Introduction to Network security. Need For Network Security. Types Of Network Security. Tools For Network Security.
In the field of NetworkSecurity (NA )NetworkAdminstrator prevents theunauthorized accessI.e. Misuse, Modification etc. The Network security involves in the Organisations , Enterpricesand other types of institutions.
Recently , Network Security wasFueled by the crime committedBy the Kevin Mitnick. He usedLarge amount Of computers forcrime. Since Then, NetworkSecurity came into spotlight.
EAVESDROPPING = In This, HackerHacks info. During TelephoneConversation,Message Transmission.TRAFFIC ANALYSIS = In This,Attack is done in Encrypted form,He knows info. In Encrypted form.He also determines the user`sLocation.
MASQUERADE = In This Type,Hacker hacks user`s Privilege.REPLAY = In This, Hacker capturesThe info. & retransmit it back toProduce unauthorized access.MESSAGE MODIFICATION =Message modification after hackingInfo.DENIAL OF SERVICE =Termination of normal communi.
Firewall is collection of computersWhich stands b/w the TrustedNetworks. For effective communi.Firewall must include :- All communi. Should pass through Firewall. Firewall must permit to the Authorised communi. Firewall must capable to protect Itself.
Firewall uses restricted access. This is used for single goal. Operating System independence. Better performance. Less Expensive.
Small reason may cause of failure. H/W Firewall more costlier than S/W Firewall. Difficult to Install. Takes Large amount of Physical Space.
It stands for the InstrusionDetection System . This device isUsed to inspect all NetworkTraffics, Alerts the user whenThere has been unauthorisedAccess. It doesn`t slow theNetwork.
NAT stands for Network AddressTranslation. It is used by IP toMaintain the public IP Addresses ,Separate from the private IPAddresses . NAT`s functionality isPerformed on Pouters & otherGateway devices.
TypesUnidirectional Bidirectional NAT NAT Port Based Overlapping NAT NAT