SlideShare a Scribd company logo
MICRO-PROJECT
Subject : Data Communication and Computer Network
(DCCN)
Subject Code : [22414]
Topic :“Network Security and Privacy”
Lecturer: Lect. Chavhan mam
 INTRODUCTION
 What is Network serurity?
Network security is a level of guarantee that
all the machines in a network are working
optimally and the users of these machines
only possess the rights that were granted to
them. This can include: preventing
unauthorized people from acting on the
system maliciously preventing users from
performing involuntary operations that are
capable of harming the system securing
data by anticipating failures guaranteeing
that services are not interrupted
o Network security is a
complicated subject,
historically only tackled by
well-trained and experienced
experts..
History
• Internet security has been an issue since the
Internet rose to an international phenomenon.
By 1996, the Internet already connected 13
million computers, so early security protocols
were required. These protocols required
computer information to be confidential,
available, and have integrity. Because the
Internet made information available to
everyone, people needed network security to
make their information confidential.
Basic Network Security
When connecting a matching to a network, we
need to make sure no one will easily break in to it.
Even if you don't think anyone will try to break into
your machines - chances are that someone might
try. Crackers often run network scan utilities that
check a large range of IP addresses, and
automatically try to find machines running servers
with security holes. To protect against that, one
could simply disable any unnecessary network
service they are running.
Need of Network Security
In the past, hackers were highly skilled programmers
who understood the details of computer communications and
how to exploit vulnerabilities. Today almost anyone can become
a hacker by downloading tools from the Internet.
These complicated attack tools and generally open networks
have generated an increased need for network security and
dynamic security policies.
The easiest way to protect a network from an outside attack
is to close it off completely from the outside world.
A closed network provides connectivity only to trusted
known parties and sites; a closed network does not allow a
connection to public networks
20XX
presentation title 5
 Types
Wi-Fi Protected Access (WPA)
WPA encrypts information, and
checks to make sure that the network
security key has not been modified.
WPA also authenticates users to help
ensure that only authorized people can
access the network.
WPA is designed to work with all
wireless network adapters, but it might
not work with older routers or access
points.
20XX
presentation title 6
Authentication
One-factor authentication – this is
“something a user knows.” The most
recognized type of one-factor
authentication method is the password.
Two-factor authentication – in addition
to the first factor, the second factor is
“something a user has.”
Three-factor authentication – in
addition to the previous two factors, the
third factor is “something a user is.”
20XX
presentation title 7
NETWORK ATTACKS METHODS
• Eavesdropping – Interception of communications by
an unauthorized party
• Data Modification – Data altering, reading from
unauthorized party
• Identity Spoofing (IP Address Spoofing) – IP address
to be falsely assumed— identity spoofing and the
attacker can modify, reroute, or delete your data
• Password-Based Attacks – By gaining your access
rights to a computer and network resources are
determined by who you are, that is, your user name
and your password
• Denial-of-Service Attack – Prevents normal use of
your computer or network by valid users, and it could
be used for sending invalid data to application, to
flood the computer, block traffic, etc
20XX
presentation title 8
• Network Security helps in protecting
personal data of clients existing on
network.
• Network Security facilitates
protection of information that is
shared between computers on the
network.
• Hacking attempts or virus /
spyware attacks from the internet will
not be able to harm physical
computers. External possible attacks
are prevented
Advantages of Network Security
• Computer networks are
typically a shared resource used
by many applications
representing different interests.
• The Internet is particularly
widely shared, being used by
competing businesses,
mutually antagonistic
governments, and
opportunistic criminals..
Problems
20XX
presentation title 9
Network Security Architecture
What & why
an organization's network infrastructure
evolves over many years.
Although this evolution is in direct
response to the changing business needs, in
many cases security has been an
afterthought.
Even implementing the most advanced
security technologies of the day won't help
if the underlying security architecture is
flawed
Thank you
PROJECTEE:,
 Tejaswini Rathod [ 46 ]
 Shweta Rathod [ 47]
 Radheshyam Sorte [ 61 ]

