
security and dynamic security policies.
 The easiest way to protect a network from an outside
attack is to close it off completely from the outside
world.
 A closed network provides connectivity only to trusted
known parties and sites; a closed network does not
allow a connection to public networks.
 Wi-Fi Protected Access (WPA)
 WPA encrypts information, and checks to
make sure that the network security key has
not been modified.
 WPA also authenticates users to help ensure
that only authorized people can access the
network.
 WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
 Wired Equivalent Privacy (WEP)
 WEP is an older network security method that is
still available to support older devices, but it is
no longer recommended.
 When you enable WEP, you set up a network
security key.
 This key encrypts the information that one
computer sends to another computer across
your network. However,WEP security is
relatively easy to crack.
One-factor authentication – this is
“something a user knows.”The
most recognized type of one-factor
authentication method is the
password.
Two-factor authentication – in
addition to the first factor, the
second factor is “something a user
has.”
Three-factor authentication – in
addition to the previous two
factors, the third factor is
“something a user is.”
 Eavesdropping – Interception of communications by an
unauthorized party
 Data Modification – Data altering, reading from
unauthorized party
 Identity Spoofing (IP Address Spoofing) – IP address to
be falsely assumed— identity spoofing and the attacker
can modify, reroute, or delete your data
 Password-BasedAttacks – By gaining your access rights
to a computer and network resources are determined by
who you are, that is, your user name and your password
 Denial-of-ServiceAttack – Prevents normal use of your
computer or network by valid users, and it could be used
for sending invalid data to application, to flood the
computer, block traffic, etc.
 Network Security helps in protecting personal data
of clients existing on network.
 Network Security facilitates protection of
information that is shared between computers on
the network.
 Hacking attempts or virus / spyware attacks from
the internet will not be able to harm physical
computers. External possible attacks are prevented.
 Computer networks are typically a shared resource
used by many applications representing different
interests.
 The Internet is particularly widely shared, being used
by competing businesses, mutually antagonistic
governments, and opportunistic criminals.
 Unless security measures are taken, a network
conversation or a distributed application may be
compromised by an adversary.
 The owner of the website can be attacked as well.
Some websites have been defaced; the files that
make up the website content have been remotely
accessed and modified without authorization.
What & why
an organization's network infrastructure evolves
over many years.
 Although this evolution is in direct response to the
changing business needs, in many cases security has
been an afterthought.
 Even implementing the most advanced security
technologies of the day won't help if the underlying
security architecture is flawed.
Our systematic approach to the evaluation of the
current state ensures a detailed review of the
current architecture, technology & security
policy of the organization, management
practices and planned changes.
Some of the aspects that will be examined are:
 Review latestThreat Risk Analysis report.
 Analysis of current IT network, information flow
according to business requirements and points
of access to information.
 That is why network security is an important
field that is increasingly gaining attention as
the Internet usage increases.
 The security threats and Internet protocols
were analyzed to determine the necessary
security technology.
 However, the current development in
network security is not very impressive and
significant.
 www.oeclib.in
 www.google.com
 www.wikipedia.com
Network security ppt

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Was ist angesagt? (20)

Computer security
Computer securityComputer security
Computer security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security
Network security Network security
Network security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Security threats
Security threatsSecurity threats
Security threats
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 

Ähnlich wie Network security ppt

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Ähnlich wie Network security ppt (20)

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
Is4560
Is4560Is4560
Is4560
 
Network security
Network securityNetwork security
Network security
 
Internet security
Internet security Internet security
Internet security
 

Mehr von OECLIB Odisha Electronics Control Library

Mehr von OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Kürzlich hochgeladen

一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 

Kürzlich hochgeladen (20)

一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 

Network security ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Network security
  • 2.  Introduction  What is Network Security  History  Basic Network Security  Need for Network Security  Types  Authentication  Network Attacks Methods  Advantages  Problems  Network Security Architecture  Conclusion
  • 3.  Network security is a complicated subject, historically only tackled by well-trained and experienced experts.  However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
  • 4. Network security is a level of guarantee that all the machines in a network are working optimally and the users of these machines only possess the rights that were granted to them. This can include:  preventing unauthorized people from acting on the system maliciously  preventing users from performing involuntary operations that are capable of harming the system  securing data by anticipating failures  guaranteeing that services are not interrupted
  • 5.  Internet security has been an issue since the Internet rose to an international phenomenon.  By 1996, the Internet already connected 13 million computers, so early security protocols were required.  These protocols required computer information to be confidential, available, and have integrity.  Because the Internet made information available to everyone, people needed network security to make their information confidential.
  • 6.  When connecting a matching to a network, we need to make sure no one will easily break in to it.  Even if you don't think anyone will try to break into your machines - chances are that someone might try.  Crackers often run network scan utilities that check a large range of IP addresses, and automatically try to find machines running servers with security holes.  To protect against that, one could simply disable any unnecessary network service they are running.
  • 7.  In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet.  These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies.  The easiest way to protect a network from an outside attack is to close it off completely from the outside world.  A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
  • 8.  Wi-Fi Protected Access (WPA)  WPA encrypts information, and checks to make sure that the network security key has not been modified.  WPA also authenticates users to help ensure that only authorized people can access the network.  WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points.
  • 9.  Wired Equivalent Privacy (WEP)  WEP is an older network security method that is still available to support older devices, but it is no longer recommended.  When you enable WEP, you set up a network security key.  This key encrypts the information that one computer sends to another computer across your network. However,WEP security is relatively easy to crack.
  • 10. One-factor authentication – this is “something a user knows.”The most recognized type of one-factor authentication method is the password. Two-factor authentication – in addition to the first factor, the second factor is “something a user has.” Three-factor authentication – in addition to the previous two factors, the third factor is “something a user is.”
  • 11.  Eavesdropping – Interception of communications by an unauthorized party  Data Modification – Data altering, reading from unauthorized party  Identity Spoofing (IP Address Spoofing) – IP address to be falsely assumed— identity spoofing and the attacker can modify, reroute, or delete your data  Password-BasedAttacks – By gaining your access rights to a computer and network resources are determined by who you are, that is, your user name and your password  Denial-of-ServiceAttack – Prevents normal use of your computer or network by valid users, and it could be used for sending invalid data to application, to flood the computer, block traffic, etc.
  • 12.  Network Security helps in protecting personal data of clients existing on network.  Network Security facilitates protection of information that is shared between computers on the network.  Hacking attempts or virus / spyware attacks from the internet will not be able to harm physical computers. External possible attacks are prevented.
  • 13.  Computer networks are typically a shared resource used by many applications representing different interests.  The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals.  Unless security measures are taken, a network conversation or a distributed application may be compromised by an adversary.  The owner of the website can be attacked as well. Some websites have been defaced; the files that make up the website content have been remotely accessed and modified without authorization.
  • 14. What & why an organization's network infrastructure evolves over many years.  Although this evolution is in direct response to the changing business needs, in many cases security has been an afterthought.  Even implementing the most advanced security technologies of the day won't help if the underlying security architecture is flawed.
  • 15. Our systematic approach to the evaluation of the current state ensures a detailed review of the current architecture, technology & security policy of the organization, management practices and planned changes. Some of the aspects that will be examined are:  Review latestThreat Risk Analysis report.  Analysis of current IT network, information flow according to business requirements and points of access to information.
  • 16.  That is why network security is an important field that is increasingly gaining attention as the Internet usage increases.  The security threats and Internet protocols were analyzed to determine the necessary security technology.  However, the current development in network security is not very impressive and significant.