SlideShare a Scribd company logo
1 of 18
 Definition of network and network security
 Objectives
 It’s history and types
 How it works and it’s components
 Security tools
 Network security technology
 Security protocols
 Implementation
 Current developments
 Future trend
 conclusion
 A Network is a series of points or
nodes interconnected by
communication paths.
 Interconnect with other networks
and contain sub-networks.
 Security is “Freedom from
risk or danger.”
 The ability of a system to
protect information and
system resources with
respect to confidentiality
and integrity.
 Any activities designed to protect
your network.
 Target-variety of threats and
stops them from entering or
spreading on your network.
 Handled by a network
administrator.
 Access
 Confidentiality
 Authentication
 Integrity
 Non-repudiation
 During the 1980’s , the hackers
and crimes were beginning to
emerge.
 CERT was created to overcome
network security issues.
 In the 1990’s , Internet became
public and the security concerns
increased tremendously.
 Physical security
 Perimeter protection
 User training and education
 Wireless encryption protocol
(WEP)
 Mac address filtering
 Anti-virus software packages
 Secure network infrastructure
 DNS hardware and software
 Virtual private network
 Identity services
 Encryption
 Security management
 Different mechanisms to deal with
these attacks.
 Cryptographic systems:
 Plaintext is converted into cipher
text :
 Secret key cryptography(SKC)
 Public key cryptography(PKC)
 We need multiple layers of security.
 Network security is accomplished
through hardware and software.
 Network security components:
 Antivirus and anti-spyware
 Firewall
 Intrusion prevention systems
 Virtual private networks
 A typical border control
mechanism.
 Metaphor for network security.
 Designed to prevent
unauthorized access to or from
a private network.
It is a short program aiming at
securing a communication over a
network.
Example:
Transport layer security(TLS)
Point-to-point protocol(PPP)
Internet protocols security(IPsec)
 Network security services(NSS)
comprises a set of libraries.
 It develops security-enabled client
and server applications.
Some are:
 Mozilla client products, including
firefox etc.
 Google chrome
 Sun server products
 Hardware developments:
 Biometric systems –secure
workstation logons
 Smart cards-undeniable proof of a
user’s identity.
 Software developments:
 Current research develops security
software using neural networks.
 Objective-use neural networks for
the facial recognition software.
 The network security will be able
to function as an immune
system.
 The same set of security
technology that is being used
today with some minor
adjustments.
 The network security field
evolve more rapidly to deal with
the threats further in the
future.
 “As threats tweaks,
 Security tremendously tweaks”
NETWORK SECURITY.pptx

More Related Content

Similar to NETWORK SECURITY.pptx

Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETTravarsaPrivateLimit
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 

Similar to NETWORK SECURITY.pptx (20)

Network security
Network securityNetwork security
Network security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Data security
Data securityData security
Data security
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
information security technology
information security technologyinformation security technology
information security technology
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 

More from SunilNagar42

MEANS OF COMMUNICATION.ppt
MEANS OF COMMUNICATION.pptMEANS OF COMMUNICATION.ppt
MEANS OF COMMUNICATION.pptSunilNagar42
 
my presetation of communication.pptx
my presetation of communication.pptxmy presetation of communication.pptx
my presetation of communication.pptxSunilNagar42
 
LAW OF SUPPLY.pptx
LAW OF SUPPLY.pptxLAW OF SUPPLY.pptx
LAW OF SUPPLY.pptxSunilNagar42
 
MOBILE COMMERCE.ppt
MOBILE COMMERCE.pptMOBILE COMMERCE.ppt
MOBILE COMMERCE.pptSunilNagar42
 
NON-VERBAL COMMUNICATION.pptx
NON-VERBAL COMMUNICATION.pptxNON-VERBAL COMMUNICATION.pptx
NON-VERBAL COMMUNICATION.pptxSunilNagar42
 
HIGH TECH DEVICE.pptx
HIGH TECH DEVICE.pptxHIGH TECH DEVICE.pptx
HIGH TECH DEVICE.pptxSunilNagar42
 
PUBLIC SPEECH.pptx
PUBLIC SPEECH.pptxPUBLIC SPEECH.pptx
PUBLIC SPEECH.pptxSunilNagar42
 
