SlideShare a Scribd company logo
1 of 20
info@quontrasolutions.co.uk 
Network Security 
Call us : 20-3734-1498/99 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Network Security 
 Security Devices 
 Firewalls 
 Network Access Security 
 User Authentication 
 Device Security 
 Common Security Threats 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Security Devices 
 Explain the function Of Hardware and Software 
security devices. 
 Network Based Firewall 
 Host Based Firewall 
 IDS 
 IPS 
 VPN Concentrator 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Host Based Firewall 
 Software Based Protection on a device 
 Sees all the Traffic 
 Difficult to manage 
large groups 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Windows Firewall with Advanced Security 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Network Based Firewall 
 Filters Traffic By Port Number 
 Can Encrypt traffic in/out of the network. 
 Can proxy traffic 
 Most firewalls can be Layer 3 devices (routers). 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Network Based Firewall 
 Advantages 
 Protects many devices at once 
 High-speed 
 Disadvantages 
 Limited Visibility into encrypted Information 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
IDS/IPS 
 Intrusion Detection System 
 Intrusion Prevention System 
 Intrusions 
 Exploits against Operating Systems , applications etc. 
 Bufferoverflows and other vulnerabilities 
 Detection Vs Prevention 
 Detection – Alarm or Alert 
 Prevention – Stop it before it gets into the network. 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
IDS/IPS 
 Advantages 
 Watches all traffic through a network link 
 Can completely stop bad traffic 
 Disadvantages 
 Limited Visibility into encrypted Data 
 Yet Another device on the Network 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
VPN concentrator 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Identify Common Security Threats and 
Mitigations 
 Security Threats 
 Dos ,viruses, worms ,attackers ,Man in the 
middle attack ,Smurf ,Social engineering 
(phishing) 
 Mitigation Techniques 
 Policies and Procedures ,user training ,patch 
and updates 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Denial Of Service 
 Anything that prevents a device from providing 
normal services 
 DoS /DDoS 
 Denial Of Service /Distributed Denial of service 
 Smurf Attacks 
 Ping sents to a broadcast address were duplicated to all 
IP addresses on the subnets by the routers 
 We fixed that in 1999 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Viruses and Worms 
 Viruses infect files and duplicate by copying 
themselves with other documents 
 Worms don’t need any other files or programs in 
order to infect other devices 
 Malware is a catch-all term for viruses ,spywares , 
adwares ,worms and other bad stuff 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Man in the Middle Attack 
 A form of electronic eavesdropping 
 Especially useful for encrypted communication 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Man in the Middle Attack 
 A form of electronic eavesdropping 
 Especially useful for encrypted communication 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Social Engineering 
 Major Threats 
 Electronically Undetectable 
 Suspicious Telephone Call 
 Don’t give any information over the Telephone 
 Look out for unattended persons 
 Badges 
 Processes 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Phishing 
 Electronic Version Of Social Engineering 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Mitigation Techniques 
 Policies and Procedures 
 User Training 
 Patches and Updates 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
Summary 
 DoS (Denial Of Service) or DDoS (Distributed 
DoS) prevent a device from providing normal services. 
 Man in the Middle Attack method can hackers use 
to intercept encrypted communication between 
stations 
 Phishing is the electronic method of social 
engineering to gather personal information. 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
info@quontrasolutions.co.uk 
Call : 20-3734-1498/99 
Email: info@quontrasolutions.co.uk 
http://www.quontrasolutions.co.uk 
www.quontrasolutions.co.uk Call us : 20-3734-1498/99

More Related Content

Similar to Network security by quontra solutions uk

Cybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business ProtectedCybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business ProtectedRobert E Jones
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Security human
Security humanSecurity human
Security humanJisc
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectivesSensePost
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Priyanka Aash
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy cscHisyam Rosly
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issuesjasondewar
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.pptRoshni814224
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.pptRoshni814224
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Claudia Perez
 

Similar to Network security by quontra solutions uk (20)

Cybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business ProtectedCybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business Protected
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Security human
Security humanSecurity human
Security human
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
FireEye
FireEyeFireEye
FireEye
 
What you should know about tech support scams
What you should know about tech support scamsWhat you should know about tech support scams
What you should know about tech support scams
 
What you should know about tech support scams
What you should know about tech support scamsWhat you should know about tech support scams
What you should know about tech support scams
 
Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issues
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016
 

