SlideShare a Scribd company logo
Network Security
By
Mahmoud Abdeen Mohammed
1
2
Agenda
- Viruses and Worms
- Standard system attack
-Protection Methods
-Encryption Algorithms
-Firewalls & proxy server
-Wireless security
-Conclusion
Chapt er Thirt een - Net work Securit y
3
Viruses and Worms
Virus is a small program that alters the way a computer
operates and often does various types of damage by deleting
and corrupting data and program files, or by altering operating
system components, so that computer operation is impaired or
even halted.
Many different types of viruses, such as parasitic, boot sector,
stealth, polymorphic, and macro.
Chapt er Thirt een - Net work Securit y
4
Worm is a program that copies itself from one system to
another over a network, without the assistance of a human
being.
Worms usually propagate themselves by transferring from
computer to computer via e-mail.
Typically, a virus or a worm is transported as a Trojan horse—
in other words, hiding inside a harmless-looking piece of code
such as an e-mail or an application macro.
Chapt er Thirt een - Net work Securit y
5
Standard System Attacks
Two leading forms of attacks the last few years:
1. Exploiting known operating system vulnerabilities
2. Exploiting known vulnerabilities in application software
For both of these, software company issues a patch.
Patch may fix it, or introduce even more holes.
Either way, bad guys find new holes and exploit.
Chapt er Thirt een - Net work Securit y
6
A very common way to attack vulnerability is via an e-mail
attachment. You open the attachment and you launch the virus.
Second common way to attack is to simply scan your computer
ports while you are connected to the Internet (either dial-up or
non-dial-up). If you have an open port, hacker will download
malicious software to your machine.
Chapt er Thirt een - Net work Securit y
Standard System Attacks
7
Other Standard System Attacks
Spoofing is when a user creates a packet that appears to be
something else or from someone else.
Trojan Horse is a malicious piece of code hidden inside a
seemingly harmless piece of code.
Stealing, guessing, and intercepting passwords is also a tried
and true form of attack.
Chapt er Thirt een - Net work Securit y
8
Chapt er Thirt een - Net work Securit y
Network protection
- physical Protection
- Controlling Access
- Passwords and ID Systems
- Access Rights
- Auditing
- Encryption
9
1- Physical Protection
Protection from environmental damage such as floods,
earthquakes, and heat.
Physical security such as locking rooms, locking down
computers, keyboards, and other devices.
Electrical protection from power surges.
Noise protection from placing computers away from devices
that generate electromagnetic interference.
Chapt er Thirt een - Net work Securit y
10
2- Controlling Access
Deciding who has access to what.
Limiting time of day access.
Limiting day of week access.
Limiting access from a location, such as not allowing a user to
use a remote login during certain periods or any time.
Chapt er Thirt een - Net work Securit y
11
3- Passwords and ID Systems
Simple rules help support safe passwords, including:
• Change your password often.
• Pick a good, random password (minimum 8 characters, mixed
symbols).
• Don’t share passwords or write them down.
• Don’t select names and familiar objects as passwords.
Chapt er Thirt een - Net work Securit y
12
Chapt er Thirt een - Net work Securit y
13
Passwords forms
• Face prints
• Retina scans and iris scans
• Voice prints
• Fingerprints
Chapt er Thirt een - Net work Securit y
14
4- Access Rights
Two basic questions to access right: who and how?
Who do you give access right to? No one, group of users,
entire set of users?
How does a user or group of users have access? Read, write,
delete, print, copy, execute?
Chapt er Thirt een - Net work Securit y
15
Chapt er Thirt een - Net work Securit y
16
5- Auditing
Creating audit can help detect wrongdoing.
Many network operating systems allow the administrator to
audit most types of transactions.
Many types of criminals have been caught because of
computer-based audits.
Chapt er Thirt een - Net work Securit y
17
Chapt er Thirt een - Net work Securit y
18
6- Encryption and Decryption
Plaintext is the data that before any encryption has been
performed.
Ciphertext is the data after encryption has been performed.
The key is the unique piece of information that is used to create
ciphertext and decrypt the ciphertext back into plaintext.
Chapt er Thirt een - Net work Securit y
19
1- Monoalphabetic Substitution-based Ciphers
Monoalphabetic substitution-based ciphers replace a character
or characters with a different character or characters, based
upon some key.
Replacing: abcdefghijklmnopqrstuvwxyz
With: POIUYTREWQLKJHGFDSAMNBVCXZ
The message: how about lunch at noon
encodes into EGVPO GNMKN HIEPM HGGH
Chapt er Thirt een - Net work Securit y
20
2- Polyalphabetic Substitution-based Ciphers
Similar to monoalphabetic ciphers except multiple alphabetic