More Related Content

Similar to dccn ppt-1.pptx

Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
Network security
Network securityNetwork security
Network security
nageshkanna13
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
Luis R Castellanos
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
Mr. Moms
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Network security
Network securityNetwork security
Network security
hajra azam
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
ballolliemin
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
ahmed53254
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
ssk
 
Internet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi universityInternet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi university
PulakMandal14
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 

Similar to dccn ppt-1.pptx (20)

Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Network security
Network securityNetwork security
Network security
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Network security
Network securityNetwork security
Network security
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
 
Internet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi universityInternet of things , presentation, rajiv gandhi university
Internet of things , presentation, rajiv gandhi university
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
New internet security
New internet securityNew internet security
New internet security
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

dccn ppt-1.pptx

  • 1. MICRO-PROJECT Subject : Data Communication and Computer Network (DCCN) Subject Code : [22414] Topic :“Network Security and Privacy” Lecturer: Lect. Chavhan mam
  • 2.  INTRODUCTION  What is Network serurity? Network security is a level of guarantee that all the machines in a network are working optimally and the users of these machines only possess the rights that were granted to them. This can include: preventing unauthorized people from acting on the system maliciously preventing users from performing involuntary operations that are capable of harming the system securing data by anticipating failures guaranteeing that services are not interrupted o Network security is a complicated subject, historically only tackled by well-trained and experienced experts..
  • 3. History • Internet security has been an issue since the Internet rose to an international phenomenon. By 1996, the Internet already connected 13 million computers, so early security protocols were required. These protocols required computer information to be confidential, available, and have integrity. Because the Internet made information available to everyone, people needed network security to make their information confidential. Basic Network Security When connecting a matching to a network, we need to make sure no one will easily break in to it. Even if you don't think anyone will try to break into your machines - chances are that someone might try. Crackers often run network scan utilities that check a large range of IP addresses, and automatically try to find machines running servers with security holes. To protect against that, one could simply disable any unnecessary network service they are running.
  • 4. Need of Network Security In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies. The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks
  • 5. 20XX presentation title 5  Types Wi-Fi Protected Access (WPA) WPA encrypts information, and checks to make sure that the network security key has not been modified. WPA also authenticates users to help ensure that only authorized people can access the network. WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points.
  • 6. 20XX presentation title 6 Authentication One-factor authentication – this is “something a user knows.” The most recognized type of one-factor authentication method is the password. Two-factor authentication – in addition to the first factor, the second factor is “something a user has.” Three-factor authentication – in addition to the previous two factors, the third factor is “something a user is.”
  • 7. 20XX presentation title 7 NETWORK ATTACKS METHODS • Eavesdropping – Interception of communications by an unauthorized party • Data Modification – Data altering, reading from unauthorized party • Identity Spoofing (IP Address Spoofing) – IP address to be falsely assumed— identity spoofing and the attacker can modify, reroute, or delete your data • Password-Based Attacks – By gaining your access rights to a computer and network resources are determined by who you are, that is, your user name and your password • Denial-of-Service Attack – Prevents normal use of your computer or network by valid users, and it could be used for sending invalid data to application, to flood the computer, block traffic, etc
  • 8. 20XX presentation title 8 • Network Security helps in protecting personal data of clients existing on network. • Network Security facilitates protection of information that is shared between computers on the network. • Hacking attempts or virus / spyware attacks from the internet will not be able to harm physical computers. External possible attacks are prevented Advantages of Network Security
  • 9. • Computer networks are typically a shared resource used by many applications representing different interests. • The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals.. Problems 20XX presentation title 9
  • 10. Network Security Architecture What & why an organization's network infrastructure evolves over many years. Although this evolution is in direct response to the changing business needs, in many cases security has been an afterthought. Even implementing the most advanced security technologies of the day won't help if the underlying security architecture is flawed
  • 11. Thank you PROJECTEE:,  Tejaswini Rathod [ 46 ]  Shweta Rathod [ 47]  Radheshyam Sorte [ 61 ]