Network security


Published on

About network security

Published in: Technology
  • Network Security Through Data Analysis: Building Situational Awareness ---
    Are you sure you want to  Yes  No
    Your message goes here
  • The Network Security Test Lab: A Step-by-Step Guide ---
    Are you sure you want to  Yes  No
    Your message goes here
  • Network Security For Dummies ---
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Network security

  2. 2. Define Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks.
  3. 3. Define Security: Security is “Freedom from risk or danger.“ The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  4. 4. Network security: Any activities designed to protect your network . Target- variety of threats and stops them from entering or spreading on your network. Handled by a network administrator.
  5. 5. Objective: • Access • Confidentiality • Authentication • Integrity • Non‐repudiation
  6. 6. History: During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.
  7. 7. Types: Five types of network security can aid in secure networking. • Physical security • Perimeter protection • User training and education • Wireless encryption protocol (WEP) • MAC address filtering
  8. 8.  We need multiple layers of security  Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  9. 9. Security tools: • Antivirus software packages • Secure network infrastructure • DNS hardware and software • Virtual private network • Identity services • Encryption • Security management
  10. 10. Network security technology : Different mechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text.  Secret Key Cryptography (SKC)
  11. 11. • Public Key Cryptography (PKC): • Hash Function: Hash function Plain text Cipher text
  12. 12.  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  13. 13. ◦ Packet Filtering Firewall ◦ State Full Firewall ◦ ApplicationAware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic.
  14. 14.  It is a good level of security between a web browser and a website.  There is a tunnel between them.  Clients present a certificate to the server to prove their identity.
  15. 15.  prevention of unauthorized access using wireless networks. Security Policies:  Wireless Intrusion Prevention System(WIPS)  Wireless Intrusion Detection System (WIDS) Implementation: Three components: sensor, server, and console.
  16. 16.  It is a short program aiming at securing communication over a network. Example: Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)
  17. 17.  Network Security Services (NSS) comprises a set of libraries  It develops security-enabled client and server applications. Some are: Mozilla client products, including Firefox etc Google Chrome Sun server products
  18. 18. Hardware Developments  Biometric systems -secure workstation logons  Smart cards -undeniable proof of a user’s identity. Software Developments  Current research develops security software using neural networks.  Objective- use neural networks for the facial recognition software.
  19. 19. The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.
  20. 20.  The network security field evolve more rapidly to deal with the threats further in the future. “As threats tweaks, Security tremendously Tweaks”
  21. 21. By , I.Madhumithah V.Kalpana