strings are used to encode the plaintext.
For example, a matrix of strings, 26 rows by 26 characters or
columns can be used.
A key such as COMPUTERSCIENCE is placed repeatedly over
the plaintext.
COMPUTERSCIENCECOMPUTERSCIENCECOMPUTER
thisclassondatacommunicationsisthebest
Chapt er Thirt een - Net work Securit y
21
Ex: To encode the message, take the first letter of the plaintext,
t, and the corresponding key character immediately above it, C.
Go to row C column t in the 26x26 matrix and retrieve the
ciphertext character V.
Continue with the other characters in the plaintext.
Chapt er Thirt een - Net work Securit y
22
3- Transposition-based Ciphers
In a transposition-based cipher, the order the plaintext is not
preserved.
As a simple example, select a key such as COMPUTER.
Number the letters of the word COMPUTER in the order they
appear in the alphabet.
1 4 3 5 8 7 2 6
C O M P U T E R
Chapt er Thirt een - Net work Securit y
23
solution
Now take the plaintext message and write it under the key.
1 4 3 5 8 7 2 6
C O M P U T E R
t h i s i s t h
e b e s t c l a
s s i h a v e e
v e r t a k e n
Chapt er Thirt een - Net work Securit y
The message encoded into :-
TESVTLEEIEIRHBSESSHTHAENSCVKITAA
24
4- Public Key Cryptography
Very powerful encryption technique in which two keys are
used: the first key (the public key) encrypts the message while
the second key (the private key) decrypts the message.
Not possible to deduce one key from the other.
Not possible to break the code given the public key.
If you want someone to send you secure data, give them your
public key, you keep the private key.
Secure sockets layer on the Internet is a common example of
public key cryptography.
Chapt er Thirt een - Net work Securit y
25
5- Data Encryption Standard (DES)
Created in 1977 and in operation into the 1990s, the data
encryption standard took a 64-bit block of data and subjected it
to 16 levels of encryption.
The choice of encryption performed at each of the 16 levels
depends on the 56-bit key applied.
Even though 56 bits provides over 72 quadrillion combinations,
Chapt er Thirt een - Net work Securit y
26
a system using this standard has been cracked (in 1998 by
Electronic Frontier Foundation in 3 days).
Chapt er Thirt een - Net work Securit y
27
6- Triple-DES
A more powerful data encryption standard.
Data is encrypted using DES three times: the first time by the
first key, the second time by a second key, and the third time by
the first key again. (Can also have 3 unique keys.)
While virtually unbreakable, triple-DES is CPU intensive.
With more smart cards, cell phones, and PDAs, a faster (and
smaller) piece of code is highly desirable.
Chapt er Thirt een - Net work Securit y
28
7- Advanced Encryption Standard (AES)
Selected by the U.S. government to replace DES in October
2000 as the basis for AES.
AES has more elegant mathematical formulas, requires only
one pass, and was designed to be fast, unbreakable, and able to
support even the smallest computing device.
Key size of AES: 128, 192, or 256 bits
Estimated time to crack (assuming a machine could crack a
DES key in 1 second) : 149 trillion years
Very fast execution with very good use of resources
Chapt er Thirt een - Net work Securit y
29
8- Public Key Infrastructure
Applications that could benefit from PKI:
• World Wide Web transactions
• Virtual private networks
• Electronic mail
• Client-server applications
• Banking transactions
Chapt er Thirt een - Net work Securit y
30
Firewalls
A system or combination of systems that supports an access
control policy between two networks.
A firewall can limit the types of transactions that enter a
system, as well as the types of transactions that leave a system.
Firewalls can be programmed to stop certain types or ranges of
IP addresses, as well as certain types of TCP port numbers
(applications).
Chapt er Thirt een - Net work Securit y
31
A proxy server is a more advanced firewall that acts as a
doorman into a corporate network. Any external transaction
that request something from the corporate network must enter
through the proxy server.
Proxy servers are more advanced but make external accesses
slower.
Chapt er Thirt een - Net work Securit y
32
Wireless Security
How do you make a wireless LAN secure?
WEP (Wired Equivalency Protocol) was the first security
protocol used with wireless LANs. It had weak 40-bit static
keys and was too easy to break.
WPA (Wi-Fi Protected Access) replaced WEP. Major
improvement including dynamic key encryption and mutual
authentication for wireless clients.
Chapt er Thirt een - Net work Securit y
33
Conclusion
It is now important with the global expansion of the size and
the number of networks that there will be protection updatd
with this growth in order to keep existing data within these
networks, especially since there is an evolution in ways to
penetrate networks
Chapt er Thirt een - Net work Securit y
34
Chapt er Thirt een - Net work Securit y

