Verification of thevenin's theorem for BEEE Lab (1).pptx
Study of campus network security
1. Seminar Guide
Mr . Mahesh Dali
Asst. Professor
Mr. Mahesh Dali
Asst.Professor
TRISHLA THAKUR
1DS11TE098
Department of telecommunication Engineering
2. Introduction- Why network security is necessary
Existing risks-Be aware of vulnerabalities and threats
Security technologies-Understand security services
Discussion on SAPPDRR model and other dynamic
model
further Improvement of campus network
3. Why we need security?
Protect vital information while still allowing access to
those who need it
Provide authentication & access control for resources
4. Campus network is a highly professional LAN,
which is interconnected with internet which is in
harsh environment
Managing the network of a higher-education
campus or organization has raised problems of
massive growth of stored data and need to share it
causing over-stressed network, network misuse and
security breaches.
5. They is a continuous risk of hacker’s attacks, system
failure and information leakage
Campus network should be formed
on
Unified plan
Based on
Security risk
analysis
Adopt advance
technologies
Such as
firewall,honeynet,VPN
&
monitoring system
Strengthen systems and
specifications
Under the
guidance of dynamic
model
6. Campus network is based on TCP/IP protocol
of the large scale LAN
TCP/IP is constructed by the physical layer,
network interface layer, transport layer and
application layers.
The risk of campus network security comes
from all the layers.
7. Improper placement of physical devices or
environmental preventive measures are ineffective
8. This layer directly threatens to attack the other
layer. security issues are mainly
MAC addresses related attacking
DHCP discontented fool
ARP attacks
9. layer encapsulates IP datagram routing forward to
address the problem of communication between
machine.
The common security problems of this layer are:
IP Address spoofing,
RIP (routing information protocol) attacks
Port scanning threat
10. Introduction- Why network security is necessary
Existing risks-Be aware of vulnerabilities and threats
Security technologies-Understand security services
Discussion on SAPPDRR model and other dynamic
model
Improvement of campus network
11. Lots of vulnerabilities on hosts in network
Users don’t keep systems up to date
Solution?
Limit access to the network
Put firewalls across the perimeter of the
network
12. A firewall is an integrated collection of security
measures designed to prevent unauthorized
electronic access to a networked computer system.
14. WHAT IS VPN?
VPN is a technology that allows private networks to make
use of a public network, such as the Internet, as a means
of communication .
15. Two connections – one is made to the Internet and
the second is made to the VPN.
Datagram – contains data, destination and source
information.
Firewalls – VPNs allow authorized users to pass
through the firewalls.
Protocols – protocols create the VPN tunnels.
16. Authentication – validates that the data was
sent from the sender.
Access control – limiting unauthorized users
from accessing the network.
Confidentiality – preventing the data to be read
or copied as the data is being transported.
Data Integrity – ensuring that the data has not
been altered
17. A honeynet is a trap set to detect, deflect, or, in
some manner, counteract attempts at unauthorized
use of information systems.
High-interaction honeypot designed to:
capture in-depth information
learn who would like to use your
system without your permission
for their own ends
Its an architecture, not a product or software.
18.
19. Digital certificates provide a mechanism to
authenticate and secure information on open
networks.
20. Applications using this mechanism include
o secure email
o secure web communications
o digital signing of software files
o smart card authentication
o encrypting file systems
SSL is a digital certificates issued by a trusted Certificate
Authority for e-commerce website.
Digital certificate is issued by a third-party Certificate
Authority (CA) like VeriSign.
21. PDR(protection ,detection ,recovery ) MODEL
PPDR (policy, protection, detection, recovery)MODEL
APPDRR MODEL
22. This is a network security model based on concept of
closed-loop control.
This model is a passive dynamic defense model
PDR,PPDR and APPDRR model minimize the loss of network attacks
but defence and protection required costly system and speed will be
affected.
23. Reasonable security mechanism, risk analysis carried out
according to the specific need of the service, to develop
appropriate security policies.
Network security of SAPPDRR model= Risk analysis+
Security strategy+ Defence system +Real-time monitoring
+Real-time response +Disaster recovery +Active
counterattack SAPPDRR model deals with all this.
This model is active dynamic defence model
26. Purpose of a monitor
check regularly that everything is in order and,
if not, transmit an alarm
When fault is rectified monitor will record,
update the system and again work
27. A monitor is often dedicated to a particular
function:
o ping monitor -checks that all equipment
o Interface monitor- checks that interfaces and
communications are operating
o Module monitor-checks switches, power supplies and fan
modules
o Threshold module- transmits an alarm if traffic load, CPU
load, etc. exceeds a pre-defined limit
A ping monitor uses an ICMP echo (ping) while other
uses SNMP. All these monitors send alarm signals to
the alarm system.
28. Along with the development of computer network
technology , campus network expanding and
Increasing of users and visitors, the development of
a virtual private network technology, the popularity
of Internet and the stability of the campus network
safe operation have all become the focus of the
campus network management. SAPPDRR model &
Network monitoring is the basic measure to ensure
network stability and monitor the flow of
information online. The proper control of network
information can also be used to monitor the
network information, eliminate unhealthy Internet
information, and maintain the network environment .
SAPPDRR model can satisfy the needs of our campus
network management and security management.
29. 1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014
2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring system, 2014
3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006.
4.Tian Bin, Research on Monitoring IP Network, 2006
5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002.
6.Network Security: History, Importance, and Future “University of Florida Department of Electrical and
Computer Engineering Bhavya Daya ”.
7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html.
8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007