Inam Ul Haq
MS Computer Science (Sweden)
Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org
Discussion forum: questions.computingcage.com
Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia,
Michealjfox, Association for Information Systems and Internet Society.
Network Security
1 Network Security, University of Okara
Table of Contents
Network Security, University of Okara2
 Course Objectives
 Subject Parts
 What is security?
 History
 Terminologies
Subject Objectives
Network Security, University of Okara3
 Security in the context of Network (not computer
or data)
 Introduce computer and network security
concepts.
 Understand basic cryptography theory
 Algorithms for symmetric and public key
encryption
 Digital Signatures, key management, Hash
functions
 Email Security. Understand Network security
topics including VPNs; Firewalls; Viruses,
Disaster Prevention and Recovery.
Subject Parts
 10 Lectures
 3 Assignments
 3 Exercises (at the end of each lecture)
 Final Project
 Case Study
4 Network Security, University of Okara
What is security?
Network Security, University of Okara5
 Protection of physical assets from enemies
(traditional definition)
 Security (Wikipedia): The degree of resistance to, or protection
from, harm.
 Computer Security (William Stalling): The protection to an automated
information system to preserve the integrity, availability, and
confidentiality of information system resources. [also called Cyber
Security or IT Security] OR
 A study to prevent unauthorized access to IS related to data,
hardware or software. (I prefer it).
 Software Security: A study to prevent bugs in code.
 Network Security: A study to prevent unauthorized access to data
of a network resources. (I prefer it).
Note: if not clear? think about medieval castle.
 What is protection? What is Information Security?
Network Security, University of Okara6
Where are security breaches
Network Security, University of Okara7
Network Security, University of Okara8
Network Security, University of Okara9
Network Security, University of Okara10
Network Security, University of Okara11
Network Security, University of Okara12
Network Security, University of Okara13

Introduction to Network Security

  • 1.
    Inam Ul Haq MSComputer Science (Sweden) Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org Discussion forum: questions.computingcage.com Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia, Michealjfox, Association for Information Systems and Internet Society. Network Security 1 Network Security, University of Okara
  • 2.
    Table of Contents NetworkSecurity, University of Okara2  Course Objectives  Subject Parts  What is security?  History  Terminologies
  • 3.
    Subject Objectives Network Security,University of Okara3  Security in the context of Network (not computer or data)  Introduce computer and network security concepts.  Understand basic cryptography theory  Algorithms for symmetric and public key encryption  Digital Signatures, key management, Hash functions  Email Security. Understand Network security topics including VPNs; Firewalls; Viruses, Disaster Prevention and Recovery.
  • 4.
    Subject Parts  10Lectures  3 Assignments  3 Exercises (at the end of each lecture)  Final Project  Case Study 4 Network Security, University of Okara
  • 5.
    What is security? NetworkSecurity, University of Okara5  Protection of physical assets from enemies (traditional definition)  Security (Wikipedia): The degree of resistance to, or protection from, harm.  Computer Security (William Stalling): The protection to an automated information system to preserve the integrity, availability, and confidentiality of information system resources. [also called Cyber Security or IT Security] OR  A study to prevent unauthorized access to IS related to data, hardware or software. (I prefer it).  Software Security: A study to prevent bugs in code.  Network Security: A study to prevent unauthorized access to data of a network resources. (I prefer it). Note: if not clear? think about medieval castle.  What is protection? What is Information Security?
  • 6.
    Network Security, Universityof Okara6 Where are security breaches
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.