More Related Content

What's hot

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
Firewall
FirewallFirewall
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
Sam Bowne
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
skpatel91
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
sweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
karanwayne
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
Savvius, Inc
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
ahmad abdelhafeez
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
jemtallon
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
Sam Bowne
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
Juanita McConnell
 
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Disha Bedi
 
All About Snort
All About SnortAll About Snort
All About Snort
28pranjal
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
webhostingguy
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 

What's hot (20)

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Firewall
FirewallFirewall
Firewall
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
 
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
 
All About Snort
All About SnortAll About Snort
All About Snort
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
Network Security
Network SecurityNetwork Security
Network Security
 

Viewers also liked

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 
Latvia, window of opportunity for greentech
Latvia, window of opportunity for greentechLatvia, window of opportunity for greentech
Latvia, window of opportunity for greentech
Investment & Development Agency of Latvia (LIAA)
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
CSSRL PUNE
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Bryley Systems Inc.
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Web Security
Web SecurityWeb Security
Web Security
ADIEFEH
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
Arnab Singha
 
Computer virus
Computer virusComputer virus
Computer virus
Maxie Santos
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
 
Web Security
Web SecurityWeb Security
Web Security
Ram Dutt Shukla
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
kmtschida
 
Chapter 11
Chapter 11Chapter 11
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
Nitish Xavier Tirkey
 

Viewers also liked (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Latvia, window of opportunity for greentech
Latvia, window of opportunity for greentechLatvia, window of opportunity for greentech
Latvia, window of opportunity for greentech
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Web Security
Web SecurityWeb Security
Web Security
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Web Security
Web SecurityWeb Security
Web Security
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 

Similar to Network security

Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4
nayamat32
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
trendy updates
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Hacking
HackingHacking
Hacking
HackingHacking
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
Wail Hassan
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
Hacking In Detail
Hacking In DetailHacking In Detail
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
MSA Technosoft
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 

Similar to Network security (20)

Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4
 
Cyber security
Cyber securityCyber security
Cyber security
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 

