SlideShare a Scribd company logo
Introduction:
Network security is an organization’s strategy that
enables guaranteeing the security of its assets including
all network traffic. Access to the network is managed by
effective network security, which targets a wide range of
threats and then arrests them from entering in the
network.
What is network security?
Network security is the process of taking physical and
software preventative measures to protect the underlying
networking infrastructure from unauthorized access,
misuse, malfunction, modification, destruction, thereby
creating a secure platform for computers, users, and
programs.
Why do we need security?
Network security is needed to:
1.Prevent unauthorized access to the network that is of
potential threat to the network and its resources.
2.Ensure that the authentic users can effectively
access the network and its services.
3.Applications that can protect the network from
unauthorized access are in place.
Goals Of NETWORK SECURITY
1. Ensures the confidentiality of resources
2. Protect the integrity of data
3. Maintain availability of the IT infrastructure
4. Ensure the privacy of personally identifiable data
5. Enforces access control
6. Monitor the IT environment for violations of policy
1.In cryptography, encryption is the process of
transforming information using an algorithm to make
it unreadable to anyone except those possessing
special knowledge, usually referred to as a key.
2.The reverse process, to make the encrypted
information readable again, is referred to as
DECRYPTION.
ENCRYPTION
Types
Symmetric key
-In symmetric-key schemes, the encryption and
decryption keys are the same.
Public key
-In public-key encryption schemes, the
encryption key is published for anyone to use
and encrypt messages.
Uses
1.Encryption can be used to protect data "at rest",
such as files on computers and storage devices
(e.g. USB flash drives).
2.Encryption is also used to protect data in transit
3.Encryption, by itself, can protect the confidentiality
of messages.
1.Disk encryption software
2.File/folder encryption
3.Database encryption
4.Communication encryption software
5.Network traffic encryption tools
1.Generic
2.IPSec based
APPLICATIONS
WIRELESS SECURITY
 Wireless security is the prevention of
unauthorized access or damage to
computers or data using Wireless
networks.
802.11 SECURITY
1. Wired Equivalent Privacy (WEP)
2. Wi-Fi Protected Access (WPA)
Figure 2: Wi-Fi Protected Access
Wireless Medium
 Open medium.
 Broadcast in every
direction.
 Anyone within range can
listen in.
 No Privacy.
Figure1:Wireless Medium
WPA2
WPA2 replaced WPA.
 Began in September, 2004
WPA3
 January 2018, the Wi-Fi Alliance
announced WPA3 as a replacement to
WPA2.
Other ways to secure a Wireless Network
 MAC filtering:
Easy to spoof a MAC
address.
Force users to authenticate
using a
username/password.
 VPN tunnel between
computer and AP.
SECURITY PROCESSES:
Some data is also confidential; not only do you want
to lose it, you don’t want others to even view it
without authorization.
Let’s look at some ways to protect your all important
user data from loss and/or unauthorized
access.
SECURITY PROCESSES: 9 WAYS
 Back up early or often
 Use file-level and share-level security
 Password-Protect Documents
 Use EFS Encryption
 Use Disk Encryption
SECURITY PROCESSES: 9 WAYS
 Make use of a public key infrastructure
 Protect data in transit with IP Security
 Secure Wireless Transmissions
 Use Rights Management to retain Control
Firewall
• A network security system.
• Establishes a barrier.
• Acts as a DHCP server.
Firewall Operations
Types of firewall
• Hardware firewall
• Software Firewall
Proxy
State inspection
Packet filter
Types of controls
• Service control
• Direction control
• User control
• Behavior Control
Network security

More Related Content

What's hot

Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Access Controls
Access ControlsAccess Controls
Access Controls
primeteacher32
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Network Security
Network SecurityNetwork Security
Network Security
forpalmigho
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
IoT Security
IoT SecurityIoT Security

What's hot (20)

Application security
Application securityApplication security
Application security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Firewall
FirewallFirewall
Firewall
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Network security
Network securityNetwork security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security policies
Security policiesSecurity policies
Security policies
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
IoT Security
IoT SecurityIoT Security
IoT Security
 

Similar to Network security

Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
Ade John Gestole
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
ballolliemin
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
MuhammadKhalil858111
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Network security
Network securityNetwork security
Network security
nageshkanna13
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
Mukesh Pathak
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
PremSahebrajMistry
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
ahmed53254
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
AkilSayyad2
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
IJSRD
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
Todd Turner
 

Similar to Network security (20)

Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Network security
Network security Network security
Network security
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Network security
Network securityNetwork security
Network security
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Network Security
Network Security Network Security
Network Security
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 

More from Estiak Khan

Decision tree
Decision treeDecision tree
Decision tree
Estiak Khan
 
Steps in simulation study
Steps in simulation studySteps in simulation study
Steps in simulation study
Estiak Khan
 
Smart bajarlist wireless
Smart bajarlist wirelessSmart bajarlist wireless
Smart bajarlist wireless
Estiak Khan
 
Spiral model
Spiral modelSpiral model
Spiral model
Estiak Khan
 
Scrum agile-process
Scrum agile-processScrum agile-process
Scrum agile-process
Estiak Khan
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
Estiak Khan
 
V model
V modelV model
V model
Estiak Khan
 
Use case-slide
Use case-slideUse case-slide
Use case-slide
Estiak Khan
 
Graphical user-interface
Graphical user-interfaceGraphical user-interface
Graphical user-interface
Estiak Khan
 
Graphical User Interface (GUI)
Graphical User Interface (GUI)Graphical User Interface (GUI)
Graphical User Interface (GUI)
Estiak Khan
 
