SlideShare a Scribd company logo
1 of 14
Hamza KareemHamza Kareem
What is Security
Properties of SecurityProperties of Security
Major Topics in Security
Next Page
What is security?What is security?
In information technology, security is the protection of
information assets through the use of technology, processes,
and training.
Security is about
Honest user (e.g., David, Jenny, Greg, …)
Dishonest Attacker
How the Attacker
Disrupts honest David’s use of the system (Integrity, Availability)
Learns information intended for David only (Confidentiality)
Information Technology Professionals must protect users from
these attackers.
Next Page
Properties of SecurityProperties of Security
Confidentiality
Information about system or its users cannot be learned by an
attacker
Integrity
The system continues to operate properly, only reaching states
that would occur if there were no attacker
Availability
Actions by an attacker do not prevent users from having access
to use of the system
Next Page
Application and OSApplication and OS
SecuritySecurity
Main Problem
OS Attacker Controls malicious files and applications
Content
Vulnerabilities: control hijacking attacks, fuzzing
Prevention: System design, robust coding, isolation
Project
Buffer overflow project
Next Page
Application security is the use of software, hardware, and
procedural methods to protect applications from external
threats.
Implications for the IT Professional:
Security measures built into applications
Sound application security routine
Use of hardware or software firewalls
Return to Home Additional Reading i
Web SecurityWeb Security
Main Problem
Web Attacker sets up malicious site visited by victim; no
control of network
Content
Browser policies, session mgmt, user authentication
HTTPS and web application security
Project
Web site attack and defenses project
Next Page
Web SecurityWeb Security
Web security is the separation or control of threats from
assets within or maintained by web-based services to protect
the integrity of the service, the confidentiality of the
communication, and the availability of the application.
Implications for the IT professional:
Security measures built into the applications
Sound application security routine
Use of hardware or software firewalls
Security measures built into the web service
Network SecurityNetwork Security
Main Problem:
Network Attacker: Intercepts and controls network
communication
Content:
Protocol designs, vulnerabilities, prevention
Malware, botnets, DDoS, network security testing
Project:
Network traceroute and packet filtering project
Next Page
Network VulnerabilityNetwork Vulnerability
PointsPoints
Return to Home Additional Reading i
Network SecurityNetwork Security
Network security is the protection of a computer network
and its services from unauthorized modification, destruction,
or disclosure.
Implications for IT professionals:
Security measures built into the network hardware and design
Control the flow to data in a network
Sound application security routine
Use of hardware or software firewalls
Security measures built into the web service
Computer SecurityComputer Security
Main Idea
Hacker gains controls of a computer, installs malicious files,
applications and access computer files.
Content
Cryptography (user perspective)
digital rights management
Project
Seminar
Next Page
Computer SecurityComputer Security
Computer security is the process of preventing and detecting
unauthorized use of your computer. The content of a computer is
vulnerable to few risks unless the computer is connected to other
computers on a network
Implications for IT professionals:
Use of applications such as antivirus, and firewalls
Security settings on local machines
Use of software firewalls
Create boot disks and backup data on a regular basis
Gmail : hamzakareem61@gmail.com
Facebook : Hamza kareem

More Related Content

What's hot

Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Masters in cyber security
Masters in cyber securityMasters in cyber security
Masters in cyber securityVihaanBajaj
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017R-Style Lab
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 

What's hot (20)

Network security
Network security Network security
Network security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network Security
Network Security Network Security
Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security
Network securityNetwork security
Network security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Masters in cyber security
Masters in cyber securityMasters in cyber security
Masters in cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 

Similar to Network security presentation

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And PrivacyTodd Turner
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Similar to Network security presentation (20)

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Module 4.pdf
Module 4.pdfModule 4.pdf
Module 4.pdf
 
Module 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe GuardsModule 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe Guards
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 
Data security
Data securityData security
Data security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Network security presentation

  • 2. What is Security Properties of SecurityProperties of Security Major Topics in Security Next Page
  • 3. What is security?What is security? In information technology, security is the protection of information assets through the use of technology, processes, and training. Security is about Honest user (e.g., David, Jenny, Greg, …) Dishonest Attacker How the Attacker Disrupts honest David’s use of the system (Integrity, Availability) Learns information intended for David only (Confidentiality) Information Technology Professionals must protect users from these attackers. Next Page
  • 4. Properties of SecurityProperties of Security Confidentiality Information about system or its users cannot be learned by an attacker Integrity The system continues to operate properly, only reaching states that would occur if there were no attacker Availability Actions by an attacker do not prevent users from having access to use of the system Next Page
  • 5. Application and OSApplication and OS SecuritySecurity Main Problem OS Attacker Controls malicious files and applications Content Vulnerabilities: control hijacking attacks, fuzzing Prevention: System design, robust coding, isolation Project Buffer overflow project Next Page
  • 6. Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Implications for the IT Professional: Security measures built into applications Sound application security routine Use of hardware or software firewalls Return to Home Additional Reading i
  • 7. Web SecurityWeb Security Main Problem Web Attacker sets up malicious site visited by victim; no control of network Content Browser policies, session mgmt, user authentication HTTPS and web application security Project Web site attack and defenses project Next Page
  • 8. Web SecurityWeb Security Web security is the separation or control of threats from assets within or maintained by web-based services to protect the integrity of the service, the confidentiality of the communication, and the availability of the application. Implications for the IT professional: Security measures built into the applications Sound application security routine Use of hardware or software firewalls Security measures built into the web service
  • 9. Network SecurityNetwork Security Main Problem: Network Attacker: Intercepts and controls network communication Content: Protocol designs, vulnerabilities, prevention Malware, botnets, DDoS, network security testing Project: Network traceroute and packet filtering project Next Page
  • 11. Network SecurityNetwork Security Network security is the protection of a computer network and its services from unauthorized modification, destruction, or disclosure. Implications for IT professionals: Security measures built into the network hardware and design Control the flow to data in a network Sound application security routine Use of hardware or software firewalls Security measures built into the web service
  • 12. Computer SecurityComputer Security Main Idea Hacker gains controls of a computer, installs malicious files, applications and access computer files. Content Cryptography (user perspective) digital rights management Project Seminar Next Page
  • 13. Computer SecurityComputer Security Computer security is the process of preventing and detecting unauthorized use of your computer. The content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network Implications for IT professionals: Use of applications such as antivirus, and firewalls Security settings on local machines Use of software firewalls Create boot disks and backup data on a regular basis