Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Network Security Goals
Islahuddin Jalal Lecturer at
Faculty of Computer Science
Kabul Education University(KEU), Kabul
Outlines to be discussed………
• Network Security
• Goals of Network Security
• Confidentiality
• Integrity
• Availability
Network Security
• Process of taking
• physical and software preventative measures to protect
the underlying networking in...
Goals of Network Security
• Confidentiality
• Integrity
• Availability
Confidentiality
What to do for Confidentiality?
Encryption
Integrity
What to do for Integrity?
Hashing
Availability
What to do for Availability?
• Developing efficient network design
• Preventing Malicious activity (DDoS)
• Having suffici...
Conclusion
• Hide the data or information from
unauthorized people
• Prevent unauthorized modification
• Prevent a loss of...
END
Thank you very much for your patience
Faculty of Computer Science
Kabul Education University(KEU), Kabul
Network Security Goals
Network Security Goals
Upcoming SlideShare
Loading in …5
×

Network Security Goals

4,337 views

Published on

Macro Teaching Presentation

Published in: Education
  • Login to see the comments

  • Be the first to like this

Network Security Goals

  1. 1. Network Security Goals Islahuddin Jalal Lecturer at Faculty of Computer Science Kabul Education University(KEU), Kabul
  2. 2. Outlines to be discussed……… • Network Security • Goals of Network Security • Confidentiality • Integrity • Availability
  3. 3. Network Security • Process of taking • physical and software preventative measures to protect the underlying networking infrastructure from • unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, • thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.
  4. 4. Goals of Network Security • Confidentiality • Integrity • Availability
  5. 5. Confidentiality
  6. 6. What to do for Confidentiality? Encryption
  7. 7. Integrity
  8. 8. What to do for Integrity? Hashing
  9. 9. Availability
  10. 10. What to do for Availability? • Developing efficient network design • Preventing Malicious activity (DDoS) • Having sufficient bandwidth • Removing Duplex Mismatches
  11. 11. Conclusion • Hide the data or information from unauthorized people • Prevent unauthorized modification • Prevent a loss of access to resources by the authorized user
  12. 12. END Thank you very much for your patience Faculty of Computer Science Kabul Education University(KEU), Kabul

×