Seminar (network security)
Upcoming SlideShare
Loading in...5

Seminar (network security)



Presentation on Network Security.

Presentation on Network Security.



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Seminar (network security) Seminar (network security) Presentation Transcript

  • Network Security By Gaurav Dalvi Final Yr BTech Roll no:A43 Reg no:2011BCS501
  • Why Security?  The Internet was initially designed for connectivity.  Fundamental aspects of information must be protected.  We can’t keep ourselves isolated from the Internet.
  • Internet Evolution •Different Ways to handle security as the Internet Evolves.
  • Type Of Security  Computer Security generic name for the collection of tools designed to protect data and to thwart hackers  Network Security measures to protect the data during the transmission.  Internet Security measure to protect the data during the transmission over a collection of interconnected networks.
  • Goals of Information Security
  • Attacks on Different Layers
  • Security on Different Layers
  • IP  IP is a network layer protocol.  This is a layer that allows the hosts to actually “talk ” to each other.  IP has a number of very important features which make it an extremely robust and flexible protocol.
  • Attacks on IP  Attacks exploits the fact that IP does not perform a robust mechanism for authentication, which is proving that the packet came from where it claims it did.  This means that the host authentication must be provided by higher layers.  Eg: IP Spoofing, IP Session hijacking.
  • TCP Attacks  Exploits TCP 3-way handshake.  Attacker sends a series of SYN packets without replying with the ACK packet.  Finite queue size for incomplete connections.
  • TCP Attacks
  • DNS Cache Poisoning
  • Common Type of Attacks  Ping sweeps and port scans – reconnaissance.  Sniffing – capture packet as they travel through     the network. Man in the Middle Attack – intercept messages that are intended for a valid device. Spoofing – set up a fake device and trick others to send messages to it. Hijacking – take control of a session. Denial of Service (DoS) and Distributed DoS (DDoS).
  • Trusted Network  Standard defensive-oriented technologies. - Firewall – first line of defense. - Intrusion Detection.  Built trust on the top of the TCP/IP infrastructure. - Strong Authentication. - Two factor authentication. - something you have + something you know. - Public key Infrastructure.(PKI)
  • Firewall  A choke point of control and monitoring.  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed.  Auditing and controlling access.  can implement alarms for abnormal behavior.  Itself immune to penetration.  Provides perimeter defence.
  • Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.  Host IDS.  Network IDS.
  • Access Control  Access Control – ability to permit or deny the use of an object by a subject.  It provides 3 essential services (known as AAA): - Authentication.(who can login) - Authorization.(what authorized user can do) - Accountability.(identifies what a user did)
  • Cryptography  Has evolved into a complex science in the field of information security.  Encryption – process of transforming plaintext to ciphertext using a cryptographic key.  Symmetric key cryptography. - DES, 3DES, AES, etc.  Asymmetric key cryptography. - RSA, Diffie-Hellman, etc.
  • Cryptography
  • Public key Infrastructure  Combines public key cryptography and digital signatures to ensure confidentiality, integrity, authentication, non-repudiation and access control.  Digital Certificate – basic element of PKI; secure credential that identifies the owner.  Basic Components:- Certificate Authority. - Registry Authority. - Repository. - Archives.
  • Different Layers of Encryption
  • IPSec  Provides Layer 3 Security.  Tunnel or Transport mode. - Tunnel mode(entire IP packet is encrypted) - Transport mode (IPSec header is inserted into the packet)  Combine different components: - Security associations, Authentication headers (AH), Encapsulating security payload (ESP), Internet Key Exchange (IKE).
  • Security Management  Loss Prevention. Loss prevention focuses on what your critical assets are and how you are going to protect them.  Security risk management. Management of security risks applies the principles of risk management to the management of security threats.  Risk options.  Risk avoidance.  Risk reduction.  Risk spreading.  Risk transfer.  Risk acceptance.
  • Whois Database  Public network Management Database.  Tracks network Resources. - IP addresses, ASN, reverse routing.  Records administrative info. - Contacts(person/role), authorization(maintainer)  All members must register their resources in the Whois database.  Must keep records up to date at all times.