Submit Search
Upload
Network and Security-2.pptx
•
Download as PPTX, PDF
•
0 likes
•
12 views
D
Dhanvanthkesavan
Follow
Network and security
Read less
Read more
Data & Analytics
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 13
Download now
Recommended
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
infosec train
unit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
Computing safety
Computing safety
Brulius
Module 3.pdf
Module 3.pdf
Sitamarhi Institute of Technology
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
Chapter 4.ppt
Chapter 4.ppt
girmawodajo
Network Security of Data Protection
Network Security of Data Protection
UthsoNandy
Chapter 10.0
Chapter 10.0
Adebisi Tolulope
Recommended
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
infosec train
unit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
Computing safety
Computing safety
Brulius
Module 3.pdf
Module 3.pdf
Sitamarhi Institute of Technology
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
Chapter 4.ppt
Chapter 4.ppt
girmawodajo
Network Security of Data Protection
Network Security of Data Protection
UthsoNandy
Chapter 10.0
Chapter 10.0
Adebisi Tolulope
PROJECT REPORT.docx
PROJECT REPORT.docx
Sakamsivasankarreddy
Network Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
Network security
Network security
Simranpreet Singh
UTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
Sreerag cs network security
Sreerag cs network security
Sreerag Gopinath
Network security
Network security
mustafa aadel
Security communication
Security communication
Say Shyong
Computer networking
Computer networking
Sukrant Chandna
The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
Komlin1
Insecurity vssut
Insecurity vssut
RAVIKUMAR Digital Signal Processing
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
network security ppt.pptx
network security ppt.pptx
MijanurSepai1
Information Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
Wireless Networking
Wireless Networking
GulshanAra14
Data security
Data security
Soumen Mondal
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
mccormicknadine86
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
Cryptography and system security
Cryptography and system security
Gary Mendonca
NewIinternet security
NewIinternet security
university of mumbai
New internet security
New internet security
university of mumbai
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
sapnasaifi408
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
F La
More Related Content
Similar to Network and Security-2.pptx
PROJECT REPORT.docx
PROJECT REPORT.docx
Sakamsivasankarreddy
Network Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
Network security
Network security
Simranpreet Singh
UTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
Sreerag cs network security
Sreerag cs network security
Sreerag Gopinath
Network security
Network security
mustafa aadel
Security communication
Security communication
Say Shyong
Computer networking
Computer networking
Sukrant Chandna
The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
Komlin1
Insecurity vssut
Insecurity vssut
RAVIKUMAR Digital Signal Processing
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
network security ppt.pptx
network security ppt.pptx
MijanurSepai1
Information Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
Wireless Networking
Wireless Networking
GulshanAra14
Data security
Data security
Soumen Mondal
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
mccormicknadine86
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
Cryptography and system security
Cryptography and system security
Gary Mendonca
NewIinternet security
NewIinternet security
university of mumbai
New internet security
New internet security
university of mumbai
Similar to Network and Security-2.pptx
(20)
PROJECT REPORT.docx
PROJECT REPORT.docx
Network Security Fundamentals
Network Security Fundamentals
Network security
Network security
UTM Unified Threat Management
UTM Unified Threat Management
Sreerag cs network security
Sreerag cs network security
Network security
Network security
Security communication
Security communication
Computer networking
Computer networking
The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
Insecurity vssut
Insecurity vssut
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
network security ppt.pptx
network security ppt.pptx
Information Security Lecture Notes
Information Security Lecture Notes
Wireless Networking
Wireless Networking
Data security
Data security
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Cryptography and system security
Cryptography and system security
NewIinternet security
NewIinternet security
New internet security
New internet security
Recently uploaded
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
sapnasaifi408
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
F La
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
Emmanuel Dauda
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
soniya singh
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
voginip
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
limedy534
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Universitat Politècnica de Catalunya
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
shivangimorya083
How we prevented account sharing with MFA
How we prevented account sharing with MFA
Andrei Kaleshka
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
hf8803863
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
e4aez8ss
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
gstagge
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
Human37
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
vip Sarai Rohilla Call Girls 9999965857 Call or WhatsApp Now Book
vip Sarai Rohilla Call Girls 9999965857 Call or WhatsApp Now Book
manojkuma9823
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
YohFuh
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
ccctableauusergroup
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
yuu sss
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
Sonatrach
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Social Samosa
Recently uploaded
(20)
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
How we prevented account sharing with MFA
How we prevented account sharing with MFA
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
vip Sarai Rohilla Call Girls 9999965857 Call or WhatsApp Now Book
vip Sarai Rohilla Call Girls 9999965857 Call or WhatsApp Now Book
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Network and Security-2.pptx
1.
© 2016 NTT
DATA, Inc. 1 Why do we need security ? Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. Provide authentication and access control for resources Guarantee availability of resources
2.
© 2016 NTT
DATA, Inc. 2 Security attacks and countermeasures Finding a way into the network Firewalls Exploiting software bugs, buffer overflows Intrusion Detection Systems Denial of Service Ingress filtering, IDS TCP hijacking IPsec Packet sniffing Encryption (SSH, SSL, HTTPS) Social problems Education
3.
