SlideShare a Scribd company logo
1 of 19
SUBMITTED BY-
Himanshu Varshneya
B.Tech.-IT(VIII Semester)
  IIMET, Jaipur
 What is security

 Why do we need security

 Basic Terminology

 Security Management

 Attacks

 Others Securities

 Wireless Security

 Firewall

 Virtual Private Network
 Freedom from risk or danger; safety.

 Freedom from doubt, anxiety, or fear; confidence.

 Information Security -

    Information security = confidentiality + integrity +
                availability + authentication
 Authorization of access to data in a network, which is

  controlled by the network administrator.
 To prevent and monitor unauthorized
  access, misuse, modification, or denial of a computer
  network and network-accessible resources.
 Protect vital information while still allowing access to those
  who need it.
 Provide authentication and access control for resource.

 Guarantee availability of resources.

 To prevent malicious attacks from hacking and spamming
 Identification

 Authentication

 Access Control (Authorization)

 Confidentiality

 Integrity

 Nonrepudiation

 Availability
 Homes & Small Businesses

        Basic Firewall , Basic Antivirus software, Passwords for all accounts.

 Medium businesses

       Strong Firewall, Internet Security Software, Virtual Private Network.

 Large businesses

       Strong Firewall and Proxy, Strong Antivirus software, Physical Security
        Management

 Large government

       Strong Firewall and Proxy, Strong Encryption, Whitelist authorized
        wireless connection
 Passive Attacks
     Wiretapping

     Port scanner

     Idle scan

   Active Attacks
     Denial-of-service attack

     Spoofing

     Man in the middle

     ARP poisoning

     Smurf attack

     Buffer overflow

     Heap overflow

     Format string attack

     SQL injection
 Cloud computing security
      A set of policies, technologies, and controls to protect data,
      applications.
 Crime ware
      A class of malware designed specifically to automate cybercrime.

 Cyber security standards
     ISO/IEC 27002
    IT Baseline Protection Catalogs
 Data loss prevention
      Information Leak Detection and Prevention (ILDP)
      Information Leak Prevention (ILP)
      Content Monitoring and Filtering (CMF)
      Information Protection and Control (IPC)
 Wireless security is the prevention of unauthorized access or
  damage to computers using wireless networks.
 WLAN uses spread-spectrum or OFDM modulation technology
 wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi
  Protected Access (WPA)
 Wireless Intrusion Prevention Systems (WIPS) or Wireless
  Intrusion Detection Systems (WIDS) common used technique.

    Ad-hoc networks
    Non-traditional networks
    Man-in-the-middle attacks
    Denial of service
Independent Topology



      BSS



                                  BSS




                 Ad-hoc network
 Infrastructure topology using multiple

                        BSS




                                                 AP: Access Point
                         AP


            AP                             AP




                                           BSS
           BSS
                      wired network
 Effective means of protection a local system or network of
  systems from network-based security threats while
  affording access to the outside world via WAN`s or the
  Internet.



 Aims:
   Establish a controlled link
   Protect the premises network from Internet-based attacks
   Provide a single choke point
 Design goals:


   All traffic from inside to outside must pass through the
    firewall (physically blocking all access to the local
    network except via the firewall)

   Only authorized traffic (defined by the local security
    police) will be allowed to pass
 Three common types of Firewalls:
   Packet-filtering routers
      Applies a set of rules to each incoming IP packet and then forwards
       or discards the packet
      Filter packets going in both directions, policies (discard or forward)
   Application-level gateways
      Also called proxy server
      Acts as a relay of application-level traffic

   Circuit-level gateways
      Specialized function performed by an Application-level Gateway
      Sets up two TCP connections

   (Bastion host)
      The bastion host serves as a platform for an application-level or
       circuit-level gateway
 A VPN is a means of transporting traffic in a secure manner
  over an unsecured network.
 A VPN usually achieves this by employing some
  combination of encryption, authentication, and tunneling.
 "Tunneling" (encapsulation) refers to the process of
  encapsulating or embedding one network protocol to be
  carried within the packets of a second network.

