SlideShare a Scribd company logo
1 of 25
Network Security
By Gaurav Dalvi
Final Yr BTech
Roll no:A43
Reg
no:2011BCS501
Why Security?
 The Internet was initially designed for

connectivity.
 Fundamental aspects of information must be
protected.
 We can’t keep ourselves isolated from the
Internet.
Internet Evolution

•Different Ways to handle security as the Internet
Evolves.
Type Of Security
 Computer Security

generic name for the collection of tools designed
to protect data and to thwart hackers
 Network Security
measures to protect the data during the
transmission.
 Internet Security
measure to protect the data during the
transmission over a collection of interconnected
networks.
Goals of Information Security
Attacks on Different Layers
Security on Different Layers
IP
 IP is a network layer protocol.
 This is a layer that allows the hosts to actually

“talk ” to each other.
 IP has a number of very important features which
make it an extremely robust and flexible protocol.
Attacks on IP
 Attacks exploits the fact that IP does not perform

a robust mechanism for authentication, which is
proving that the packet came from where it claims
it did.
 This means that the host authentication must be
provided by higher layers.
 Eg: IP Spoofing, IP Session hijacking.
TCP Attacks
 Exploits TCP 3-way handshake.
 Attacker sends a series of SYN packets without

replying with the ACK packet.
 Finite queue size for incomplete connections.
TCP Attacks
DNS Cache Poisoning
Common Type of Attacks
 Ping sweeps and port scans – reconnaissance.
 Sniffing – capture packet as they travel through





the network.
Man in the Middle Attack – intercept messages
that are intended for a valid device.
Spoofing – set up a fake device and trick others
to send messages to it.
Hijacking – take control of a session.
Denial of Service (DoS) and Distributed DoS
(DDoS).
Trusted Network
 Standard defensive-oriented technologies.

- Firewall – first line of defense.
- Intrusion Detection.
 Built trust on the top of the TCP/IP infrastructure.
- Strong Authentication.
- Two factor authentication.
- something you have + something you
know.
- Public key Infrastructure.(PKI)
Firewall
 A choke point of control and monitoring.
 Interconnects networks with differing trust.
 Imposes restrictions on network services.
 only authorized traffic is allowed.

 Auditing and controlling access.
 can implement alarms for abnormal behavior.

 Itself immune to penetration.
 Provides perimeter defence.
Intrusion Detection System
An intrusion detection system (IDS) is a device
or software application that monitors network or
system activities for malicious activities or policy
violations and produces reports to a management
station. Some systems may attempt to stop an
intrusion attempt but this is neither required nor
expected of a monitoring system.
 Host IDS.
 Network IDS.
Access Control
 Access Control – ability to permit or deny the use

of an object by a subject.
 It provides 3 essential services (known as AAA):
- Authentication.(who can login)
- Authorization.(what authorized user can do)
- Accountability.(identifies what a user did)
Cryptography
 Has evolved into a complex science in the field of

information security.
 Encryption – process of transforming plaintext to
ciphertext using a cryptographic key.
 Symmetric key cryptography.
- DES, 3DES, AES, etc.
 Asymmetric key cryptography.
- RSA, Diffie-Hellman, etc.
Cryptography
Public key Infrastructure
 Combines public key cryptography and digital

signatures to ensure confidentiality, integrity,
authentication, non-repudiation and access
control.
 Digital Certificate – basic element of PKI; secure
credential that identifies the owner.
 Basic Components:- Certificate Authority.
- Registry Authority.
- Repository.
- Archives.
Different Layers of Encryption
IPSec
 Provides Layer 3 Security.
 Tunnel or Transport mode.

- Tunnel mode(entire IP packet is encrypted)
- Transport mode (IPSec header is inserted into
the packet)
 Combine different components:
- Security associations, Authentication headers
(AH), Encapsulating security payload (ESP),
Internet Key Exchange (IKE).
Security Management
 Loss Prevention.

Loss prevention focuses on what your critical assets
are and how you are going to protect them.
 Security risk management.
Management of security risks applies the principles of
risk management to the management of security
threats.
 Risk options.
 Risk avoidance.
 Risk reduction.
 Risk spreading.
 Risk transfer.
 Risk acceptance.
Whois Database
 Public network Management Database.
 Tracks network Resources.

