SlideShare a Scribd company logo
NETWORK SECURITY I.M.ILHAM
HND 39
1
CONTENTS
1. What is Network?
2. Network Security Devices
3. Network Security Protocols
4. Comparison between 2 Protocols
5. Importance of Network Security
6. Conclusion
2
WHAT IS NETWORK?
Network is a system that connects two or more devices connected to
one another able to exchange data.
The purpose of a network is to share resources and more processes.
A network is a collection of computer, servers, network devices, or
other devices connected to one another able to exchange data.
3
WHAT IS NETWORK SECURITY?
 Devices, tools, techniques and also methodologies that are used to
secure a network.
 Protecting the Network from Intruders.
 Regulating access to Network resources.
 Requiring network users to Authenticate.
4
NETWORK SECURITY DEVICES
Below are the Network Security devices;
1. Firewall
2. Proxy Server
3. Intrusion Detection System
4. Intrusion Prevention System
5
1. FIREWALL
 Is a set of hardware and software tool.
 A choke point of control and monitoring.
 Interconnect networks with different trusts.
 Provides NAT and usage monitoring.
 Implementing VPN’s using IPSec.
 Auditing And controlling accesses.
6
2. PROXY
 A proxy is an entity with the authority to act on behalf of another
one.
 Proxy servers sit between a client and an untrusted network system
such as Internet.
 Prevents direct accesses with untrusted systems.
 Requests of client’s are directed to proxies.
7
3. INTRUSION DETECTION SYSTEM
 Is a system that monitors the traffics on a network for suspicious
activities.
 Issues alerts when a threat/issue activity is been discovered.
 Normally detects and reports for threats.
 Also monitors the network packets whether that they are suitable for
the network and checks whether loads network traffic insecurely.
 Advantages:
 Disadvantages:
8
4. INTRUSION PREVENTION
SYSTEM
 Detects and Prevents threats and unauthorized accesses.
 Detects irregular traffics and prevents intrusions before costly
damages occur.
 Deploying using sensors.
 Uses signatures to detect patterns of misuse in network traffics.
 Secure the network system with any damages.
9
NETWORK SECURITY PROTOCOLS
Below are the Network Security Protocols;
1. Simple Network Management Protocol
2. Dynamic Host Configuration Protocol
3. Secure Socket Layer
4. Internet Protocol Security
5. Remote Network Monitoring
6. File Transfer Protocol
10
1.SIMPLE NETWORK MANAGEMENT
PROTOCOL
 Allows to monitor the network
 This is a application layer protocol used to manage and monitor
network devices and their functions.
 Enables a network administrator to manage and monitor all of those
nodes from a single interface, which can typically support batch
commands and automatic alerts.
 No – Wasting of time, Resources, Knowledge etc.
11
2. DYNAMIC HOST CONFIGURATION
PROTOCOL
 Enables a server to assign an IP address automatically to a computer
from an exacted range of numbers that had configured to a given
network.
 DHCP is a secure system because of its dynamic IP assigning system.
 Used to issue unique IP addresses and automatically configure other
network information.
 The working process is as below.
12
3. SECURE SOCKET LAYER
 Used for secure transmission of information over a network.
 Encrypts the network connection segments above the transport
layer, which is a network connection component above the program
layer.
 Through this SSL protocol Data integrity, Data privacy, Client-Server
authentication and more objectives are being held.
13
4. INTERNET PROTOCOL SECURITY
 Is a set of procedures that affords security for the Internet Protocol.
 This uses cryptography (solving codes) to provide security.
 Used for setup of the virtual private networks (VPNs) in a secure and
possible manner.
 Consists with 2 services: Authentication Header & Encapsulating
Security Payload (ESP).
 And consists with 2 models: Tunnel mode & Transport mode.
14
5. REMOTE NETWORK MONITORING
 Enables various network monitors and console systems to exchange
network monitoring data.
 RMON is developed to address the issue of remote sites and Local
area network segment management from a centralized location.
 Monitoring devices contains RMON software agents that collect
information and analyze packets through the network.
 Collects 9 kinds of information:
15
6. FILE TRANSFER PROTOCOL
 This is used for transferring files with smaller and larger in sizes
across a network securely.
 Processes between two computers and users.
 FTP provides facility to transfer files via remote accessed computers
with easy and efficient data transfer.
 Below is the process;
16
COMPARISON BETWEEN 2
PROTOCOLS
17
Simple Network Management Protocol Remote Network Monitoring
Monitors network performance Manages and monitoring servers,
devices
Audit network usage Offline monitoring
Detects network failures Proactive monitoring
Configure remote devices Client reporting
Detects inappropriate accesses Offers backups and antivirus
IMPORTANCE OF NETWORK
SECURITY
 To process the network continuously.
 Availability of the network.
 Protect data from threats and to protect the policies.
 To safeguard the assets of the company.
 Enhance Network Performance.
18
19
CONCLUSIO
N!
ANY QUESTION? Proceed!
20
21
THE
END!

