SlideShare a Scribd company logo
1 of 17
NETWORK SECURITY
NAME OF THE STAFF : Mrs. M. FLORANCE
DYANA
NAME OF THE STUDENT : S.MAREESWARI,
J.GAYATHRI DEVI,
R.KAVITHA.
REGISTER NUMBER : CB17S 250393
CB17S 250370
CB17S 250383
SUBJECT CODE : P8MCA27
CLASS : III BCA-A
BATCH : 2017-2020
YEAR : 2019-2020
 Introduction
 Intruders
 Classification of ID system
 Malicious software
 Types of virus
 Firewalls
 Characteristics of firewalls
 Firewalls responsibilities
Introduction
 The security mechanism of the system are designed so as to praventum
authorized access to system resources and data.
 Intrusion detection (ID) is type of security management system for
computers and networks.
 ID gathers and analyse information from various areas with in
computer or a network to identify possible security breaches which
include both intrusion and misuse.
 ID uses vulnerability assessment (scanning), that is software
technology developed for assess the security of computer system or
network.
INTRUDERS
 Intruder is a person who enters in territory that does not
belongs to him
Types:
 Masquerader
Not authorized to use computer, penetrates system protection
by the way of legitimate user account.
 Misfeasor
A legitimate user who can access assets that he is not
authorized to.
 Clandestine user
A user who gains supervisory access to the system, can be
either inside or outside.
 Unauthorized access is an attempt for
 Accessing information.
 Manipulation of information.
 Render a system unreliable or unusable.
 Need for Intrusion Detection System
 To prevent problem behaviours.
 To detect attack and other security violation.
 To detect and deal with preambles of attack.
 To document the existing threats.
 quality control for security design and administration.
 To provide useful information about intrusion that is to take place, allowing
improved diagnosis , recovery and corrections.
Intrution detection
 Monitoring and analysing both user and
system activities.
 analysing system configurations and
vulnerabilite.
 Assessing system and file security.
 Ability to recognize patterns of attacks.
 Analysis of abnormal activity patterns.
 Tracking user policy violation.
Classification of ID system
 Attempted break-ins : which are detected by
atypical behaviour profiles or violation of
security constraints.
 Masquerade Attacks: which are detected by
atypical behaviour profiles.
 Penetration of security control system, which is
detected by monitoring for specific patterns of
activity.
 Leakage, which is detected by atypical use of
system resources.
 Denial of Service, which is detected by atypical
use of system resources Malicious.
Malicious software
 Is referred as Malware
 It includes computer viruses, worms,
Trojans, spywares, and other programs
written specially to spy network traffic,
 record private communications , executes
unauthorized commands,
 steal and distribute private and confidential
information , disable computers , erase files
etc.
Types of viruses
 Parasitic viruses:
 Virus that attached self to file in order to propagation
Boot Sector Virus.
 Polymorphic virus .
 A virus that changes its characteristics with each
infections and makes detection more difficult.
 Virus that hides it stracks after in facting computer.
 Macro virus
 Hybrids
 Email Viruses
 Types of Worms
 Email Worms
 Spreading goes through infected email messages
 Instant messaging worms
 Spreads via instant messaging applications by
sending links to infected websites
 Internet worms
 Will scan available network resources using
local network or operating system service
 IRC worms
 Chat channels are the main target of this kind
of worm
 File worms sharing and network
 Worm copies itself into shared folder
 Trojan Horses
 Contains hidden code that, when invoked
performs some unwanted function
 Only author of trojan horse program can have an
access to source code of useful programs that is
attractive to other users and then add code so that
the program performs some harmful function in
addition to its useful function.
 Spyware
 Is a programming that is put in someone’s
computer to secretly gather information about the
user and rely it to advertiser other
interestedparties
FIREWALL
Introduction
 Is a system designed to prevent unauthorized access to or from private
network.
 It can be effective means of protecting local system or network of systems
from unauthorized network users, at the same time affording access to the
outside world via WAN and internet.
 Firewalls is the one of the first line defense in a network.
 They can be implemented both in hardware and software
 Firewall are most often configured to be transparent to internal network
user and non transparent to outside network users.
 They are often installed between network of entire organization and
internet, but could also be installed in an internet to protect individuals
document.
Characteristics of firewalls
 All traffic between two network must pass
through firewall
 Only traffic that is authorized by local security
policy is permitted to pass
 The firewall itself is immune to penetration
 A firewall cannot guarantee protection from
outside attack Firewall implementation
requires risk analysis to define the level of
protection
 Firewall policy is a competent of local policy
Firewalls responsibilities
 Block unwanted traffic
 Direct incoming traffic to more trustworthy internal system
 Hide vulnerable internal network system
 Hide internal network information such as system names, network
topology, network device types, internal user id’s etc
 Provide more robust user authentication
 Benefits
 Increased ability to enforce network security standards/
policies
 Centralization of inter network audit capability
Limitation of firewalls
 Firewall does not provide data integrity
 Firewall do not check traffic not sent through them
 Firewall protect nothing if they have been
compromised
 Firewall authenticate data packets at the transport
and network layer.
 Firewall provides limited confidentiality
 Firewall do not protect against insider threats
 Encrypted traffic cannot ne examined and filtered

More Related Content

What's hot

Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)SHUBHA CHATURVEDI
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Intruders detection
Intruders detectionIntruders detection
Intruders detectionEhtisham Ali
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasinewbie2019
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 

What's hot (20)

Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Attack types
Attack typesAttack types
Attack types
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Cyber security
Cyber security Cyber security
Cyber security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 

Similar to System Security- Firewalls and ID System

unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxVinayPratap58
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of CybersecurityRemote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of CybersecurityMaryJWilliams2
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 

Similar to System Security- Firewalls and ID System (20)

unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Data security
Data securityData security
Data security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of CybersecurityRemote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

System Security- Firewalls and ID System

  • 1. NETWORK SECURITY NAME OF THE STAFF : Mrs. M. FLORANCE DYANA NAME OF THE STUDENT : S.MAREESWARI, J.GAYATHRI DEVI, R.KAVITHA. REGISTER NUMBER : CB17S 250393 CB17S 250370 CB17S 250383 SUBJECT CODE : P8MCA27 CLASS : III BCA-A BATCH : 2017-2020 YEAR : 2019-2020
  • 2.
  • 3.  Introduction  Intruders  Classification of ID system  Malicious software  Types of virus  Firewalls  Characteristics of firewalls  Firewalls responsibilities
  • 4. Introduction  The security mechanism of the system are designed so as to praventum authorized access to system resources and data.  Intrusion detection (ID) is type of security management system for computers and networks.  ID gathers and analyse information from various areas with in computer or a network to identify possible security breaches which include both intrusion and misuse.  ID uses vulnerability assessment (scanning), that is software technology developed for assess the security of computer system or network.
  • 5. INTRUDERS  Intruder is a person who enters in territory that does not belongs to him Types:  Masquerader Not authorized to use computer, penetrates system protection by the way of legitimate user account.  Misfeasor A legitimate user who can access assets that he is not authorized to.  Clandestine user A user who gains supervisory access to the system, can be either inside or outside.
  • 6.  Unauthorized access is an attempt for  Accessing information.  Manipulation of information.  Render a system unreliable or unusable.  Need for Intrusion Detection System  To prevent problem behaviours.  To detect attack and other security violation.  To detect and deal with preambles of attack.  To document the existing threats.  quality control for security design and administration.  To provide useful information about intrusion that is to take place, allowing improved diagnosis , recovery and corrections.
  • 7. Intrution detection  Monitoring and analysing both user and system activities.  analysing system configurations and vulnerabilite.  Assessing system and file security.  Ability to recognize patterns of attacks.  Analysis of abnormal activity patterns.  Tracking user policy violation.
  • 8. Classification of ID system  Attempted break-ins : which are detected by atypical behaviour profiles or violation of security constraints.  Masquerade Attacks: which are detected by atypical behaviour profiles.  Penetration of security control system, which is detected by monitoring for specific patterns of activity.  Leakage, which is detected by atypical use of system resources.  Denial of Service, which is detected by atypical use of system resources Malicious.
  • 9. Malicious software  Is referred as Malware  It includes computer viruses, worms, Trojans, spywares, and other programs written specially to spy network traffic,  record private communications , executes unauthorized commands,  steal and distribute private and confidential information , disable computers , erase files etc.
  • 10. Types of viruses  Parasitic viruses:  Virus that attached self to file in order to propagation Boot Sector Virus.  Polymorphic virus .  A virus that changes its characteristics with each infections and makes detection more difficult.  Virus that hides it stracks after in facting computer.
  • 11.  Macro virus  Hybrids  Email Viruses  Types of Worms  Email Worms  Spreading goes through infected email messages  Instant messaging worms  Spreads via instant messaging applications by sending links to infected websites
  • 12.  Internet worms  Will scan available network resources using local network or operating system service  IRC worms  Chat channels are the main target of this kind of worm  File worms sharing and network  Worm copies itself into shared folder
  • 13.  Trojan Horses  Contains hidden code that, when invoked performs some unwanted function  Only author of trojan horse program can have an access to source code of useful programs that is attractive to other users and then add code so that the program performs some harmful function in addition to its useful function.  Spyware  Is a programming that is put in someone’s computer to secretly gather information about the user and rely it to advertiser other interestedparties
  • 14. FIREWALL Introduction  Is a system designed to prevent unauthorized access to or from private network.  It can be effective means of protecting local system or network of systems from unauthorized network users, at the same time affording access to the outside world via WAN and internet.  Firewalls is the one of the first line defense in a network.  They can be implemented both in hardware and software  Firewall are most often configured to be transparent to internal network user and non transparent to outside network users.  They are often installed between network of entire organization and internet, but could also be installed in an internet to protect individuals document.
  • 15. Characteristics of firewalls  All traffic between two network must pass through firewall  Only traffic that is authorized by local security policy is permitted to pass  The firewall itself is immune to penetration  A firewall cannot guarantee protection from outside attack Firewall implementation requires risk analysis to define the level of protection  Firewall policy is a competent of local policy
  • 16. Firewalls responsibilities  Block unwanted traffic  Direct incoming traffic to more trustworthy internal system  Hide vulnerable internal network system  Hide internal network information such as system names, network topology, network device types, internal user id’s etc  Provide more robust user authentication  Benefits  Increased ability to enforce network security standards/ policies  Centralization of inter network audit capability
  • 17. Limitation of firewalls  Firewall does not provide data integrity  Firewall do not check traffic not sent through them  Firewall protect nothing if they have been compromised  Firewall authenticate data packets at the transport and network layer.  Firewall provides limited confidentiality  Firewall do not protect against insider threats  Encrypted traffic cannot ne examined and filtered