- IP addresses, ASN, reverse routing.
 Records administrative info.
- Contacts(person/role), authorization(maintainer)
 All members must register their resources in the
Whois database.
 Must keep records up to date at all times.
Seminar (network security)

More Related Content

What's hot

Network security
Network securityNetwork security
Network securityfatimasaham
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Network security
Network securityNetwork security
Network security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Security threats
Security threatsSecurity threats
Security threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network security Network security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Security policies
Security policiesSecurity policies
Security policies
 
Network Security
Network SecurityNetwork Security
Network Security
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 

Viewers also liked

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Juniper SA Overview
Juniper SA OverviewJuniper SA Overview
Juniper SA OverviewDaniel Rohan
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Marco Lisi
 
Second Project PPT
Second Project PPTSecond Project PPT
Second Project PPTAmar Dhillon
 
Alice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsAlice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsMeghna Singhal
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 

Viewers also liked (20)

Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Network ppt
Network pptNetwork ppt
Network ppt
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Juniper SA Overview
Juniper SA OverviewJuniper SA Overview
Juniper SA Overview
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Network security
Network securityNetwork security
Network security
 
Second Project PPT
Second Project PPTSecond Project PPT
Second Project PPT
 
Alice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsAlice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security Warnings
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 

Similar to Seminar (network security)

Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppttahirnaquash2
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 

Similar to Seminar (network security) (20)

Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Day4
Day4Day4
Day4
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Internet security
Internet securityInternet security
Internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 

Recently uploaded

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Seminar (network security)

  • 1. Network Security By Gaurav Dalvi Final Yr BTech Roll no:A43 Reg no:2011BCS501
  • 2. Why Security?  The Internet was initially designed for connectivity.  Fundamental aspects of information must be protected.  We can’t keep ourselves isolated from the Internet.
  • 3. Internet Evolution •Different Ways to handle security as the Internet Evolves.
  • 4. Type Of Security  Computer Security generic name for the collection of tools designed to protect data and to thwart hackers  Network Security measures to protect the data during the transmission.  Internet Security measure to protect the data during the transmission over a collection of interconnected networks.
  • 8. IP  IP is a network layer protocol.  This is a layer that allows the hosts to actually “talk ” to each other.  IP has a number of very important features which make it an extremely robust and flexible protocol.
  • 9. Attacks on IP  Attacks exploits the fact that IP does not perform a robust mechanism for authentication, which is proving that the packet came from where it claims it did.  This means that the host authentication must be provided by higher layers.  Eg: IP Spoofing, IP Session hijacking.
  • 10. TCP Attacks  Exploits TCP 3-way handshake.  Attacker sends a series of SYN packets without replying with the ACK packet.  Finite queue size for incomplete connections.
  • 13. Common Type of Attacks  Ping sweeps and port scans – reconnaissance.  Sniffing – capture packet as they travel through     the network. Man in the Middle Attack – intercept messages that are intended for a valid device. Spoofing – set up a fake device and trick others to send messages to it. Hijacking – take control of a session. Denial of Service (DoS) and Distributed DoS (DDoS).
  • 14. Trusted Network  Standard defensive-oriented technologies. - Firewall – first line of defense. - Intrusion Detection.  Built trust on the top of the TCP/IP infrastructure. - Strong Authentication. - Two factor authentication. - something you have + something you know. - Public key Infrastructure.(PKI)
  • 15. Firewall  A choke point of control and monitoring.  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed.  Auditing and controlling access.  can implement alarms for abnormal behavior.  Itself immune to penetration.  Provides perimeter defence.
  • 16. Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.  Host IDS.  Network IDS.
  • 17. Access Control  Access Control – ability to permit or deny the use of an object by a subject.  It provides 3 essential services (known as AAA): - Authentication.(who can login) - Authorization.(what authorized user can do) - Accountability.(identifies what a user did)
  • 18. Cryptography  Has evolved into a complex science in the field of information security.  Encryption – process of transforming plaintext to ciphertext using a cryptographic key.  Symmetric key cryptography. - DES, 3DES, AES, etc.  Asymmetric key cryptography. - RSA, Diffie-Hellman, etc.
  • 20. Public key Infrastructure  Combines public key cryptography and digital signatures to ensure confidentiality, integrity, authentication, non-repudiation and access control.  Digital Certificate – basic element of PKI; secure credential that identifies the owner.  Basic Components:- Certificate Authority. - Registry Authority. - Repository. - Archives.
  • 21. Different Layers of Encryption
  • 22. IPSec  Provides Layer 3 Security.  Tunnel or Transport mode. - Tunnel mode(entire IP packet is encrypted) - Transport mode (IPSec header is inserted into the packet)  Combine different components: - Security associations, Authentication headers (AH), Encapsulating security payload (ESP), Internet Key Exchange (IKE).
  • 23. Security Management  Loss Prevention. Loss prevention focuses on what your critical assets are and how you are going to protect them.  Security risk management. Management of security risks applies the principles of risk management to the management of security threats.  Risk options.  Risk avoidance.  Risk reduction.  Risk spreading.  Risk transfer.  Risk acceptance.
  • 24. Whois Database  Public network Management Database.  Tracks network Resources. - IP addresses, ASN, reverse routing.  Records administrative info. - Contacts(person/role), authorization(maintainer)  All members must register their resources in the Whois database.  Must keep records up to date at all times.