SlideShare a Scribd company logo
1 of 21
NETWORK SECURITY I.M.ILHAM
HND 39
1
CONTENTS
1. What is Network?
2. Network Security Devices
3. Network Security Protocols
4. Comparison between 2 Protocols
5. Importance of Network Security
6. Conclusion
2
WHAT IS NETWORK?
Network is a system that connects two or more devices connected to
one another able to exchange data.
The purpose of a network is to share resources and more processes.
A network is a collection of computer, servers, network devices, or
other devices connected to one another able to exchange data.
3
WHAT IS NETWORK SECURITY?
 Devices, tools, techniques and also methodologies that are used to
secure a network.
 Protecting the Network from Intruders.
 Regulating access to Network resources.
 Requiring network users to Authenticate.
4
NETWORK SECURITY DEVICES
Below are the Network Security devices;
1. Firewall
2. Proxy Server
3. Intrusion Detection System
4. Intrusion Prevention System
5
1. FIREWALL
 Is a set of hardware and software tool.
 A choke point of control and monitoring.
 Interconnect networks with different trusts.
 Provides NAT and usage monitoring.
 Implementing VPN’s using IPSec.
 Auditing And controlling accesses.
6
2. PROXY
 A proxy is an entity with the authority to act on behalf of another
one.
 Proxy servers sit between a client and an untrusted network system
such as Internet.
 Prevents direct accesses with untrusted systems.
 Requests of client’s are directed to proxies.
7
3. INTRUSION DETECTION SYSTEM
 Is a system that monitors the traffics on a network for suspicious
activities.
 Issues alerts when a threat/issue activity is been discovered.
 Normally detects and reports for threats.
 Also monitors the network packets whether that they are suitable for
the network and checks whether loads network traffic insecurely.
 Advantages:
 Disadvantages:
8
4. INTRUSION PREVENTION
SYSTEM
 Detects and Prevents threats and unauthorized accesses.
 Detects irregular traffics and prevents intrusions before costly
damages occur.
 Deploying using sensors.
 Uses signatures to detect patterns of misuse in network traffics.
 Secure the network system with any damages.
9
NETWORK SECURITY PROTOCOLS
Below are the Network Security Protocols;
1. Simple Network Management Protocol
2. Dynamic Host Configuration Protocol
3. Secure Socket Layer
4. Internet Protocol Security
5. Remote Network Monitoring
6. File Transfer Protocol
10
1.SIMPLE NETWORK MANAGEMENT
PROTOCOL
 Allows to monitor the network
 This is a application layer protocol used to manage and monitor
network devices and their functions.
 Enables a network administrator to manage and monitor all of those
nodes from a single interface, which can typically support batch
commands and automatic alerts.
 No – Wasting of time, Resources, Knowledge etc.
11
2. DYNAMIC HOST CONFIGURATION
PROTOCOL
 Enables a server to assign an IP address automatically to a computer
from an exacted range of numbers that had configured to a given
network.
 DHCP is a secure system because of its dynamic IP assigning system.
 Used to issue unique IP addresses and automatically configure other
network information.
 The working process is as below.
12
3. SECURE SOCKET LAYER
 Used for secure transmission of information over a network.
 Encrypts the network connection segments above the transport
layer, which is a network connection component above the program
layer.
 Through this SSL protocol Data integrity, Data privacy, Client-Server
authentication and more objectives are being held.
13
4. INTERNET PROTOCOL SECURITY
 Is a set of procedures that affords security for the Internet Protocol.
 This uses cryptography (solving codes) to provide security.
 Used for setup of the virtual private networks (VPNs) in a secure and
possible manner.
 Consists with 2 services: Authentication Header & Encapsulating
Security Payload (ESP).
 And consists with 2 models: Tunnel mode & Transport mode.
14
5. REMOTE NETWORK MONITORING
 Enables various network monitors and console systems to exchange
network monitoring data.
 RMON is developed to address the issue of remote sites and Local
area network segment management from a centralized location.
 Monitoring devices contains RMON software agents that collect
information and analyze packets through the network.
 Collects 9 kinds of information:
15
6. FILE TRANSFER PROTOCOL
 This is used for transferring files with smaller and larger in sizes
across a network securely.
 Processes between two computers and users.
 FTP provides facility to transfer files via remote accessed computers
with easy and efficient data transfer.
 Below is the process;
16
COMPARISON BETWEEN 2
PROTOCOLS
17
Simple Network Management Protocol Remote Network Monitoring
Monitors network performance Manages and monitoring servers,
devices
Audit network usage Offline monitoring
Detects network failures Proactive monitoring
Configure remote devices Client reporting
Detects inappropriate accesses Offers backups and antivirus
IMPORTANCE OF NETWORK
SECURITY
 To process the network continuously.
 Availability of the network.
 Protect data from threats and to protect the policies.
 To safeguard the assets of the company.
 Enhance Network Performance.
18
19
CONCLUSIO
N!
ANY QUESTION? Proceed!
20
21
THE
END!