Graphical user-interface (GUI)
Graphical user-interface (GUI)Graphical user-interface (GUI)
Graphical user-interface (GUI)
Estiak Khan
 
Future operating system
Future operating systemFuture operating system
Future operating system
Estiak Khan
 
Android operating system
Android operating systemAndroid operating system
Android operating system
Estiak Khan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Estiak Khan
 
Disadvantages of cloud computing
Disadvantages of cloud computingDisadvantages of cloud computing
Disadvantages of cloud computing
Estiak Khan
 
Determinants of supply
Determinants of supplyDeterminants of supply
Determinants of supply
Estiak Khan
 
Law of supply
Law of supplyLaw of supply
Law of supply
Estiak Khan
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
Estiak Khan
 
wireless networking
wireless networkingwireless networking
wireless networking
Estiak Khan
 
Online Banking System
Online Banking SystemOnline Banking System
Online Banking System
Estiak Khan
 

More from Estiak Khan (20)

Decision tree
Decision treeDecision tree
Decision tree
 
Steps in simulation study
Steps in simulation studySteps in simulation study
Steps in simulation study
 
Smart bajarlist wireless
Smart bajarlist wirelessSmart bajarlist wireless
Smart bajarlist wireless
 
Spiral model
Spiral modelSpiral model
Spiral model
 
Scrum agile-process
Scrum agile-processScrum agile-process
Scrum agile-process
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
V model
V modelV model
V model
 
Use case-slide
Use case-slideUse case-slide
Use case-slide
 
Graphical user-interface
Graphical user-interfaceGraphical user-interface
Graphical user-interface
 
Graphical User Interface (GUI)
Graphical User Interface (GUI)Graphical User Interface (GUI)
Graphical User Interface (GUI)
 
Graphical user-interface (GUI)
Graphical user-interface (GUI)Graphical user-interface (GUI)
Graphical user-interface (GUI)
 
Future operating system
Future operating systemFuture operating system
Future operating system
 
Android operating system
Android operating systemAndroid operating system
Android operating system
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Disadvantages of cloud computing
Disadvantages of cloud computingDisadvantages of cloud computing
Disadvantages of cloud computing
 
Determinants of supply
Determinants of supplyDeterminants of supply
Determinants of supply
 
Law of supply
Law of supplyLaw of supply
Law of supply
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
 
wireless networking
wireless networkingwireless networking
wireless networking
 
Online Banking System
Online Banking SystemOnline Banking System
Online Banking System
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Network security

  • 1.
  • 2.
  • 3.
  • 4. Introduction: Network security is an organization’s strategy that enables guaranteeing the security of its assets including all network traffic. Access to the network is managed by effective network security, which targets a wide range of threats and then arrests them from entering in the network.
  • 5. What is network security? Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, thereby creating a secure platform for computers, users, and programs.
  • 6. Why do we need security? Network security is needed to: 1.Prevent unauthorized access to the network that is of potential threat to the network and its resources. 2.Ensure that the authentic users can effectively access the network and its services. 3.Applications that can protect the network from unauthorized access are in place.
  • 7. Goals Of NETWORK SECURITY 1. Ensures the confidentiality of resources 2. Protect the integrity of data 3. Maintain availability of the IT infrastructure 4. Ensure the privacy of personally identifiable data 5. Enforces access control 6. Monitor the IT environment for violations of policy
  • 8.
  • 9. 1.In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. 2.The reverse process, to make the encrypted information readable again, is referred to as DECRYPTION. ENCRYPTION
  • 10. Types Symmetric key -In symmetric-key schemes, the encryption and decryption keys are the same. Public key -In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages.
  • 11. Uses 1.Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). 2.Encryption is also used to protect data in transit 3.Encryption, by itself, can protect the confidentiality of messages.
  • 12. 1.Disk encryption software 2.File/folder encryption 3.Database encryption 4.Communication encryption software 5.Network traffic encryption tools 1.Generic 2.IPSec based APPLICATIONS
  • 13.
  • 14. WIRELESS SECURITY  Wireless security is the prevention of unauthorized access or damage to computers or data using Wireless networks.
  • 15. 802.11 SECURITY 1. Wired Equivalent Privacy (WEP) 2. Wi-Fi Protected Access (WPA) Figure 2: Wi-Fi Protected Access
  • 16. Wireless Medium  Open medium.  Broadcast in every direction.  Anyone within range can listen in.  No Privacy. Figure1:Wireless Medium
  • 17. WPA2 WPA2 replaced WPA.  Began in September, 2004 WPA3  January 2018, the Wi-Fi Alliance announced WPA3 as a replacement to WPA2.
  • 18. Other ways to secure a Wireless Network  MAC filtering: Easy to spoof a MAC address. Force users to authenticate using a username/password.  VPN tunnel between computer and AP.
  • 19.
  • 20. SECURITY PROCESSES: Some data is also confidential; not only do you want to lose it, you don’t want others to even view it without authorization. Let’s look at some ways to protect your all important user data from loss and/or unauthorized access.
  • 21. SECURITY PROCESSES: 9 WAYS  Back up early or often  Use file-level and share-level security  Password-Protect Documents  Use EFS Encryption  Use Disk Encryption
  • 22. SECURITY PROCESSES: 9 WAYS  Make use of a public key infrastructure  Protect data in transit with IP Security  Secure Wireless Transmissions  Use Rights Management to retain Control
  • 23.
  • 24. Firewall • A network security system. • Establishes a barrier. • Acts as a DHCP server.
  • 26. Types of firewall • Hardware firewall • Software Firewall Proxy State inspection Packet filter
  • 27. Types of controls • Service control • Direction control • User control • Behavior Control