   Point-to-Point Tunneling Protocol (PPTP);
   Layer 2 Tunneling Protocol (L2TP);
   Internet Protocol Security (IPSec);
   SOCKS.
Network security

More Related Content

What's hot

Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeIkhtiar Khan Sohan
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 

What's hot (20)

Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Network security
Network securityNetwork security
Network security
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Ch01
Ch01Ch01
Ch01
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network security
 Network security Network security
Network security
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 

Viewers also liked

Viewers also liked (6)

Presentación de economía
Presentación de economía Presentación de economía
Presentación de economía
 
Oprincipemaquiavel
OprincipemaquiavelOprincipemaquiavel
Oprincipemaquiavel
 
U arq2014 1-leopoldo_plentz_lilianmartins
U arq2014 1-leopoldo_plentz_lilianmartinsU arq2014 1-leopoldo_plentz_lilianmartins
U arq2014 1-leopoldo_plentz_lilianmartins
 
Residencial
ResidencialResidencial
Residencial
 
ERP SAP : uma simulação.
ERP SAP : uma simulação.ERP SAP : uma simulação.
ERP SAP : uma simulação.
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 

Similar to Network security

Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptxrishi707971
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 

Similar to Network security (20)

Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Network security
Network security Network security
Network security
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptx
 
Network security
Network securityNetwork security
Network security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 

More from Harsh Kishore Mishra

More from Harsh Kishore Mishra (12)

Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Big data
Big dataBig data
Big data
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
 
Windows 7 Versions Features
Windows 7 Versions FeaturesWindows 7 Versions Features
Windows 7 Versions Features
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Network security

  • 2.  What is security  Why do we need security  Basic Terminology  Security Management  Attacks  Others Securities  Wireless Security  Firewall  Virtual Private Network
  • 3.  Freedom from risk or danger; safety.  Freedom from doubt, anxiety, or fear; confidence.  Information Security - Information security = confidentiality + integrity + availability + authentication  Authorization of access to data in a network, which is controlled by the network administrator.
  • 4.  To prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.  Protect vital information while still allowing access to those who need it.  Provide authentication and access control for resource.  Guarantee availability of resources.  To prevent malicious attacks from hacking and spamming
  • 5.  Identification  Authentication  Access Control (Authorization)  Confidentiality  Integrity  Nonrepudiation  Availability
  • 6.  Homes & Small Businesses Basic Firewall , Basic Antivirus software, Passwords for all accounts.  Medium businesses Strong Firewall, Internet Security Software, Virtual Private Network.  Large businesses Strong Firewall and Proxy, Strong Antivirus software, Physical Security Management  Large government Strong Firewall and Proxy, Strong Encryption, Whitelist authorized wireless connection
  • 7.  Passive Attacks  Wiretapping  Port scanner  Idle scan  Active Attacks  Denial-of-service attack  Spoofing  Man in the middle  ARP poisoning  Smurf attack  Buffer overflow  Heap overflow  Format string attack  SQL injection
  • 8.
  • 9.  Cloud computing security A set of policies, technologies, and controls to protect data, applications.  Crime ware A class of malware designed specifically to automate cybercrime.  Cyber security standards ISO/IEC 27002 IT Baseline Protection Catalogs  Data loss prevention Information Leak Detection and Prevention (ILDP) Information Leak Prevention (ILP) Content Monitoring and Filtering (CMF) Information Protection and Control (IPC)
  • 10.  Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.  WLAN uses spread-spectrum or OFDM modulation technology  wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)  Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) common used technique.  Ad-hoc networks  Non-traditional networks  Man-in-the-middle attacks  Denial of service
  • 11. Independent Topology BSS BSS Ad-hoc network
  • 12.  Infrastructure topology using multiple BSS AP: Access Point AP AP AP BSS BSS wired network
  • 13.  Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet.  Aims:  Establish a controlled link  Protect the premises network from Internet-based attacks  Provide a single choke point
  • 14.  Design goals:  All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall)  Only authorized traffic (defined by the local security police) will be allowed to pass
  • 15.
  • 16.
  • 17.  Three common types of Firewalls:  Packet-filtering routers  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions, policies (discard or forward)  Application-level gateways  Also called proxy server  Acts as a relay of application-level traffic  Circuit-level gateways  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  (Bastion host)  The bastion host serves as a platform for an application-level or circuit-level gateway
  • 18.  A VPN is a means of transporting traffic in a secure manner over an unsecured network.  A VPN usually achieves this by employing some combination of encryption, authentication, and tunneling.  "Tunneling" (encapsulation) refers to the process of encapsulating or embedding one network protocol to be carried within the packets of a second network.  Point-to-Point Tunneling Protocol (PPTP);  Layer 2 Tunneling Protocol (L2TP);  Internet Protocol Security (IPSec);  SOCKS.