Network Security

958 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
958
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
108
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Network Security

  1. 1. Presentation OnNETWORK SECURITY PRESENTED BY:- MISS.PALLAVI SONONE. (Branch-CSE.) 1 PLIT, Buldana
  2. 2. What is network security?• Network security is preventing attackers from achieving objectives through unauthorized access or unauthorized use of computers and networks. Basic Security Measures• The basic security measures for computer systems fall into four categories:• External security:- Protection from environmental damage.• Surveillance:- Proper placement of security cameras can deter theft• Auditing:- Creating a computer or paper audit can help detect wrongdoing• Viruses/worms:- Many different types of viruses, such as parasitic, boot sector, stealth, polymorphic, and macro. 2
  3. 3. What is a firewall?• Used to control the flow of traffic (both inflows and outflows, but primarily inflows) between networks• The connected networks can be internal or a combination of internal and external networks Firewalls A system or combination of systems that supports an access control policy between two networks. A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system. 3
  4. 4. Characteristics of Good Firewalls• All traffic from inside the •Only authorized traffic, as corporate network to outside defined by the security policy, is the network, and vice-versa, allowed to pass through it; and must pass through it; the system itself is immune to penetration. 4
  5. 5. Firewalls – 2 typesA packet filter firewall is essentially a router that has beenprogrammed to filter out or allow to pass certain IP addressesor TCP port numbers.A proxy server is a more advanced firewall that acts as adoorman into a corporate network. Any external transactionthat request something from the corporate network must enterthrough the proxy server.Proxy servers are more advanced but make external accessesslower. 5
  6. 6. Components of Firewalls• Chokes - limit the flow of packets between networks. Read packets and determine, based on the rules, if the traffic should pass• Gates - act as a control point for external connections. They control the external connections. 6
  7. 7. TELNET FTP SMTP SMTP T TP H SM TP TP SM FT TP P F FT TP PACKETS P F SM ET TP E LN TERejected Packets T LN TP ET SMTP HTTP SMTP T H CHOKE GATE DEFAULT DENY FTP FTP TELNET Application Level Corporate Filtering Rule - Internal Deny everything except Network Telnet & FTP 7
  8. 8. Firewall Functions• Packet Filtering •Stateful Inspection• Network Address •Virtual Private Networks Translation •Real-time Monitoring• Application-level Proxies 8
  9. 9. Hence we conclude that NETWORK SECURITYprevents attackers from achieving the objectives throughunauthorized access…….Firewall is very useful to provide the security inNETWORKING. 9
  10. 10. 10

×