Network security
Upcoming SlideShare
Loading in...5
×
 

Network security

on

  • 383 views

 

Statistics

Views

Total Views
383
Views on SlideShare
383
Embed Views
0

Actions

Likes
0
Downloads
12
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Network security Network security Presentation Transcript

    • SUBMITTED BY-Himanshu VarshneyaB.Tech.-IT(VIII Semester) IIMET, Jaipur
    •  What is security Why do we need security Basic Terminology Security Management Attacks Others Securities Wireless Security Firewall Virtual Private Network
    •  Freedom from risk or danger; safety. Freedom from doubt, anxiety, or fear; confidence. Information Security - Information security = confidentiality + integrity + availability + authentication Authorization of access to data in a network, which is controlled by the network administrator.
    •  To prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Protect vital information while still allowing access to those who need it. Provide authentication and access control for resource. Guarantee availability of resources. To prevent malicious attacks from hacking and spamming
    •  Identification Authentication Access Control (Authorization) Confidentiality Integrity Nonrepudiation Availability
    •  Homes & Small Businesses Basic Firewall , Basic Antivirus software, Passwords for all accounts. Medium businesses Strong Firewall, Internet Security Software, Virtual Private Network. Large businesses Strong Firewall and Proxy, Strong Antivirus software, Physical Security Management Large government Strong Firewall and Proxy, Strong Encryption, Whitelist authorized wireless connection
    •  Passive Attacks  Wiretapping  Port scanner  Idle scan Active Attacks  Denial-of-service attack  Spoofing  Man in the middle  ARP poisoning  Smurf attack  Buffer overflow  Heap overflow  Format string attack  SQL injection
    •  Cloud computing security A set of policies, technologies, and controls to protect data, applications. Crime ware A class of malware designed specifically to automate cybercrime. Cyber security standards ISO/IEC 27002 IT Baseline Protection Catalogs Data loss prevention Information Leak Detection and Prevention (ILDP) Information Leak Prevention (ILP) Content Monitoring and Filtering (CMF) Information Protection and Control (IPC)
    •  Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. WLAN uses spread-spectrum or OFDM modulation technology wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) common used technique.  Ad-hoc networks  Non-traditional networks  Man-in-the-middle attacks  Denial of service
    • Independent Topology BSS BSS Ad-hoc network
    •  Infrastructure topology using multiple BSS AP: Access Point AP AP AP BSS BSS wired network
    •  Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet. Aims:  Establish a controlled link  Protect the premises network from Internet-based attacks  Provide a single choke point
    •  Design goals:  All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall)  Only authorized traffic (defined by the local security police) will be allowed to pass
    •  Three common types of Firewalls:  Packet-filtering routers  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions, policies (discard or forward)  Application-level gateways  Also called proxy server  Acts as a relay of application-level traffic  Circuit-level gateways  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  (Bastion host)  The bastion host serves as a platform for an application-level or circuit-level gateway
    •  A VPN is a means of transporting traffic in a secure manner over an unsecured network. A VPN usually achieves this by employing some combination of encryption, authentication, and tunneling. "Tunneling" (encapsulation) refers to the process of encapsulating or embedding one network protocol to be carried within the packets of a second network.  Point-to-Point Tunneling Protocol (PPTP);  Layer 2 Tunneling Protocol (L2TP);  Internet Protocol Security (IPSec);  SOCKS.