More from Quontra Solutions

Java Constructors with examples - Quontra Solutions
Java Constructors with examples  - Quontra SolutionsJava Constructors with examples  - Quontra Solutions
Java Constructors with examples - Quontra SolutionsQuontra Solutions
 
Oracle-12c Online Training by Quontra Solutions
 Oracle-12c Online Training by Quontra Solutions Oracle-12c Online Training by Quontra Solutions
Oracle-12c Online Training by Quontra SolutionsQuontra Solutions
 
Test Automation Framework Online Training by QuontraSolutions
Test Automation Framework Online Training by QuontraSolutionsTest Automation Framework Online Training by QuontraSolutions
Test Automation Framework Online Training by QuontraSolutionsQuontra Solutions
 
Automation with Selenium Presented by Quontra Solutions
Automation with Selenium Presented by Quontra SolutionsAutomation with Selenium Presented by Quontra Solutions
Automation with Selenium Presented by Quontra SolutionsQuontra Solutions
 
Automated Software Testing Framework Training by Quontra Solutions
Automated Software Testing Framework Training by Quontra SolutionsAutomated Software Testing Framework Training by Quontra Solutions
Automated Software Testing Framework Training by Quontra SolutionsQuontra Solutions
 
DataMining and OLAP Technology Concepts Presented By Quontra Solutions
DataMining and OLAP Technology Concepts Presented By Quontra SolutionsDataMining and OLAP Technology Concepts Presented By Quontra Solutions
DataMining and OLAP Technology Concepts Presented By Quontra SolutionsQuontra Solutions
 
Introduction to .net FrameWork by QuontraSolutions
Introduction to .net FrameWork by QuontraSolutionsIntroduction to .net FrameWork by QuontraSolutions
Introduction to .net FrameWork by QuontraSolutionsQuontra Solutions
 
Informatica Metadata Exchange Frequently Asked Questions by Quontra Solutions
Informatica Metadata Exchange Frequently Asked Questions by Quontra SolutionsInformatica Metadata Exchange Frequently Asked Questions by Quontra Solutions
Informatica Metadata Exchange Frequently Asked Questions by Quontra SolutionsQuontra Solutions
 
Informatica metadata exchange frequently asked questions by quontra solutions
Informatica metadata exchange frequently asked questions by quontra solutionsInformatica metadata exchange frequently asked questions by quontra solutions
Informatica metadata exchange frequently asked questions by quontra solutionsQuontra Solutions
 
Dataware house Introduction By Quontra Solutions
Dataware house Introduction By Quontra SolutionsDataware house Introduction By Quontra Solutions
Dataware house Introduction By Quontra SolutionsQuontra Solutions
 
Selenium overview ppt by quontra solutions
Selenium overview ppt by quontra solutionsSelenium overview ppt by quontra solutions
Selenium overview ppt by quontra solutionsQuontra Solutions
 

More from Quontra Solutions (12)

Java Constructors with examples - Quontra Solutions
Java Constructors with examples  - Quontra SolutionsJava Constructors with examples  - Quontra Solutions
Java Constructors with examples - Quontra Solutions
 
Oracle-12c Online Training by Quontra Solutions
 Oracle-12c Online Training by Quontra Solutions Oracle-12c Online Training by Quontra Solutions
Oracle-12c Online Training by Quontra Solutions
 
Test Automation Framework Online Training by QuontraSolutions
Test Automation Framework Online Training by QuontraSolutionsTest Automation Framework Online Training by QuontraSolutions
Test Automation Framework Online Training by QuontraSolutions
 
Enterprise java beans
Enterprise java beansEnterprise java beans
Enterprise java beans
 
Automation with Selenium Presented by Quontra Solutions
Automation with Selenium Presented by Quontra SolutionsAutomation with Selenium Presented by Quontra Solutions
Automation with Selenium Presented by Quontra Solutions
 
Automated Software Testing Framework Training by Quontra Solutions
Automated Software Testing Framework Training by Quontra SolutionsAutomated Software Testing Framework Training by Quontra Solutions
Automated Software Testing Framework Training by Quontra Solutions
 
DataMining and OLAP Technology Concepts Presented By Quontra Solutions
DataMining and OLAP Technology Concepts Presented By Quontra SolutionsDataMining and OLAP Technology Concepts Presented By Quontra Solutions
DataMining and OLAP Technology Concepts Presented By Quontra Solutions
 
Introduction to .net FrameWork by QuontraSolutions
Introduction to .net FrameWork by QuontraSolutionsIntroduction to .net FrameWork by QuontraSolutions
Introduction to .net FrameWork by QuontraSolutions
 
