SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Network Security
By Gaurav Dalvi
Final Yr BTech
Roll no:A43
Reg
no:2011BCS501
Why Security?
 The Internet was initially designed for

connectivity.
 Fundamental aspects of information must be
protected.
 We can’t keep ourselves isolated from the
Internet.
Internet Evolution

•Different Ways to handle security as the Internet
Evolves.
Type Of Security
 Computer Security

generic name for the collection of tools designed
to protect data and to thwart hackers
 Network Security
measures to protect the data during the
transmission.
 Internet Security
measure to protect the data during the
transmission over a collection of interconnected
networks.
Goals of Information Security
Attacks on Different Layers
Security on Different Layers
IP
 IP is a network layer protocol.
 This is a layer that allows the hosts to actually

“talk ” to each other.
 IP has a number of very important features which
make it an extremely robust and flexible protocol.
Attacks on IP
 Attacks exploits the fact that IP does not perform

a robust mechanism for authentication, which is
proving that the packet came from where it claims
it did.
 This means that the host authentication must be
provided by higher layers.
 Eg: IP Spoofing, IP Session hijacking.
TCP Attacks
 Exploits TCP 3-way handshake.
 Attacker sends a series of SYN packets without

replying with the ACK packet.
 Finite queue size for incomplete connections.
TCP Attacks
DNS Cache Poisoning
Common Type of Attacks
 Ping sweeps and port scans – reconnaissance.
 Sniffing – capture packet as they travel through





the network.
Man in the Middle Attack – intercept messages
that are intended for a valid device.
Spoofing – set up a fake device and trick others
to send messages to it.
Hijacking – take control of a session.
Denial of Service (DoS) and Distributed DoS
(DDoS).
Trusted Network
 Standard defensive-oriented technologies.

- Firewall – first line of defense.
- Intrusion Detection.
 Built trust on the top of the TCP/IP infrastructure.
- Strong Authentication.
- Two factor authentication.
- something you have + something you
know.
- Public key Infrastructure.(PKI)
Firewall
 A choke point of control and monitoring.
 Interconnects networks with differing trust.
 Imposes restrictions on network services.
 only authorized traffic is allowed.

 Auditing and controlling access.
 can implement alarms for abnormal behavior.

 Itself immune to penetration.
 Provides perimeter defence.
Intrusion Detection System
An intrusion detection system (IDS) is a device
or software application that monitors network or
system activities for malicious activities or policy
violations and produces reports to a management
station. Some systems may attempt to stop an
intrusion attempt but this is neither required nor
expected of a monitoring system.
 Host IDS.
 Network IDS.
Access Control
 Access Control – ability to permit or deny the use

of an object by a subject.
 It provides 3 essential services (known as AAA):
- Authentication.(who can login)
- Authorization.(what authorized user can do)
- Accountability.(identifies what a user did)
Cryptography
 Has evolved into a complex science in the field of

information security.
 Encryption – process of transforming plaintext to
ciphertext using a cryptographic key.
 Symmetric key cryptography.
- DES, 3DES, AES, etc.
 Asymmetric key cryptography.
- RSA, Diffie-Hellman, etc.
Cryptography
Public key Infrastructure
 Combines public key cryptography and digital

signatures to ensure confidentiality, integrity,
authentication, non-repudiation and access
control.
 Digital Certificate – basic element of PKI; secure
credential that identifies the owner.
 Basic Components:- Certificate Authority.
- Registry Authority.
- Repository.
- Archives.
Different Layers of Encryption
IPSec
 Provides Layer 3 Security.
 Tunnel or Transport mode.

- Tunnel mode(entire IP packet is encrypted)
- Transport mode (IPSec header is inserted into
the packet)
 Combine different components:
- Security associations, Authentication headers
(AH), Encapsulating security payload (ESP),
Internet Key Exchange (IKE).
Security Management
 Loss Prevention.

Loss prevention focuses on what your critical assets
are and how you are going to protect them.
 Security risk management.
Management of security risks applies the principles of
risk management to the management of security
threats.
 Risk options.
 Risk avoidance.
 Risk reduction.
 Risk spreading.
 Risk transfer.
 Risk acceptance.
Whois Database
 Public network Management Database.
 Tracks network Resources.

- IP addresses, ASN, reverse routing.
 Records administrative info.
- Contacts(person/role), authorization(maintainer)
 All members must register their resources in the
Whois database.
 Must keep records up to date at all times.
Seminar (network security)

Weitere ähnliche Inhalte

Was ist angesagt?