Network security

  • 2. 2 Agenda - Viruses and Worms - Standard system attack -Protection Methods -Encryption Algorithms -Firewalls & proxy server -Wireless security -Conclusion Chapt er Thirt een - Net work Securit y
  • 3. 3 Viruses and Worms Virus is a small program that alters the way a computer operates and often does various types of damage by deleting and corrupting data and program files, or by altering operating system components, so that computer operation is impaired or even halted. Many different types of viruses, such as parasitic, boot sector, stealth, polymorphic, and macro. Chapt er Thirt een - Net work Securit y
  • 4. 4 Worm is a program that copies itself from one system to another over a network, without the assistance of a human being. Worms usually propagate themselves by transferring from computer to computer via e-mail. Typically, a virus or a worm is transported as a Trojan horse— in other words, hiding inside a harmless-looking piece of code such as an e-mail or an application macro. Chapt er Thirt een - Net work Securit y
  • 5. 5 Standard System Attacks Two leading forms of attacks the last few years: 1. Exploiting known operating system vulnerabilities 2. Exploiting known vulnerabilities in application software For both of these, software company issues a patch. Patch may fix it, or introduce even more holes. Either way, bad guys find new holes and exploit. Chapt er Thirt een - Net work Securit y
  • 6. 6 A very common way to attack vulnerability is via an e-mail attachment. You open the attachment and you launch the virus. Second common way to attack is to simply scan your computer ports while you are connected to the Internet (either dial-up or non-dial-up). If you have an open port, hacker will download malicious software to your machine. Chapt er Thirt een - Net work Securit y Standard System Attacks
  • 7. 7 Other Standard System Attacks Spoofing is when a user creates a packet that appears to be something else or from someone else. Trojan Horse is a malicious piece of code hidden inside a seemingly harmless piece of code. Stealing, guessing, and intercepting passwords is also a tried and true form of attack. Chapt er Thirt een - Net work Securit y
  • 8. 8 Chapt er Thirt een - Net work Securit y Network protection - physical Protection - Controlling Access - Passwords and ID Systems - Access Rights - Auditing - Encryption
  • 9. 9 1- Physical Protection Protection from environmental damage such as floods, earthquakes, and heat. Physical security such as locking rooms, locking down computers, keyboards, and other devices. Electrical protection from power surges. Noise protection from placing computers away from devices that generate electromagnetic interference. Chapt er Thirt een - Net work Securit y
  • 10. 10 2- Controlling Access Deciding who has access to what. Limiting time of day access. Limiting day of week access. Limiting access from a location, such as not allowing a user to use a remote login during certain periods or any time. Chapt er Thirt een - Net work Securit y
  • 11. 11 3- Passwords and ID Systems Simple rules help support safe passwords, including: • Change your password often. • Pick a good, random password (minimum 8 characters, mixed symbols). • Don’t share passwords or write them down. • Don’t select names and familiar objects as passwords. Chapt er Thirt een - Net work Securit y
  • 12. 12 Chapt er Thirt een - Net work Securit y
  • 13. 13 Passwords forms • Face prints • Retina scans and iris scans • Voice prints • Fingerprints Chapt er Thirt een - Net work Securit y
  • 14. 14 4- Access Rights Two basic questions to access right: who and how? Who do you give access right to? No one, group of users, entire set of users? How does a user or group of users have access? Read, write, delete, print, copy, execute? Chapt er Thirt een - Net work Securit y
  • 15. 15 Chapt er Thirt een - Net work Securit y
  • 16. 16 5- Auditing Creating audit can help detect wrongdoing. Many network operating systems allow the administrator to audit most types of transactions. Many types of criminals have been caught because of computer-based audits. Chapt er Thirt een - Net work Securit y
  • 17. 17 Chapt er Thirt een - Net work Securit y
  • 18. 18 6- Encryption and Decryption Plaintext is the data that before any encryption has been performed. Ciphertext is the data after encryption has been performed. The key is the unique piece of information that is used to create ciphertext and decrypt the ciphertext back into plaintext. Chapt er Thirt een - Net work Securit y
  • 19. 19 1- Monoalphabetic Substitution-based Ciphers Monoalphabetic substitution-based ciphers replace a character or characters with a different character or characters, based upon some key. Replacing: abcdefghijklmnopqrstuvwxyz With: POIUYTREWQLKJHGFDSAMNBVCXZ The message: how about lunch at noon encodes into EGVPO GNMKN HIEPM HGGH Chapt er Thirt een - Net work Securit y
