During the 1980s, the hackers and crimes
were beginning to emerge.
CERT was created to overcome network
In the 1990s, Internet became public and the
security concerns increased tremendously.
Five types of network security can aid in secure
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
We need multiple layers of
Network security is
hardware and software.
Network security components:
Anti-virus and anti-spyware
Intrusion prevention systems
Virtual Private Networks
Network security technology :
Different mechanisms to deal with these
plaintext is converted in to cipher text.
Secret Key Cryptography (SKC)
• Public Key Cryptography (PKC):
• Hash Function:
Plain text Cipher text
A typical border control mechanism.
Metaphor for network security.
Designed to prevent unauthorized access
to or from a private network.
◦ Packet Filtering Firewall
◦ State Full Firewall
◦ ApplicationAware Firewall etc..
Network-based IDs (NIDS):
The sensor are located at the choke in network
It monitored, it captures all the network traffic
and analyze each packets for malicious traffic.
It is a good level of
security between a web
browser and a website.
There is a tunnel
Clients present a
certificate to the server to
prove their identity.
prevention of unauthorized access using wireless
Wireless Intrusion Prevention System(WIPS)
Wireless Intrusion Detection System (WIDS)
Three components: sensor, server, and console.
It is a short program aiming at securing
communication over a network.
Transport layer security (TLS)
PPP / Point-to-Point Protocol
Internet Protocols security (IPSec)
Network Security Services (NSS) comprises
a set of libraries
It develops security-enabled client and
Mozilla client products, including Firefox etc
Sun server products
Biometric systems -secure workstation
Smart cards -undeniable proof of a user’s
Current research develops security software
using neural networks.
Objective- use neural networks for the facial
The network security will be able to function
as an immune system.
The same set of security technology that is
being used today with some minor
The network security field evolve more rapidly to
deal with the threats further in the future.
“As threats tweaks,
Security tremendously Tweaks”