0
NETWORK SECURITY
Define Network:
A Network is a series of points or nodes
interconnected by communication paths.
Interconnect with other ne...
Define Security:
Security is “Freedom from risk or danger.“
The ability of a system to protect information
and system reso...
Network security:
Any activities designed to protect your
network .
Target- variety of threats and stops them from
enterin...
Objective:
• Access
• Confidentiality
• Authentication
• Integrity
• Non‐repudiation
History:
During the 1980s, the hackers and crimes
were beginning to emerge.
CERT was created to overcome network
security ...
Types:
Five types of network security can aid in secure
networking.
• Physical security
• Perimeter protection
• User trai...
 We need multiple layers of
security
 Network security is
accomplished through
hardware and software.
Network security c...
Security tools:
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual privat...
Network security technology :
Different mechanisms to deal with these
attacks.
Cryptographic systems:
plaintext is convert...
• Public Key Cryptography (PKC):
• Hash Function:
Hash function
Plain text Cipher text
 A typical border control mechanism.
 Metaphor for network security.
 Designed to prevent unauthorized access
to or fro...
◦ Packet Filtering Firewall
◦ State Full Firewall
◦ ApplicationAware Firewall etc..
Network-based IDs (NIDS):
The sensor ...
 It is a good level of
security between a web
browser and a website.
 There is a tunnel
between them.
 Clients present ...
 prevention of unauthorized access using wireless
networks.
Security Policies:
 Wireless Intrusion Prevention System(WIP...
 It is a short program aiming at securing
communication over a network.
Example:
Transport layer security (TLS)
PPP / Poi...
 Network Security Services (NSS) comprises
a set of libraries
 It develops security-enabled client and
server applicatio...
Hardware Developments
 Biometric systems -secure workstation
logons
 Smart cards -undeniable proof of a user’s
identity....
The network security will be able to function
as an immune system.
The same set of security technology that is
being used ...
 The network security field evolve more rapidly to
deal with the threats further in the future.
“As threats tweaks,
Secur...
By ,
I.Madhumithah
V.Kalpana
Upcoming SlideShare
Loading in...5
×

Network security

4,504

Published on

About network security

Published in: Technology
0 Comments
11 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,504
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
775
Comments
0
Likes
11
Embeds 0
No embeds

No notes for slide

Transcript of "Network security "

  1. 1. NETWORK SECURITY
  2. 2. Define Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks.
  3. 3. Define Security: Security is “Freedom from risk or danger.“ The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  4. 4. Network security: Any activities designed to protect your network . Target- variety of threats and stops them from entering or spreading on your network. Handled by a network administrator.
  5. 5. Objective: • Access • Confidentiality • Authentication • Integrity • Non‐repudiation
  6. 6. History: During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.
  7. 7. Types: Five types of network security can aid in secure networking. • Physical security • Perimeter protection • User training and education • Wireless encryption protocol (WEP) • MAC address filtering
  8. 8.  We need multiple layers of security  Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  9. 9. Security tools: • Antivirus software packages • Secure network infrastructure • DNS hardware and software • Virtual private network • Identity services • Encryption • Security management
  10. 10. Network security technology : Different mechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text.  Secret Key Cryptography (SKC)
  11. 11. • Public Key Cryptography (PKC): • Hash Function: Hash function Plain text Cipher text
  12. 12.  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  13. 13. ◦ Packet Filtering Firewall ◦ State Full Firewall ◦ ApplicationAware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic.
  14. 14.  It is a good level of security between a web browser and a website.  There is a tunnel between them.  Clients present a certificate to the server to prove their identity.
  15. 15.  prevention of unauthorized access using wireless networks. Security Policies:  Wireless Intrusion Prevention System(WIPS)  Wireless Intrusion Detection System (WIDS) Implementation: Three components: sensor, server, and console.
  16. 16.  It is a short program aiming at securing communication over a network. Example: Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)
  17. 17.  Network Security Services (NSS) comprises a set of libraries  It develops security-enabled client and server applications. Some are: Mozilla client products, including Firefox etc Google Chrome Sun server products
  18. 18. Hardware Developments  Biometric systems -secure workstation logons  Smart cards -undeniable proof of a user’s identity. Software Developments  Current research develops security software using neural networks.  Objective- use neural networks for the facial recognition software.
  19. 19. The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.
  20. 20.  The network security field evolve more rapidly to deal with the threats further in the future. “As threats tweaks, Security tremendously Tweaks”
  21. 21. By , I.Madhumithah V.Kalpana
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×