2. Definition of network and network security
Objectives
It’s history and types
How it works and it’s components
Security tools
Network security technology
Security protocols
Implementation
Current developments
Future trend
conclusion
3. A Network is a series of points or
nodes interconnected by
communication paths.
Interconnect with other networks
and contain sub-networks.
4. Security is “Freedom from
risk or danger.”
The ability of a system to
protect information and
system resources with
respect to confidentiality
and integrity.
5. Any activities designed to protect
your network.
Target-variety of threats and
stops them from entering or
spreading on your network.
Handled by a network
administrator.
7. During the 1980’s , the hackers
and crimes were beginning to
emerge.
CERT was created to overcome
network security issues.
In the 1990’s , Internet became
public and the security concerns
increased tremendously.
8. Physical security
Perimeter protection
User training and education
Wireless encryption protocol
(WEP)
Mac address filtering
10. Different mechanisms to deal with
these attacks.
Cryptographic systems:
Plaintext is converted into cipher
text :
Secret key cryptography(SKC)
Public key cryptography(PKC)
11. We need multiple layers of security.
Network security is accomplished
through hardware and software.
Network security components:
Antivirus and anti-spyware
Firewall
Intrusion prevention systems
Virtual private networks
12. A typical border control
mechanism.
Metaphor for network security.
Designed to prevent
unauthorized access to or from
a private network.
13. It is a short program aiming at
securing a communication over a
network.
Example:
Transport layer security(TLS)
Point-to-point protocol(PPP)
Internet protocols security(IPsec)
14. Network security services(NSS)
comprises a set of libraries.
It develops security-enabled client
and server applications.
Some are:
Mozilla client products, including
firefox etc.
Google chrome
Sun server products
15. Hardware developments:
Biometric systems –secure
workstation logons
Smart cards-undeniable proof of a
user’s identity.
Software developments:
Current research develops security
software using neural networks.
Objective-use neural networks for
the facial recognition software.
16. The network security will be able
to function as an immune
system.
The same set of security
technology that is being used
today with some minor
adjustments.
17. The network security field
evolve more rapidly to deal with
the threats further in the
future.
“As threats tweaks,
Security tremendously tweaks”