SlideShare a Scribd company logo
1 of 8
NETWORK SECURITY
WHAT IS NETWORK
 Network: In simple language a computer network
is a collection of computers/devices also known as
nodes which are connected to each other in a
certain pattern and can communicate with each
other using some protocols
WHAT IS NETWORK SECURITY
 The Network security or Information security is to
provide protection to the computer system from the
Hackers.
 Network security protects the internal data from external
attacks or simple mistakes made by the user.
 It designs computer network infrastructure, policies and
rules adopted by the network administrator.
 It monitors consistently and continuously the effectiveness
of all the security measures.
FILE ACCESS PERMISSION
 In internet some files are made shareable and some are
made public.
 Protected files are shared among few users or by a group
having access right.
 Access right is decided by the owner of the file or network
administration.
 There are three types of users.
o Owner
o Users having access rights
o All other users
FIREWALL
 Firewall technology began to emerge in the late 1980s.
 A firewall is simply a program or a hardware device that filters the
information coming through the internet into your private network
or computer system.
 Security of the network is the main criteria of firewall.
 It can be implemented either in software or in hardware.
 Software firewall: These are installed on individual servers.
They intercepts each connection request and then
determines whether the request is valid or not.
 Hardware firewall: These are integrated into the routers that
sits between a computer and the internet.
GOALS OF FIREWALL
1. To collect the sum of all the network traffic internal or
external must go through the firewall physically. It cuts off
all the access to the local network except via firewall
2. Only authorized traffic which is acceptable by the local
security policy will be allowed to proceed
3. Firewall itself is resistant inclusive is a solid trustworthy
system with a protected security system
DIGITAL SIGNATURE
 A digital signature is a method for providing authenticity of a message
or document or attachment or software sent through email.
ADVANTAGES OF DIGITAL SIGNATURE
o It plays significant role in cases of cyber crime thus protect thus
security of a computer.
o Commonly used for software distribution, financial transaction and in
any other cases where forgery and tampering is possible.
o Gives recipient enough reason to believe that the message was
created by the known sender.
BASIC REQUIREMENTS OF DIGITAL
SIGNATURE
 Private key: it is which is accessible only to the signer.it
is used to generate the digital signature which is attached
to the message.
 Public key: the public key is made available to all those
who receive the signed message from the sender.it is used
for verification.

More Related Content

What's hot

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Network security
Network securityNetwork security
Network securityhajra azam
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Samwed Jain
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...usman butt
 

What's hot (20)

Network security
 Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network security
Network securityNetwork security
Network security
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Homework0703
Homework0703Homework0703
Homework0703
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
internet security
internet securityinternet security
internet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Windows network security
Windows network securityWindows network security
Windows network security
 

Similar to NETWORK SECURITY

Similar to NETWORK SECURITY (20)

Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Firewall
FirewallFirewall
Firewall
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

NETWORK SECURITY

  • 2. WHAT IS NETWORK  Network: In simple language a computer network is a collection of computers/devices also known as nodes which are connected to each other in a certain pattern and can communicate with each other using some protocols
  • 3. WHAT IS NETWORK SECURITY  The Network security or Information security is to provide protection to the computer system from the Hackers.  Network security protects the internal data from external attacks or simple mistakes made by the user.  It designs computer network infrastructure, policies and rules adopted by the network administrator.  It monitors consistently and continuously the effectiveness of all the security measures.
  • 4. FILE ACCESS PERMISSION  In internet some files are made shareable and some are made public.  Protected files are shared among few users or by a group having access right.  Access right is decided by the owner of the file or network administration.  There are three types of users. o Owner o Users having access rights o All other users
  • 5. FIREWALL  Firewall technology began to emerge in the late 1980s.  A firewall is simply a program or a hardware device that filters the information coming through the internet into your private network or computer system.  Security of the network is the main criteria of firewall.  It can be implemented either in software or in hardware.  Software firewall: These are installed on individual servers. They intercepts each connection request and then determines whether the request is valid or not.  Hardware firewall: These are integrated into the routers that sits between a computer and the internet.
  • 6. GOALS OF FIREWALL 1. To collect the sum of all the network traffic internal or external must go through the firewall physically. It cuts off all the access to the local network except via firewall 2. Only authorized traffic which is acceptable by the local security policy will be allowed to proceed 3. Firewall itself is resistant inclusive is a solid trustworthy system with a protected security system
  • 7. DIGITAL SIGNATURE  A digital signature is a method for providing authenticity of a message or document or attachment or software sent through email. ADVANTAGES OF DIGITAL SIGNATURE o It plays significant role in cases of cyber crime thus protect thus security of a computer. o Commonly used for software distribution, financial transaction and in any other cases where forgery and tampering is possible. o Gives recipient enough reason to believe that the message was created by the known sender.
  • 8. BASIC REQUIREMENTS OF DIGITAL SIGNATURE  Private key: it is which is accessible only to the signer.it is used to generate the digital signature which is attached to the message.  Public key: the public key is made available to all those who receive the signed message from the sender.it is used for verification.