PLANNING PROCESS.pptx
PLANNING PROCESS.pptxPLANNING PROCESS.pptx
PLANNING PROCESS.pptxSunilNagar42
 

More from SunilNagar42 (10)

MEANS OF COMMUNICATION.ppt
MEANS OF COMMUNICATION.pptMEANS OF COMMUNICATION.ppt
MEANS OF COMMUNICATION.ppt
 
my presetation of communication.pptx
my presetation of communication.pptxmy presetation of communication.pptx
my presetation of communication.pptx
 
LAW OF SUPPLY.pptx
LAW OF SUPPLY.pptxLAW OF SUPPLY.pptx
LAW OF SUPPLY.pptx
 
MOBILE COMMERCE.ppt
MOBILE COMMERCE.pptMOBILE COMMERCE.ppt
MOBILE COMMERCE.ppt
 
NON-VERBAL COMMUNICATION.pptx
NON-VERBAL COMMUNICATION.pptxNON-VERBAL COMMUNICATION.pptx
NON-VERBAL COMMUNICATION.pptx
 
UNIT-1.pptx
UNIT-1.pptxUNIT-1.pptx
UNIT-1.pptx
 
UNIT-4.pptx
UNIT-4.pptxUNIT-4.pptx
UNIT-4.pptx
 
HIGH TECH DEVICE.pptx
HIGH TECH DEVICE.pptxHIGH TECH DEVICE.pptx
HIGH TECH DEVICE.pptx
 
PUBLIC SPEECH.pptx
PUBLIC SPEECH.pptxPUBLIC SPEECH.pptx
PUBLIC SPEECH.pptx
 
PLANNING PROCESS.pptx
PLANNING PROCESS.pptxPLANNING PROCESS.pptx
PLANNING PROCESS.pptx
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 

NETWORK SECURITY.pptx

  • 1.
  • 2.  Definition of network and network security  Objectives  It’s history and types  How it works and it’s components  Security tools  Network security technology  Security protocols  Implementation  Current developments  Future trend  conclusion
  • 3.  A Network is a series of points or nodes interconnected by communication paths.  Interconnect with other networks and contain sub-networks.
  • 4.  Security is “Freedom from risk or danger.”  The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  • 5.  Any activities designed to protect your network.  Target-variety of threats and stops them from entering or spreading on your network.  Handled by a network administrator.
  • 6.  Access  Confidentiality  Authentication  Integrity  Non-repudiation
  • 7.  During the 1980’s , the hackers and crimes were beginning to emerge.  CERT was created to overcome network security issues.  In the 1990’s , Internet became public and the security concerns increased tremendously.
  • 8.  Physical security  Perimeter protection  User training and education  Wireless encryption protocol (WEP)  Mac address filtering
  • 9.  Anti-virus software packages  Secure network infrastructure  DNS hardware and software  Virtual private network  Identity services  Encryption  Security management
  • 10.  Different mechanisms to deal with these attacks.  Cryptographic systems:  Plaintext is converted into cipher text :  Secret key cryptography(SKC)  Public key cryptography(PKC)
  • 11.  We need multiple layers of security.  Network security is accomplished through hardware and software.  Network security components:  Antivirus and anti-spyware  Firewall  Intrusion prevention systems  Virtual private networks
  • 12.  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  • 13. It is a short program aiming at securing a communication over a network. Example: Transport layer security(TLS) Point-to-point protocol(PPP) Internet protocols security(IPsec)
  • 14.  Network security services(NSS) comprises a set of libraries.  It develops security-enabled client and server applications. Some are:  Mozilla client products, including firefox etc.  Google chrome  Sun server products
  • 15.  Hardware developments:  Biometric systems –secure workstation logons  Smart cards-undeniable proof of a user’s identity.  Software developments:  Current research develops security software using neural networks.  Objective-use neural networks for the facial recognition software.
  • 16.  The network security will be able to function as an immune system.  The same set of security technology that is being used today with some minor adjustments.
  • 17.  The network security field evolve more rapidly to deal with the threats further in the future.  “As threats tweaks,  Security tremendously tweaks”