Informatica Metadata Exchange Frequently Asked Questions by Quontra Solutions
Informatica Metadata Exchange Frequently Asked Questions by Quontra SolutionsInformatica Metadata Exchange Frequently Asked Questions by Quontra Solutions
Informatica Metadata Exchange Frequently Asked Questions by Quontra Solutions
 
Informatica metadata exchange frequently asked questions by quontra solutions
Informatica metadata exchange frequently asked questions by quontra solutionsInformatica metadata exchange frequently asked questions by quontra solutions
Informatica metadata exchange frequently asked questions by quontra solutions
 
Dataware house Introduction By Quontra Solutions
Dataware house Introduction By Quontra SolutionsDataware house Introduction By Quontra Solutions
Dataware house Introduction By Quontra Solutions
 
Selenium overview ppt by quontra solutions
Selenium overview ppt by quontra solutionsSelenium overview ppt by quontra solutions
Selenium overview ppt by quontra solutions
 

Network security by quontra solutions uk

  • 1. info@quontrasolutions.co.uk Network Security Call us : 20-3734-1498/99 www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 2. info@quontrasolutions.co.uk Network Security  Security Devices  Firewalls  Network Access Security  User Authentication  Device Security  Common Security Threats www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 3. info@quontrasolutions.co.uk Security Devices  Explain the function Of Hardware and Software security devices.  Network Based Firewall  Host Based Firewall  IDS  IPS  VPN Concentrator www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 4. info@quontrasolutions.co.uk Host Based Firewall  Software Based Protection on a device  Sees all the Traffic  Difficult to manage large groups www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 5. info@quontrasolutions.co.uk Windows Firewall with Advanced Security www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 6. info@quontrasolutions.co.uk Network Based Firewall  Filters Traffic By Port Number  Can Encrypt traffic in/out of the network.  Can proxy traffic  Most firewalls can be Layer 3 devices (routers). www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 7. info@quontrasolutions.co.uk Network Based Firewall  Advantages  Protects many devices at once  High-speed  Disadvantages  Limited Visibility into encrypted Information www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 8. IDS/IPS  Intrusion Detection System  Intrusion Prevention System  Intrusions  Exploits against Operating Systems , applications etc.  Bufferoverflows and other vulnerabilities  Detection Vs Prevention  Detection – Alarm or Alert  Prevention – Stop it before it gets into the network. www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 9. IDS/IPS  Advantages  Watches all traffic through a network link  Can completely stop bad traffic  Disadvantages  Limited Visibility into encrypted Data  Yet Another device on the Network www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 10. VPN concentrator www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 11. Identify Common Security Threats and Mitigations  Security Threats  Dos ,viruses, worms ,attackers ,Man in the middle attack ,Smurf ,Social engineering (phishing)  Mitigation Techniques  Policies and Procedures ,user training ,patch and updates www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 12. Denial Of Service  Anything that prevents a device from providing normal services  DoS /DDoS  Denial Of Service /Distributed Denial of service  Smurf Attacks  Ping sents to a broadcast address were duplicated to all IP addresses on the subnets by the routers  We fixed that in 1999 www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 13. Viruses and Worms  Viruses infect files and duplicate by copying themselves with other documents  Worms don’t need any other files or programs in order to infect other devices  Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 14. Man in the Middle Attack  A form of electronic eavesdropping  Especially useful for encrypted communication www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 15. Man in the Middle Attack  A form of electronic eavesdropping  Especially useful for encrypted communication www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 16. Social Engineering  Major Threats  Electronically Undetectable  Suspicious Telephone Call  Don’t give any information over the Telephone  Look out for unattended persons  Badges  Processes www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 17. Phishing  Electronic Version Of Social Engineering www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 18. Mitigation Techniques  Policies and Procedures  User Training  Patches and Updates www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 19. Summary  DoS (Denial Of Service) or DDoS (Distributed DoS) prevent a device from providing normal services.  Man in the Middle Attack method can hackers use to intercept encrypted communication between stations  Phishing is the electronic method of social engineering to gather personal information. www.quontrasolutions.co.uk Call us : 20-3734-1498/99
  • 20. info@quontrasolutions.co.uk Call : 20-3734-1498/99 Email: info@quontrasolutions.co.uk http://www.quontrasolutions.co.uk www.quontrasolutions.co.uk Call us : 20-3734-1498/99