More Related Content

What's hot

FIREWALL
FIREWALL FIREWALL
FIREWALL Akash R
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 
Firewall
FirewallFirewall
FirewallApo
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015mauimarketing
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 

What's hot (19)

Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall
FirewallFirewall
Firewall
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Security standard
Security standardSecurity standard
Security standard
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Firewall
FirewallFirewall
Firewall
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Firewall
FirewallFirewall
Firewall
 

Similar to Network Security

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?ezoicxcom
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxsaad504633
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?haq107457
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAVSAHU55
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdfElegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdfJankharlaQuintero
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 

Similar to Network Security (20)

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdfElegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Firewall
FirewallFirewall
Firewall
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Network Security

  • 2. CONTENTS 1. What is Network? 2. Network Security Devices 3. Network Security Protocols 4. Comparison between 2 Protocols 5. Importance of Network Security 6. Conclusion 2
  • 3. WHAT IS NETWORK? Network is a system that connects two or more devices connected to one another able to exchange data. The purpose of a network is to share resources and more processes. A network is a collection of computer, servers, network devices, or other devices connected to one another able to exchange data. 3
  • 4. WHAT IS NETWORK SECURITY?  Devices, tools, techniques and also methodologies that are used to secure a network.  Protecting the Network from Intruders.  Regulating access to Network resources.  Requiring network users to Authenticate. 4
  • 5. NETWORK SECURITY DEVICES Below are the Network Security devices; 1. Firewall 2. Proxy Server 3. Intrusion Detection System 4. Intrusion Prevention System 5
  • 6. 1. FIREWALL  Is a set of hardware and software tool.  A choke point of control and monitoring.  Interconnect networks with different trusts.  Provides NAT and usage monitoring.  Implementing VPN’s using IPSec.  Auditing And controlling accesses. 6
  • 7. 2. PROXY  A proxy is an entity with the authority to act on behalf of another one.  Proxy servers sit between a client and an untrusted network system such as Internet.  Prevents direct accesses with untrusted systems.  Requests of client’s are directed to proxies. 7
  • 8. 3. INTRUSION DETECTION SYSTEM  Is a system that monitors the traffics on a network for suspicious activities.  Issues alerts when a threat/issue activity is been discovered.  Normally detects and reports for threats.  Also monitors the network packets whether that they are suitable for the network and checks whether loads network traffic insecurely.  Advantages:  Disadvantages: 8
  • 9. 4. INTRUSION PREVENTION SYSTEM  Detects and Prevents threats and unauthorized accesses.  Detects irregular traffics and prevents intrusions before costly damages occur.  Deploying using sensors.  Uses signatures to detect patterns of misuse in network traffics.  Secure the network system with any damages. 9
  • 10. NETWORK SECURITY PROTOCOLS Below are the Network Security Protocols; 1. Simple Network Management Protocol 2. Dynamic Host Configuration Protocol 3. Secure Socket Layer 4. Internet Protocol Security 5. Remote Network Monitoring 6. File Transfer Protocol 10
  • 11. 1.SIMPLE NETWORK MANAGEMENT PROTOCOL  Allows to monitor the network  This is a application layer protocol used to manage and monitor network devices and their functions.  Enables a network administrator to manage and monitor all of those nodes from a single interface, which can typically support batch commands and automatic alerts.  No – Wasting of time, Resources, Knowledge etc. 11
  • 12. 2. DYNAMIC HOST CONFIGURATION PROTOCOL  Enables a server to assign an IP address automatically to a computer from an exacted range of numbers that had configured to a given network.  DHCP is a secure system because of its dynamic IP assigning system.  Used to issue unique IP addresses and automatically configure other network information.  The working process is as below. 12
  • 13. 3. SECURE SOCKET LAYER  Used for secure transmission of information over a network.  Encrypts the network connection segments above the transport layer, which is a network connection component above the program layer.  Through this SSL protocol Data integrity, Data privacy, Client-Server authentication and more objectives are being held. 13
  • 14. 4. INTERNET PROTOCOL SECURITY  Is a set of procedures that affords security for the Internet Protocol.  This uses cryptography (solving codes) to provide security.  Used for setup of the virtual private networks (VPNs) in a secure and possible manner.  Consists with 2 services: Authentication Header & Encapsulating Security Payload (ESP).  And consists with 2 models: Tunnel mode & Transport mode. 14
  • 15. 5. REMOTE NETWORK MONITORING  Enables various network monitors and console systems to exchange network monitoring data.  RMON is developed to address the issue of remote sites and Local area network segment management from a centralized location.  Monitoring devices contains RMON software agents that collect information and analyze packets through the network.  Collects 9 kinds of information: 15
  • 16. 6. FILE TRANSFER PROTOCOL  This is used for transferring files with smaller and larger in sizes across a network securely.  Processes between two computers and users.  FTP provides facility to transfer files via remote accessed computers with easy and efficient data transfer.  Below is the process; 16
  • 17. COMPARISON BETWEEN 2 PROTOCOLS 17 Simple Network Management Protocol Remote Network Monitoring Monitors network performance Manages and monitoring servers, devices Audit network usage Offline monitoring Detects network failures Proactive monitoring Configure remote devices Client reporting Detects inappropriate accesses Offers backups and antivirus
  • 18. IMPORTANCE OF NETWORK SECURITY  To process the network continuously.  Availability of the network.  Protect data from threats and to protect the policies.  To safeguard the assets of the company.  Enhance Network Performance. 18