  • 20. 20 2- Polyalphabetic Substitution-based Ciphers Similar to monoalphabetic ciphers except multiple alphabetic strings are used to encode the plaintext. For example, a matrix of strings, 26 rows by 26 characters or columns can be used. A key such as COMPUTERSCIENCE is placed repeatedly over the plaintext. COMPUTERSCIENCECOMPUTERSCIENCECOMPUTER thisclassondatacommunicationsisthebest Chapt er Thirt een - Net work Securit y
  • 21. 21 Ex: To encode the message, take the first letter of the plaintext, t, and the corresponding key character immediately above it, C. Go to row C column t in the 26x26 matrix and retrieve the ciphertext character V. Continue with the other characters in the plaintext. Chapt er Thirt een - Net work Securit y
  • 22. 22 3- Transposition-based Ciphers In a transposition-based cipher, the order the plaintext is not preserved. As a simple example, select a key such as COMPUTER. Number the letters of the word COMPUTER in the order they appear in the alphabet. 1 4 3 5 8 7 2 6 C O M P U T E R Chapt er Thirt een - Net work Securit y
  • 23. 23 solution Now take the plaintext message and write it under the key. 1 4 3 5 8 7 2 6 C O M P U T E R t h i s i s t h e b e s t c l a s s i h a v e e v e r t a k e n Chapt er Thirt een - Net work Securit y The message encoded into :- TESVTLEEIEIRHBSESSHTHAENSCVKITAA
  • 24. 24 4- Public Key Cryptography Very powerful encryption technique in which two keys are used: the first key (the public key) encrypts the message while the second key (the private key) decrypts the message. Not possible to deduce one key from the other. Not possible to break the code given the public key. If you want someone to send you secure data, give them your public key, you keep the private key. Secure sockets layer on the Internet is a common example of public key cryptography. Chapt er Thirt een - Net work Securit y
  • 25. 25 5- Data Encryption Standard (DES) Created in 1977 and in operation into the 1990s, the data encryption standard took a 64-bit block of data and subjected it to 16 levels of encryption. The choice of encryption performed at each of the 16 levels depends on the 56-bit key applied. Even though 56 bits provides over 72 quadrillion combinations, Chapt er Thirt een - Net work Securit y
  • 26. 26 a system using this standard has been cracked (in 1998 by Electronic Frontier Foundation in 3 days). Chapt er Thirt een - Net work Securit y
  • 27. 27 6- Triple-DES A more powerful data encryption standard. Data is encrypted using DES three times: the first time by the first key, the second time by a second key, and the third time by the first key again. (Can also have 3 unique keys.) While virtually unbreakable, triple-DES is CPU intensive. With more smart cards, cell phones, and PDAs, a faster (and smaller) piece of code is highly desirable. Chapt er Thirt een - Net work Securit y
  • 28. 28 7- Advanced Encryption Standard (AES) Selected by the U.S. government to replace DES in October 2000 as the basis for AES. AES has more elegant mathematical formulas, requires only one pass, and was designed to be fast, unbreakable, and able to support even the smallest computing device. Key size of AES: 128, 192, or 256 bits Estimated time to crack (assuming a machine could crack a DES key in 1 second) : 149 trillion years Very fast execution with very good use of resources Chapt er Thirt een - Net work Securit y
  • 29. 29 8- Public Key Infrastructure Applications that could benefit from PKI: • World Wide Web transactions • Virtual private networks • Electronic mail • Client-server applications • Banking transactions Chapt er Thirt een - Net work Securit y
  • 30. 30 Firewalls A system or combination of systems that supports an access control policy between two networks. A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system. Firewalls can be programmed to stop certain types or ranges of IP addresses, as well as certain types of TCP port numbers (applications). Chapt er Thirt een - Net work Securit y
  • 31. 31 A proxy server is a more advanced firewall that acts as a doorman into a corporate network. Any external transaction that request something from the corporate network must enter through the proxy server. Proxy servers are more advanced but make external accesses slower. Chapt er Thirt een - Net work Securit y
  • 32. 32 Wireless Security How do you make a wireless LAN secure? WEP (Wired Equivalency Protocol) was the first security protocol used with wireless LANs. It had weak 40-bit static keys and was too easy to break. WPA (Wi-Fi Protected Access) replaced WEP. Major improvement including dynamic key encryption and mutual authentication for wireless clients. Chapt er Thirt een - Net work Securit y
  • 33. 33 Conclusion It is now important with the global expansion of the size and the number of networks that there will be protection updatd with this growth in order to keep existing data within these networks, especially since there is an evolution in ways to penetrate networks Chapt er Thirt een - Net work Securit y
  • 34. 34 Chapt er Thirt een - Net work Securit y