SlideShare a Scribd company logo
1 of 10
1
2Ymca-306a
Information and Network Security
SECURITY
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan
• Every day huge information is created, stored
processed and communicated by using
computers, laptops, tablets, mobile phones
on network.
• Therefore there is a lot of risk involved.
People involved in managing a network
security have found a massive increase of
hacker and criminals creating malicious
threats that have been send into network
across the world.
3
What is Security in General?
Security is about protection of assets/belongings
• Prevention
Take measures that prevent your assets from being
damaged (or stolen)
• Detection
Take measures so that you can detect when, how,
and by whom an asset has been damaged
• Reaction
Take measures so that you can recover your assets
4
Real world example
• Prevention
– locks at doors, window bars, secure the walls
around the property, hire a guard
• Detection
– missing items, burglar alarms, closed circuit
TV
• Reaction
– attack on burglar, call the police, replace
stolen items, make an insurance claim
5
Online Shopping Example
• Prevention
– Encrypt your order and card number, enforce
merchants to do some extra checks, using PIN
even for Internet transactions, don’t send
card number via Internet
• Detection
– An unauthorized transaction appears on your
credit card statement
• Reaction
– Complain, dispute, ask for a new card number,
– Or, pay and forget
TYPES OF SECURITY
Three types:
1. Information Security
2. Cyber Security
3. Network Security
INFORMATION SECURITY:
• It is the super set that contains cyber security and network
security.
• It is the measures taken to protect the information from
unauthorized access and use.
• It follows CIA triad .
CYBER SECURITY
• Cyber security is a subset of information
security which refers to a set of techniques
and methodologies used to protect integrity
of networks, devices, programs, and data
from damage, attack, or unauthorized access.
In simple terms, cyber security is the practice
of protecting internet-connected systems and
networks from digital attacks.
NETWORK SECURITY:
• Network security is a subset of cyber security which
protects the integrity of your network unauthorized
access.
• Network security is the act of protecting files and
directories in a network of computers against
misuse, hacking, and unauthorized access to the
system.
• Network security is any action an organization takes
to prevent malicious use or accidental damage to
the network's private data, its users, or their
devices. The goal of network security is to keep the
network running and safe for all legitimate users.
ASSIGNMENT
Q1. What is the objective of Network Security?
Q2.Explain the use of applying Network
Security?

More Related Content

What's hot

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 

What's hot (20)

Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Information security
Information securityInformation security
Information security
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Homework0703
Homework0703Homework0703
Homework0703
 
Information security
Information securityInformation security
Information security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Persentation
PersentationPersentation
Persentation
 
Cyber
CyberCyber
Cyber
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Hacking
Hacking Hacking
Hacking
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 

Similar to INTRODUCTION TO SECURITY

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
Cyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and NotesCyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and Notes
innoraj1
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
dagiabebe267
 

Similar to INTRODUCTION TO SECURITY (20)

computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Intro
IntroIntro
Intro
 
Network Security
Network Security Network Security
Network Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Cyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and NotesCyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and Notes
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Unit v
Unit vUnit v
Unit v
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 

More from SHUBHA CHATURVEDI

More from SHUBHA CHATURVEDI (20)

Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Unix and its Components
Unix and its ComponentsUnix and its Components
Unix and its Components
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
 
Linux Features
Linux FeaturesLinux Features
Linux Features
 
Architecture of Linux
 Architecture of Linux Architecture of Linux
Architecture of Linux
 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Stream Ciphers
Stream CiphersStream Ciphers
Stream Ciphers
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

INTRODUCTION TO SECURITY

  • 1. 1 2Ymca-306a Information and Network Security SECURITY Prof. Neeraj Bhargava Mrs. Shubha Chaturvedi Department of Computer Science, School of Engineering & System Sciences MDS University Ajmer, Rajasthan
  • 2. • Every day huge information is created, stored processed and communicated by using computers, laptops, tablets, mobile phones on network. • Therefore there is a lot of risk involved. People involved in managing a network security have found a massive increase of hacker and criminals creating malicious threats that have been send into network across the world.
  • 3. 3 What is Security in General? Security is about protection of assets/belongings • Prevention Take measures that prevent your assets from being damaged (or stolen) • Detection Take measures so that you can detect when, how, and by whom an asset has been damaged • Reaction Take measures so that you can recover your assets
  • 4. 4 Real world example • Prevention – locks at doors, window bars, secure the walls around the property, hire a guard • Detection – missing items, burglar alarms, closed circuit TV • Reaction – attack on burglar, call the police, replace stolen items, make an insurance claim
  • 5. 5 Online Shopping Example • Prevention – Encrypt your order and card number, enforce merchants to do some extra checks, using PIN even for Internet transactions, don’t send card number via Internet • Detection – An unauthorized transaction appears on your credit card statement • Reaction – Complain, dispute, ask for a new card number, – Or, pay and forget
  • 6. TYPES OF SECURITY Three types: 1. Information Security 2. Cyber Security 3. Network Security
  • 7. INFORMATION SECURITY: • It is the super set that contains cyber security and network security. • It is the measures taken to protect the information from unauthorized access and use. • It follows CIA triad .
  • 8. CYBER SECURITY • Cyber security is a subset of information security which refers to a set of techniques and methodologies used to protect integrity of networks, devices, programs, and data from damage, attack, or unauthorized access. In simple terms, cyber security is the practice of protecting internet-connected systems and networks from digital attacks.
  • 9. NETWORK SECURITY: • Network security is a subset of cyber security which protects the integrity of your network unauthorized access. • Network security is the act of protecting files and directories in a network of computers against misuse, hacking, and unauthorized access to the system. • Network security is any action an organization takes to prevent malicious use or accidental damage to the network's private data, its users, or their devices. The goal of network security is to keep the network running and safe for all legitimate users.
  • 10. ASSIGNMENT Q1. What is the objective of Network Security? Q2.Explain the use of applying Network Security?