Presentation

278 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
278
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Presentation

  1. 1.  Introduction to Network security. Need For Network Security. Types Of Network Security. Tools For Network Security.
  2. 2. In the field of NetworkSecurity (NA )NetworkAdminstrator prevents theunauthorized accessI.e. Misuse, Modification etc. The Network security involves in the Organisations , Enterpricesand other types of institutions.
  3. 3. Recently , Network Security wasFueled by the crime committedBy the Kevin Mitnick. He usedLarge amount Of computers forcrime. Since Then, NetworkSecurity came into spotlight.
  4. 4. TypesVPN WNS
  5. 5. VPN InternetClient VPN Corporate Network Server VPN Tunnel
  6. 6. VPN uses the PPTPProtocol, That stands forThe Point To Point Tunneling Protocol. It isMicrosoft product. It wasUsed in 1998.
  7. 7. WNS stands for WirelessNetwork Security. WNS wasImplemented in the 1969,4 Years before Ethernet`s birth.This Technology use the RadioFrequency Transmission.
  8. 8. Attacks Passive Attacks Active AttacksEavesdropping Masquerade Traffic Analysis Replay Message Modification
  9. 9. EAVESDROPPING = In This, HackerHacks info. During TelephoneConversation,Message Transmission.TRAFFIC ANALYSIS = In This,Attack is done in Encrypted form,He knows info. In Encrypted form.He also determines the user`sLocation.
  10. 10. MASQUERADE = In This Type,Hacker hacks user`s Privilege.REPLAY = In This, Hacker capturesThe info. & retransmit it back toProduce unauthorized access.MESSAGE MODIFICATION =Message modification after hackingInfo.DENIAL OF SERVICE =Termination of normal communi.
  11. 11. ToolsFirewalls IDS NAT
  12. 12. Firewall is collection of computersWhich stands b/w the TrustedNetworks. For effective communi.Firewall must include :- All communi. Should pass through Firewall. Firewall must permit to the Authorised communi. Firewall must capable to protect Itself.
  13. 13.  Firewall uses restricted access. This is used for single goal. Operating System independence. Better performance. Less Expensive.
  14. 14. Small reason may cause of failure. H/W Firewall more costlier than S/W Firewall. Difficult to Install. Takes Large amount of Physical Space.
  15. 15. It stands for the InstrusionDetection System . This device isUsed to inspect all NetworkTraffics, Alerts the user whenThere has been unauthorisedAccess. It doesn`t slow theNetwork.
  16. 16. TypesHIDS NIDS SIDS
  17. 17. NAT stands for Network AddressTranslation. It is used by IP toMaintain the public IP Addresses ,Separate from the private IPAddresses . NAT`s functionality isPerformed on Pouters & otherGateway devices.
  18. 18. TypesUnidirectional Bidirectional NAT NAT Port Based Overlapping NAT NAT

×