More Related Content

What's hot

Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
crisma baby mathew
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Firewall
FirewallFirewall
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
Subrata Kumer Paul
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
Yovan Chandel
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Gopal Sakarkar
 
Firewall
FirewallFirewall
FirewallApo
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
Navdeep Dhingra
 
Firewall
FirewallFirewall

What's hot (19)

Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall
FirewallFirewall
Firewall
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Security standard
Security standardSecurity standard
Security standard
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Firewall
FirewallFirewall
Firewall
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Firewall
FirewallFirewall
Firewall
 

Similar to Network Security

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
ezoicxcom
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
saad504633
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
haq107457
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAVSAHU55
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
Dr. Shivashankar
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdfElegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
JankharlaQuintero
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
SimarpreetKaur735622
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
FahmiOlayah
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
ijmnct
 
Firewall
FirewallFirewall
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
Alexander Decker
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 

Similar to Network Security (20)

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdfElegant-and-Professional-Company-Business-Proposal-Presentation.pdf
Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Firewall
FirewallFirewall
Firewall
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Network Security

  • 2. CONTENTS 1. What is Network? 2. Network Security Devices 3. Network Security Protocols 4. Comparison between 2 Protocols 5. Importance of Network Security 6. Conclusion 2
  • 3. WHAT IS NETWORK? Network is a system that connects two or more devices connected to one another able to exchange data. The purpose of a network is to share resources and more processes. A network is a collection of computer, servers, network devices, or other devices connected to one another able to exchange data. 3
  • 4. WHAT IS NETWORK SECURITY?  Devices, tools, techniques and also methodologies that are used to secure a network.  Protecting the Network from Intruders.  Regulating access to Network resources.  Requiring network users to Authenticate. 4
  • 5. NETWORK SECURITY DEVICES Below are the Network Security devices; 1. Firewall 2. Proxy Server 3. Intrusion Detection System 4. Intrusion Prevention System 5
  • 6. 1. FIREWALL  Is a set of hardware and software tool.  A choke point of control and monitoring.  Interconnect networks with different trusts.  Provides NAT and usage monitoring.  Implementing VPN’s using IPSec.  Auditing And controlling accesses. 6
  • 7. 2. PROXY  A proxy is an entity with the authority to act on behalf of another one.  Proxy servers sit between a client and an untrusted network system such as Internet.  Prevents direct accesses with untrusted systems.  Requests of client’s are directed to proxies. 7
  • 8. 3. INTRUSION DETECTION SYSTEM  Is a system that monitors the traffics on a network for suspicious activities.  Issues alerts when a threat/issue activity is been discovered.  Normally detects and reports for threats.  Also monitors the network packets whether that they are suitable for the network and checks whether loads network traffic insecurely.  Advantages:  Disadvantages: 8
  • 9. 4. INTRUSION PREVENTION SYSTEM  Detects and Prevents threats and unauthorized accesses.  Detects irregular traffics and prevents intrusions before costly damages occur.  Deploying using sensors.  Uses signatures to detect patterns of misuse in network traffics.  Secure the network system with any damages. 9
  • 10. NETWORK SECURITY PROTOCOLS Below are the Network Security Protocols; 1. Simple Network Management Protocol 2. Dynamic Host Configuration Protocol 3. Secure Socket Layer 4. Internet Protocol Security 5. Remote Network Monitoring 6. File Transfer Protocol 10
  • 11. 1.SIMPLE NETWORK MANAGEMENT PROTOCOL  Allows to monitor the network  This is a application layer protocol used to manage and monitor network devices and their functions.  Enables a network administrator to manage and monitor all of those nodes from a single interface, which can typically support batch commands and automatic alerts.  No – Wasting of time, Resources, Knowledge etc. 11
  • 12. 2. DYNAMIC HOST CONFIGURATION PROTOCOL  Enables a server to assign an IP address automatically to a computer from an exacted range of numbers that had configured to a given network.  DHCP is a secure system because of its dynamic IP assigning system.  Used to issue unique IP addresses and automatically configure other network information.  The working process is as below. 12
  • 13. 3. SECURE SOCKET LAYER  Used for secure transmission of information over a network.  Encrypts the network connection segments above the transport layer, which is a network connection component above the program layer.  Through this SSL protocol Data integrity, Data privacy, Client-Server authentication and more objectives are being held. 13
  • 14. 4. INTERNET PROTOCOL SECURITY  Is a set of procedures that affords security for the Internet Protocol.  This uses cryptography (solving codes) to provide security.  Used for setup of the virtual private networks (VPNs) in a secure and possible manner.  Consists with 2 services: Authentication Header & Encapsulating Security Payload (ESP).  And consists with 2 models: Tunnel mode & Transport mode. 14
  • 15. 5. REMOTE NETWORK MONITORING  Enables various network monitors and console systems to exchange network monitoring data.  RMON is developed to address the issue of remote sites and Local area network segment management from a centralized location.  Monitoring devices contains RMON software agents that collect information and analyze packets through the network.  Collects 9 kinds of information: 15
  • 16. 6. FILE TRANSFER PROTOCOL  This is used for transferring files with smaller and larger in sizes across a network securely.  Processes between two computers and users.  FTP provides facility to transfer files via remote accessed computers with easy and efficient data transfer.  Below is the process; 16
  • 17. COMPARISON BETWEEN 2 PROTOCOLS 17 Simple Network Management Protocol Remote Network Monitoring Monitors network performance Manages and monitoring servers, devices Audit network usage Offline monitoring Detects network failures Proactive monitoring Configure remote devices Client reporting Detects inappropriate accesses Offers backups and antivirus
  • 18. IMPORTANCE OF NETWORK SECURITY  To process the network continuously.  Availability of the network.  Protect data from threats and to protect the policies.  To safeguard the assets of the company.  Enhance Network Performance. 18