© 2016 NTT
DATA, Inc. 3 Secure administration principles Rule-based management A rule-based management is a system that comprises of a collection of 'if-then' statements that employs a series of defenses, to which rules are made on how to work on those assertions Firewall rules The Firewall helps a person getting his computer strong since it puts up some wall against the attacks so one should surely go for the firewall VLAN management Network segmentation with virtual local area networks (VLANs) creates a collection of isolated networks within the data center. Each network is a separate broadcast domain.VLAN segmentation severely hinders access to system attack surfaces.
4.
© 2016 NTT
DATA, Inc. 4 Secure administration principles Secure router configuration One must change the default username and password in the router manufacturer web pages to avoid hacking of the account information. Must change the default SSID, a network name used by the access points and routers, while configuring wireless security of the network used One has to enable the physical address or MAC address filtering; one has to disable the SSID broadcast feature of the network. Access control lists An access control list (ACL) is a catalogue of access control entries (ACE). In an ACL, each ACE identifies a trustee. It furthermore specifies the access rights, to be allowed, denied or audited, of that trustee
5.
© 2016 NTT
DATA, Inc. 5 Secure administration principles Port Security Port security mechanism is applied at interface level to block unauthorized users to connect to network Flood guards Sometimes the data traffic at the security networks and checkpoints goes to such unusual high volume that it signifies some malfunctioning running at some other end. This unusual extra float of traffic is referred as flood and the technology that is used to control the system there is known as flood guard. Loop protection Loop is a network building problem basically. The switches in the port are made so complex that the same node is used again and again and thus the network forms a loop. By the loop formation the ports gets jammed and thus the server either slows down or crashes. STP is one of the loop avoidance technology
6.
© 2016 NTT
DATA, Inc. 6 Secure administration principles Implicit deny After the primary check-up is over and if no permit entry found for that specific source automatically access to denied. Network separation The network is divided there for users or viewers or staff. Network is segmented based on users. Log analysis This is an authentication tool used in networks to find out the user specific tools or usage of the server.Thus is used to provide the details of any user's work in a server. Again they can be used to lock one user from using a tool or lock the operations that have been done by that particular user,
7.
© 2016 NTT
DATA, Inc. 7 IT Threats Threat- A potential cause of an incident that may result in harm to a system or organization Hardware and software failure - such as power loss or data corruption Malware - malicious software designed to disrupt computer operation Viruses - computer code that can copy itself and spread from one computer to another, often disrupting computer operations Spam, scams and phishing - unsolicited email that seeks to fool people into revealing personal details or buying fraudulent goods Human error - incorrect data processing, careless data disposal, or accidental opening of infected email attachments.
8.
© 2016 NTT
DATA, Inc. 8 IT Threats Hackers - people who illegally break into computer systems Fraud - using a computer to alter data for illegal benefit Passwords theft - often a target for malicious hackers Denial-of-service - online attacks that prevent website access for authorized users Security breaches - includes physical break-ins as well as online intrusion Natural disasters and IT systems Natural disasters such as fire, cyclone and floods also present risks to IT systems, data and infrastructure. Damage to buildings and computer hardware can result in loss or corruption of customer records/transactions
9.
© 2016 NTT
DATA, Inc. 9 Mitigation strategies Firewall configurations-Firewall configurations to be regularly reviewed and ensure that only the absolutely necessary configuration is active. When performing external penetration testing. Network segmentation according to security levels-Along with checking the firewall configuration, it is important to check that segregation is working effectively across all network egress and ingress points Strong/Complex passwords-All users set strong passwords that go beyond simply meeting the current password complexity criteria Web applications-Along with regular web application penetration testing, all applications should be securely coded using an appropriate methodology
10.
© 2016 NTT
DATA, Inc. 10 Mitigation strategies Limit admin privileges Patch management Usage of encryption technologies for user devices Define network access, Educate employees. Inventory authorized & unauthorized devices and Users Controlled network access based on risk posture Continuous vulnerability assessment and remediation
11.
© 2016 NTT
DATA, Inc. 11 Application Attacks ARP spoofing- is a type of attack in which a malicious actor sends falsified ARP messages over a local area network. A botnet- is a network of compromised computers under the control of a malicious actor. Each individual device in a botnet is referred to as a bot. Cache poisoning- is a type of attack in which corrupt data is inserted into the cache database of the Domain Name System (DNS) name server. Computer worms- are among the most common types of malware. They spread over computer networks by exploiting operating system vulnerabilities Key loggers- or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard.
12.
© 2016 NTT
DATA, Inc. 12 Malware- is short for “malicious software”: hostile applications that are created with the express intent to damage or disable mobile devices, computers or network servers. A man-in-the-middle (MITM) attack- is a type of cyber-attack where a malicious actor inserts him/herself into a conversation between two parties. A rootkit- is a computer program designed to provide privileged access to a computer while actively hiding its presence. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A spoofing attack- is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. Spyware- is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission Application Attacks
13.
© 2016 NTT
DATA, Inc. ) This document contains confidential Company information. Do not disclose it to third parties without permission from the Company.
Editor's Notes
.
Download now