SlideShare a Scribd company logo
1 of 23
Download to read offline
NETWORK SECURITY
SUBJECT 
COMPUTER NETWORK 
TEACHER 
Sir Saifullah Memon
Define Network: 
A Network is a series of points or nodes interconnected by 
communication paths. 
Interconnect with other networks and contain sub networks.
Define Security 
Security is “Freedom from risk or danger.“ 
The ability of a system to protect information and system 
resources with respect to confidentiality and integrity.
Network security 
 Any activities designed to protect your network 
 Target- variety of threats and stops them from entering or spreading 
on your network. 
 Handled by a network administrator.
Objective 
• Access 
• Confidentiality 
• Authentication 
• Integrity 
• Non-repudiation
History 
During the 1980s, the hackers and crimes were beginning to emerge. 
CERT was created to overcome network security issues. 
In the 1990s, Internet became public and the 
security concerns increased tremendously.
Types 
Five types of network security can aid in secure 
networking. 
•Physical security 
•Perimeter protection 
•User training and education 
•Wireless encryption protocol (WEP) 
•MAC address filtering
 We need multiple layers of security 
 Network security is accomplished 
through hardware and software. 
Network security components: 
Anti-virus and anti-spyware 
Firewall 
Intrusion prevention systems 
Virtual Private Networks
Security tools 
•Antivirus software packages 
• Secure network infrastructure 
• DNS hardware and software 
• Virtual private network 
•Identity services 
•Encryption 
•Security management
Network security technology : 
Different mechanisms to deal with these attacks. 
Cryptographic systems: 
plaintext is converted in to cipher text. 
 Secret Key Cryptography (SKC)
• Public Key Cryptography (PKC): 
• Hash Function: 
Hash function 
Plain text Cipher text
 A typical border control mechanism. 
 Metaphor for network security. 
 Designed to prevent unauthorized access to or from a 
private network.
◦ Packet Filtering Firewall 
◦ State Full Firewall 
◦Application Aware Firewall etc.. 
Network-based IDs (NIDS): 
The sensor are located at the choke in network 
It monitored, it captures all the network traffic 
and analyze each packets for malicious traffic.
 It is a good level of security 
between a web browser and a 
website. 
 There is a tunnel between 
them. 
 Clients present a certificate to 
the server to prove their 
identity.
 prevention of unauthorized access using wireless 
networks. 
Security Policies: 
 Wireless Intrusion Prevention System(WIPS) 
 Wireless Intrusion Detection System (WIDS) 
Implementation: 
Three components: sensor, server, and console.
 It is a short program aiming at securing 
communication over a network. 
Example: 
Transport layer security (TLS) 
PPP / Point-to-Point Protocol 
Internet Protocols security (IPSec)
 Network Security Services (NSS) comprises a set of 
libraries 
 It develops security-enabled client and server 
applications. 
Some are: 
Mozilla client products, including Firefox etc. 
Google Chrome 
Sun server products
Hardware Developments 
 Biometric systems -secure workstation logons 
 Smart cards -undeniable proof of a user’s identity. 
Software Developments 
 Current research develops security software using 
neural networks. 
 Objective- use neural networks for the facial 
recognition software.
The network security will be able to 
function as an immune system. 
The same set of security technology that is 
being used today with some minor 
adjustments.
Network security

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 

What's hot (20)

Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Computer security
Computer securityComputer security
Computer security
 
Security threats
Security threatsSecurity threats
Security threats
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Email security
Email securityEmail security
Email security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Network security ppt
Network security pptNetwork security ppt
Network security pptshashi712
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
Network security attacks
Network security attacksNetwork security attacks
Network security attacksHoang Nguyen
 
Message digest & digital signature
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signatureDinesh Kodam
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Web Development with HTML5, CSS3 & JavaScript
Web Development with HTML5, CSS3 & JavaScriptWeb Development with HTML5, CSS3 & JavaScript
Web Development with HTML5, CSS3 & JavaScriptEdureka!
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
soft-computing
 soft-computing soft-computing
soft-computingstudent
 

Viewers also liked (20)

Network Security
Network  SecurityNetwork  Security
Network Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
The Role Of Java Script
The Role Of Java ScriptThe Role Of Java Script
The Role Of Java Script
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Network security attacks
Network security attacksNetwork security attacks
Network security attacks
 
Message digest & digital signature
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signature
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Basics of JavaScript
Basics of JavaScriptBasics of JavaScript
Basics of JavaScript
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Soft computing
Soft computingSoft computing
Soft computing
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Javascript
JavascriptJavascript
Javascript
 
Web Development with HTML5, CSS3 & JavaScript
Web Development with HTML5, CSS3 & JavaScriptWeb Development with HTML5, CSS3 & JavaScript
Web Development with HTML5, CSS3 & JavaScript
 
HTML CSS & Javascript
HTML CSS & JavascriptHTML CSS & Javascript
HTML CSS & Javascript
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
soft-computing
 soft-computing soft-computing
soft-computing
 

Similar to Network security

NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptxSunilNagar42
 
Network security
Network securityNetwork security
Network securitysnegacmr
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Network security
Network securityNetwork security
Network securityhajra azam
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptographyprosunghosh7
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 

Similar to Network security (20)

Online security
Online securityOnline security
Online security
 
Network security
Network security Network security
Network security
 
NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

Network security

  • 1.
  • 3. SUBJECT COMPUTER NETWORK TEACHER Sir Saifullah Memon
  • 4. Define Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks.
  • 5. Define Security Security is “Freedom from risk or danger.“ The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  • 6. Network security  Any activities designed to protect your network  Target- variety of threats and stops them from entering or spreading on your network.  Handled by a network administrator.
  • 7. Objective • Access • Confidentiality • Authentication • Integrity • Non-repudiation
  • 8. History During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.
  • 9. Types Five types of network security can aid in secure networking. •Physical security •Perimeter protection •User training and education •Wireless encryption protocol (WEP) •MAC address filtering
  • 10.  We need multiple layers of security  Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  • 11. Security tools •Antivirus software packages • Secure network infrastructure • DNS hardware and software • Virtual private network •Identity services •Encryption •Security management
  • 12. Network security technology : Different mechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text.  Secret Key Cryptography (SKC)
  • 13. • Public Key Cryptography (PKC): • Hash Function: Hash function Plain text Cipher text
  • 14.  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  • 15. ◦ Packet Filtering Firewall ◦ State Full Firewall ◦Application Aware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic.
  • 16.  It is a good level of security between a web browser and a website.  There is a tunnel between them.  Clients present a certificate to the server to prove their identity.
  • 17.  prevention of unauthorized access using wireless networks. Security Policies:  Wireless Intrusion Prevention System(WIPS)  Wireless Intrusion Detection System (WIDS) Implementation: Three components: sensor, server, and console.
  • 18.  It is a short program aiming at securing communication over a network. Example: Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)
  • 19.  Network Security Services (NSS) comprises a set of libraries  It develops security-enabled client and server applications. Some are: Mozilla client products, including Firefox etc. Google Chrome Sun server products
  • 20. Hardware Developments  Biometric systems -secure workstation logons  Smart cards -undeniable proof of a user’s identity. Software Developments  Current research develops security software using neural networks.  Objective- use neural networks for the facial recognition software.
  • 21.
  • 22. The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.