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 

Was ist angesagt? (20)

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 

Andere mochten auch

Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Juniper SA Overview
Juniper SA OverviewJuniper SA Overview
Juniper SA OverviewDaniel Rohan
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Marco Lisi
 
Second Project PPT
Second Project PPTSecond Project PPT
Second Project PPTAmar Dhillon
 
Alice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsAlice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsMeghna Singhal
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 

Andere mochten auch (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Network ppt
Network pptNetwork ppt
Network ppt
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Juniper SA Overview
Juniper SA OverviewJuniper SA Overview
Juniper SA Overview
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Network security
Network securityNetwork security
Network security
 
Second Project PPT
Second Project PPTSecond Project PPT
Second Project PPT
 
Alice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsAlice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security Warnings
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 

Ähnlich wie Seminar (network security)

Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppttahirnaquash2
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 

Ähnlich wie Seminar (network security) (20)

Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Day4
Day4Day4
Day4
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Internet security
Internet securityInternet security
Internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 

Kürzlich hochgeladen

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Kürzlich hochgeladen (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Seminar (network security)

  • 1. Network Security By Gaurav Dalvi Final Yr BTech Roll no:A43 Reg no:2011BCS501
  • 2. Why Security?  The Internet was initially designed for connectivity.  Fundamental aspects of information must be protected.  We can’t keep ourselves isolated from the Internet.
  • 3. Internet Evolution •Different Ways to handle security as the Internet Evolves.
  • 4. Type Of Security  Computer Security generic name for the collection of tools designed to protect data and to thwart hackers  Network Security measures to protect the data during the transmission.  Internet Security measure to protect the data during the transmission over a collection of interconnected networks.
  • 8. IP  IP is a network layer protocol.  This is a layer that allows the hosts to actually “talk ” to each other.  IP has a number of very important features which make it an extremely robust and flexible protocol.
  • 9. Attacks on IP  Attacks exploits the fact that IP does not perform a robust mechanism for authentication, which is proving that the packet came from where it claims it did.  This means that the host authentication must be provided by higher layers.  Eg: IP Spoofing, IP Session hijacking.
  • 10. TCP Attacks  Exploits TCP 3-way handshake.  Attacker sends a series of SYN packets without replying with the ACK packet.  Finite queue size for incomplete connections.
  • 13. Common Type of Attacks  Ping sweeps and port scans – reconnaissance.  Sniffing – capture packet as they travel through     the network. Man in the Middle Attack – intercept messages that are intended for a valid device. Spoofing – set up a fake device and trick others to send messages to it. Hijacking – take control of a session. Denial of Service (DoS) and Distributed DoS (DDoS).
  • 14. Trusted Network  Standard defensive-oriented technologies. - Firewall – first line of defense. - Intrusion Detection.  Built trust on the top of the TCP/IP infrastructure. - Strong Authentication. - Two factor authentication. - something you have + something you know. - Public key Infrastructure.(PKI)
  • 15. Firewall  A choke point of control and monitoring.  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed.  Auditing and controlling access.  can implement alarms for abnormal behavior.  Itself immune to penetration.  Provides perimeter defence.
  • 16. Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.  Host IDS.  Network IDS.
  • 17. Access Control  Access Control – ability to permit or deny the use of an object by a subject.  It provides 3 essential services (known as AAA): - Authentication.(who can login) - Authorization.(what authorized user can do) - Accountability.(identifies what a user did)
  • 18. Cryptography  Has evolved into a complex science in the field of information security.  Encryption – process of transforming plaintext to ciphertext using a cryptographic key.  Symmetric key cryptography. - DES, 3DES, AES, etc.  Asymmetric key cryptography. - RSA, Diffie-Hellman, etc.
  • 20. Public key Infrastructure  Combines public key cryptography and digital signatures to ensure confidentiality, integrity, authentication, non-repudiation and access control.  Digital Certificate – basic element of PKI; secure credential that identifies the owner.  Basic Components:- Certificate Authority. - Registry Authority. - Repository. - Archives.
  • 21. Different Layers of Encryption
  • 22. IPSec  Provides Layer 3 Security.  Tunnel or Transport mode. - Tunnel mode(entire IP packet is encrypted) - Transport mode (IPSec header is inserted into the packet)  Combine different components: - Security associations, Authentication headers (AH), Encapsulating security payload (ESP), Internet Key Exchange (IKE).
  • 23. Security Management  Loss Prevention. Loss prevention focuses on what your critical assets are and how you are going to protect them.  Security risk management. Management of security risks applies the principles of risk management to the management of security threats.  Risk options.  Risk avoidance.  Risk reduction.  Risk spreading.  Risk transfer.  Risk acceptance.
  • 24. Whois Database  Public network Management Database.  Tracks network Resources. - IP addresses, ASN, reverse routing.  Records administrative info. - Contacts(person/role), authorization(maintainer)  All members must register their resources in the Whois database.  Must keep records up to date at all times.