Network security in the sense, they are the practices and technologies that a business putting place to protect its IT infrastructure. Infrastructure in the sense it is made up of all the programs, data, applications, networks, software and hardware that are managed by the business. Network security is more important simply because we are living in a Digital-First world. Digital-First world is composed with advanced as more and more people that who expects everyday transactions, services and information that must to be readily available at their fingertips on time and wherever they are being at any moment. If a business process couldn’t consider or provide with these expectations, consumers do find one that provides those expectations.
2. CONTENTS
1. What is Network?
2. Network Security Devices
3. Network Security Protocols
4. Comparison between 2 Protocols
5. Importance of Network Security
6. Conclusion
2
3. WHAT IS NETWORK?
Network is a system that connects two or more devices connected to
one another able to exchange data.
The purpose of a network is to share resources and more processes.
A network is a collection of computer, servers, network devices, or
other devices connected to one another able to exchange data.
3
4. WHAT IS NETWORK SECURITY?
Devices, tools, techniques and also methodologies that are used to
secure a network.
Protecting the Network from Intruders.
Regulating access to Network resources.
Requiring network users to Authenticate.
4
5. NETWORK SECURITY DEVICES
Below are the Network Security devices;
1. Firewall
2. Proxy Server
3. Intrusion Detection System
4. Intrusion Prevention System
5
6. 1. FIREWALL
Is a set of hardware and software tool.
A choke point of control and monitoring.
Interconnect networks with different trusts.
Provides NAT and usage monitoring.
Implementing VPN’s using IPSec.
Auditing And controlling accesses.
6
7. 2. PROXY
A proxy is an entity with the authority to act on behalf of another
one.
Proxy servers sit between a client and an untrusted network system
such as Internet.
Prevents direct accesses with untrusted systems.
Requests of client’s are directed to proxies.
7
8. 3. INTRUSION DETECTION SYSTEM
Is a system that monitors the traffics on a network for suspicious
activities.
Issues alerts when a threat/issue activity is been discovered.
Normally detects and reports for threats.
Also monitors the network packets whether that they are suitable for
the network and checks whether loads network traffic insecurely.
Advantages:
Disadvantages:
8
9. 4. INTRUSION PREVENTION
SYSTEM
Detects and Prevents threats and unauthorized accesses.
Detects irregular traffics and prevents intrusions before costly
damages occur.
Deploying using sensors.
Uses signatures to detect patterns of misuse in network traffics.
Secure the network system with any damages.
9
10. NETWORK SECURITY PROTOCOLS
Below are the Network Security Protocols;
1. Simple Network Management Protocol
2. Dynamic Host Configuration Protocol
3. Secure Socket Layer
4. Internet Protocol Security
5. Remote Network Monitoring
6. File Transfer Protocol
10
11. 1.SIMPLE NETWORK MANAGEMENT
PROTOCOL
Allows to monitor the network
This is a application layer protocol used to manage and monitor
network devices and their functions.
Enables a network administrator to manage and monitor all of those
nodes from a single interface, which can typically support batch
commands and automatic alerts.
No – Wasting of time, Resources, Knowledge etc.
11
12. 2. DYNAMIC HOST CONFIGURATION
PROTOCOL
Enables a server to assign an IP address automatically to a computer
from an exacted range of numbers that had configured to a given
network.
DHCP is a secure system because of its dynamic IP assigning system.
Used to issue unique IP addresses and automatically configure other
network information.
The working process is as below.
12
13. 3. SECURE SOCKET LAYER
Used for secure transmission of information over a network.
Encrypts the network connection segments above the transport
layer, which is a network connection component above the program
layer.
Through this SSL protocol Data integrity, Data privacy, Client-Server
authentication and more objectives are being held.
13
14. 4. INTERNET PROTOCOL SECURITY
Is a set of procedures that affords security for the Internet Protocol.
This uses cryptography (solving codes) to provide security.
Used for setup of the virtual private networks (VPNs) in a secure and
possible manner.
Consists with 2 services: Authentication Header & Encapsulating
Security Payload (ESP).
And consists with 2 models: Tunnel mode & Transport mode.
14
15. 5. REMOTE NETWORK MONITORING
Enables various network monitors and console systems to exchange
network monitoring data.
RMON is developed to address the issue of remote sites and Local
area network segment management from a centralized location.
Monitoring devices contains RMON software agents that collect
information and analyze packets through the network.
Collects 9 kinds of information:
15
16. 6. FILE TRANSFER PROTOCOL
This is used for transferring files with smaller and larger in sizes
across a network securely.
Processes between two computers and users.
FTP provides facility to transfer files via remote accessed computers
with easy and efficient data transfer.
Below is the process;
16
18. IMPORTANCE OF NETWORK
SECURITY
To process the network continuously.
Availability of the network.
Protect data from threats and to protect the policies.
To safeguard the assets of the company.
Enhance Network Performance.
18