SlideShare a Scribd company logo
BY,
K.B.Snega,M.sc(CS),
Nadar Saraswathi College of Arts And
Science.
NETWORK SECURITY
Network
 A Network is a
series of points or
nodes
interconnected by
communication
paths.
 Interconnect
with other
networks and
contain sub
networks.
Security
Security is “Freedom
from risk or danger.
“ The ability of a
system to protect
information and
system resources with
respect to
confidentiality and
integrity.
Network security:
 Any activities designed to protect your network .
Target- variety of threats and stops them from
entering or spreading on your network.
Handled by a network administrator.
Objective
• Access
• Confidentiality
• Authentication
• Integrity
• Non‐repudiation
Types
Five types of network security can aid in secure
networking. • Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
Working and Components
Working:
We need multiple layers of security
Network security is accomplished through
hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall Intrusion
prevention systems
Virtual Private Networks
Security tools
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual private network
• Identity services
• Encryption
• Security management
CONCLUSION
 The network security field evolve more rapidly to
deal with the threats further in the future.
 “As threats tweaks, Security tremendously
Tweaks”

More Related Content

What's hot

Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeIkhtiar Khan Sohan
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 

What's hot (20)

Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Network security
Network securityNetwork security
Network security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Cyber security
Cyber securityCyber security
Cyber security
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network Security Network Security
Network Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 

Similar to Network security

NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptxSunilNagar42
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptographyprosunghosh7
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................MuhammadKhalil858111
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Network security
Network securityNetwork security
Network securitytoamma
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.pptPandiya Rajan
 

Similar to Network security (20)

NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Network security
Network securityNetwork security
Network security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
information security technology
information security technologyinformation security technology
information security technology
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
Network security
Network securityNetwork security
Network security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 

More from snegacmr

Process improvement
Process improvementProcess improvement
Process improvementsnegacmr
 
Rest based xml web services
Rest based xml web servicesRest based xml web services
Rest based xml web servicessnegacmr
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligencesnegacmr
 
Basic concepts of parallelization
Basic concepts of parallelizationBasic concepts of parallelization
Basic concepts of parallelizationsnegacmr
 
Deepi rdbms
Deepi rdbmsDeepi rdbms
Deepi rdbmssnegacmr
 
Computer network
Computer networkComputer network
Computer networksnegacmr
 
Dm powerpoint
Dm powerpointDm powerpoint
Dm powerpointsnegacmr
 
Data mining
Data miningData mining
Data miningsnegacmr
 
Query optimization
Query optimizationQuery optimization
Query optimizationsnegacmr
 
Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)snegacmr
 
System components (os)
System components (os)System components (os)
System components (os)snegacmr
 

More from snegacmr (14)

Process improvement
Process improvementProcess improvement
Process improvement
 
Rest based xml web services
Rest based xml web servicesRest based xml web services
Rest based xml web services
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligence
 
Basic concepts of parallelization
Basic concepts of parallelizationBasic concepts of parallelization
Basic concepts of parallelization
 
Deepi rdbms
Deepi rdbmsDeepi rdbms
Deepi rdbms
 
Computer network
Computer networkComputer network
Computer network
 
Os
OsOs
Os
 
Dm powerpoint
Dm powerpointDm powerpoint
Dm powerpoint
 
Sql
SqlSql
Sql
 
Data mining
Data miningData mining
Data mining
 
Cn
CnCn
Cn
 
Query optimization
Query optimizationQuery optimization
Query optimization
 
Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)Discretization and concept hierarchy(os)
Discretization and concept hierarchy(os)
 
System components (os)
System components (os)System components (os)
System components (os)
 

Recently uploaded

Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdfKamal Acharya
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamDr. Radhey Shyam
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...Amil baba
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptxfaamieahmd
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfAyahmorsy
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxVishalDeshpande27
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdfKamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfmahaffeycheryld
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptx
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdf
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 

Network security

  • 1. BY, K.B.Snega,M.sc(CS), Nadar Saraswathi College of Arts And Science. NETWORK SECURITY
  • 2. Network  A Network is a series of points or nodes interconnected by communication paths.  Interconnect with other networks and contain sub networks.
  • 3. Security Security is “Freedom from risk or danger. “ The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  • 4. Network security:  Any activities designed to protect your network . Target- variety of threats and stops them from entering or spreading on your network. Handled by a network administrator.
  • 5. Objective • Access • Confidentiality • Authentication • Integrity • Non‐repudiation
  • 6. Types Five types of network security can aid in secure networking. • Physical security • Perimeter protection • User training and education • Wireless encryption protocol (WEP) • MAC address filtering
  • 7. Working and Components Working: We need multiple layers of security Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  • 8. Security tools • Antivirus software packages • Secure network infrastructure • DNS hardware and software • Virtual private network • Identity services • Encryption • Security management
  • 9. CONCLUSION  The network security field evolve more rapidly to deal with the threats further in the future.  “As threats tweaks, Security tremendously Tweaks”