SlideShare a Scribd company logo
1 of 10
Presentation On



NETWORK SECURITY

    PRESENTED BY:-

   MISS.PALLAVI SONONE.
       (Branch-CSE.)
                          1
       PLIT, Buldana
What is network security?
• Network security is preventing attackers from achieving
  objectives through unauthorized access or unauthorized
  use of computers and networks.
           Basic Security Measures
• The basic security measures for computer systems fall
  into four categories:
• External security:- Protection from environmental
  damage.
• Surveillance:- Proper placement of security cameras can
  deter theft
• Auditing:- Creating a computer or paper audit can help
  detect wrongdoing
• Viruses/worms:- Many different types of viruses, such as
  parasitic, boot sector, stealth, polymorphic, and macro.
                                                             2
What is a firewall?
• Used to control the flow of traffic (both inflows
  and outflows, but primarily inflows) between
  networks
• The connected networks can be internal or a
  combination of internal and external networks
                Firewalls
  A system or combination of systems that
  supports an access control policy between two
  networks.
  A firewall can limit the types of transactions
  that enter a system, as well as the types of
  transactions that leave a system.                   3
Characteristics of Good Firewalls

• All traffic from inside the    •Only authorized traffic, as
  corporate network to outside   defined by the security policy, is
  the network, and vice-versa,   allowed to pass through it; and
  must pass through it;          the system itself is immune to
                                 penetration.




                                                               4
Firewalls – 2 types


A packet filter firewall is essentially a router that has been
programmed to filter out or allow to pass certain IP addresses
or TCP port numbers.
A proxy server is a more advanced firewall that acts as a
doorman into a corporate network. Any external transaction
that request something from the corporate network must enter
through the proxy server.
Proxy servers are more advanced but make external accesses
slower.

                                                                 5
Components of Firewalls

• Chokes - limit the flow of packets between
  networks. Read packets and determine,
  based on the rules, if the traffic should pass
• Gates - act as a control point for external
  connections. They control the external
  connections.


                                                   6
TELNET FTP SMTP SMTP
                                                                                                         T TP
                                                                                                     H

    SM
                                                                                                TP

      TP
                                                                                              SM

         FT
                                                                                         TP

           P
                                                                                       F

           FT
                                                                                  TP                        PACKETS

             P
                                                                                F

               SM
                                                                           ET

                 TP
                                                                    E LN

                   TE
Rejected Packets                                                   T

                      LN
                                                              TP

                      ET
 SMTP HTTP SMTP                                             T
                                                        H
                           CHOKE
                                                                                                                    GATE
                           DEFAULT
                            DENY
                             FTP FTP TELNET


                                                        Application Level                                   Corporate
                                                        Filtering Rule -                                    Internal
                                                        Deny everything except                              Network
                                                        Telnet & FTP

                                                                                                                7
Firewall Functions
• Packet Filtering            •Stateful Inspection
• Network Address             •Virtual Private Networks
  Translation                 •Real-time Monitoring
• Application-level Proxies




                                                          8
Hence we conclude that NETWORK SECURITY
prevents attackers from achieving the objectives through
unauthorized access…….


Firewall is very useful to provide the security in
NETWORKING.



                                                       9
10

More Related Content

Viewers also liked

Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Viewers also liked (19)

Iptables presentation
Iptables presentationIptables presentation
Iptables presentation
 
Iptables
IptablesIptables
Iptables
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 

Similar to Network Security

Web Presentation Week11 GroupB
Web Presentation Week11 GroupBWeb Presentation Week11 GroupB
Web Presentation Week11 GroupB
guest8b0554
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 

Similar to Network Security (19)

Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
Voip
VoipVoip
Voip
 
Ieee 1588 ptp
Ieee 1588 ptpIeee 1588 ptp
Ieee 1588 ptp
 
Hardware8
Hardware8Hardware8
Hardware8
 
presentationweek11
presentationweek11presentationweek11
presentationweek11
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
 
Web Presentation Week11 GroupB
Web Presentation Week11 GroupBWeb Presentation Week11 GroupB
Web Presentation Week11 GroupB
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Web Presen
Web PresenWeb Presen
Web Presen
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
At1 All Things Wan Introductory Presentation
At1 All Things Wan Introductory PresentationAt1 All Things Wan Introductory Presentation
At1 All Things Wan Introductory Presentation
 
Fit project
Fit projectFit project
Fit project
 
null Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunnelingnull Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunneling
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Network Security

  • 1. Presentation On NETWORK SECURITY PRESENTED BY:- MISS.PALLAVI SONONE. (Branch-CSE.) 1 PLIT, Buldana
  • 2. What is network security? • Network security is preventing attackers from achieving objectives through unauthorized access or unauthorized use of computers and networks. Basic Security Measures • The basic security measures for computer systems fall into four categories: • External security:- Protection from environmental damage. • Surveillance:- Proper placement of security cameras can deter theft • Auditing:- Creating a computer or paper audit can help detect wrongdoing • Viruses/worms:- Many different types of viruses, such as parasitic, boot sector, stealth, polymorphic, and macro. 2
  • 3. What is a firewall? • Used to control the flow of traffic (both inflows and outflows, but primarily inflows) between networks • The connected networks can be internal or a combination of internal and external networks Firewalls A system or combination of systems that supports an access control policy between two networks. A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system. 3
  • 4. Characteristics of Good Firewalls • All traffic from inside the •Only authorized traffic, as corporate network to outside defined by the security policy, is the network, and vice-versa, allowed to pass through it; and must pass through it; the system itself is immune to penetration. 4
  • 5. Firewalls – 2 types A packet filter firewall is essentially a router that has been programmed to filter out or allow to pass certain IP addresses or TCP port numbers. A proxy server is a more advanced firewall that acts as a doorman into a corporate network. Any external transaction that request something from the corporate network must enter through the proxy server. Proxy servers are more advanced but make external accesses slower. 5
  • 6. Components of Firewalls • Chokes - limit the flow of packets between networks. Read packets and determine, based on the rules, if the traffic should pass • Gates - act as a control point for external connections. They control the external connections. 6
  • 7. TELNET FTP SMTP SMTP T TP H SM TP TP SM FT TP P F FT TP PACKETS P F SM ET TP E LN TE Rejected Packets T LN TP ET SMTP HTTP SMTP T H CHOKE GATE DEFAULT DENY FTP FTP TELNET Application Level Corporate Filtering Rule - Internal Deny everything except Network Telnet & FTP 7
  • 8. Firewall Functions • Packet Filtering •Stateful Inspection • Network Address •Virtual Private Networks Translation •Real-time Monitoring • Application-level Proxies 8
  • 9. Hence we conclude that NETWORK SECURITY prevents attackers from achieving the objectives through unauthorized access……. Firewall is very useful to provide the security in NETWORKING. 9
  • 10. 10