SlideShare a Scribd company logo
1 of 29
NETWORK
SECURITY
OVERVIEW
• What is security?
• Why do we need security?
• Who is vulnerable?
• Types of network
• Threats
• Areas of Security Weakness
• Hackers & methods of attack
2
OVERVIEW
• Backups, Encryption & Virus protection
• Common security attacks and countermeasures
– Firewalls
– Intrusion Detection Systems
– IP Sec
– Packet Sniffing
– Social Problems
3
What is “Security”
• Definition says:
– Freedom from risk or danger; something that
gives or assures SAFETY.
– Freedom from doubt, anxiety, or fear;
CONFIDENCE.
4
What is “Security”
• Security Attack: Any action that compromises
the security of information.
• Security Mechanism: A mechanism that is
designed to detect, prevent, or recover from a
security attack.
• Security Service: A service that enhances the
security of data processing systems and
information transfers. A security service
makes use of one or more security
mechanisms.
5
Why do we need security?
• Protect vital info while still allowing access
to those who need it
• Provide authentication and access control
for resources
• Guarantee privacy and correct access
6
Who is vulnerable?
• Govt and defense agencies
• Contractors to various govt agencies
• Financial institutions and banks
• Internet service providers
• Multinational corporations
• ANYONE ON THE NETWORK
7
Types of Networks
• LAN
• Interconnected Networks
• Heterogeneous Networks
• Campus Metropolitan & WANs
8
Areas of Weakness
• Easily guessed/leaked passwords
• Poor login settings
• Data with viruses
• Poorly Implemented Firewalls
• Loss of sys having imp data/info
• Honey-trap or compromise
9
Hackers
• One who seeks and exploits
weaknesses in a sys or network
• An electronic sport
• Use sophisticated tech to break into sys
• Info useful for others
10
Hacker Motivations
 Money, profit
 Access to addn resources
 Experimentation and desire to learn
 “Gang” mentality
 Psychological needs
 Self-gratification
 Personal vengeance
 Desire to embarrass the tgt
11
Methods of attack
• Phone attack (preachers)
• Accts & pswd attack
• Viruses & Trojan Horses
12
Methods of attack
• Phone attack (preachers)
• Accts & pswd attack
• Viruses & Trojan Horses
14
Common security attacks and their
countermeasures
• Finding a way into the network : FIREWALLS
• Exploiting software bugs, buffer overflows : IDS
• TCP hijacking : IP SEC
• Packet sniffing : ENCRYPTION
• Social problems : EDUCATION
15
Firewalls
• A gp of components that collectively form a
barrier between two networks.
• A firewall is like a castle with a drawbridge
– Only one point of access into the network
– This can be good or bad
• Solution
– Admin limits access to end hosts by using a
firewall
– Firewall is kept up-to-date by admin
16
Firewalls
17
Insider
Outsider
Firewall
Firewall
Web server, email
server etc
Intrusion Detection Sys
• Monitors network or sys activities for
malicious activities or policy violations and
produces reports to mgt stn.
• Used to monitor for “suspicious activity” on
a network
– Can protect against known software exploits
• Uses “intrusion signatures”
– Well known patterns of behaviour
18
IP Sec
• Internet Protocol Security (IP Sec) is a protocol
suite for securing Internet Protocol (IP) comn by
authenticating and encrypting each IP packet of a
comn session.
• IP Sec also includes protocols for establishing
mutual authentication between agents at the
beginning of the session and negotiation of
cryptographic keys to be used during the session.
Packet Sniffing
• A packet sniffer simply captures all of the
packets of data that pass through a given
network interface.
• Typically, it would only capture packets that
were intended for the machine in question.
• However, if placed into random mode, the
packet sniffer is also capable of
capturing ALL packets traversing the network
regardless of destination.
20
Social Problems
• People/Users can be just as dangerous as
unprotected computer systems
• People can be lied to, manipulated, bribed,
threatened, harmed, tortured, etc. to give
up valuable info
• Most humans will breakdown once they are
at the “harmed” stage, unless they have
been specially trained
21
Social Problems
• Humans will continue to be tricked into giving out
information they shouldn’t
• Educating them may help a little here, but,
depending on how bad you want the info, there are a
lot of bad things you can do to get it
• Implement a wide variety of solutions and more
closely monitor who has access to what network
resources and info
22
Countermeasures
• Identification & authentication
• Access Cont
• Accountability & auditing
• Accuracy
• Reliabilty
• Data Exchange
23
Countermeasures
• Identification & authentication
• Access Cont
• Accountability & auditing
• Accuracy
• Reliabilty
• Data Exchange
24
Backups
• Physical loss of sys
• Sys crash
• Virus attack
• Ensure non-corrupted backup
• Reg backups
• Safety of backups as well
25
Encryption
• Cryptographic tech/the process of encoding
messages (or info) in such a way that others
(hackers) cannot read it, but that
authorized indl can.
• Data remains pvt even after compromised
• Encryption sys/software is protected &
secure
26
Virus Protection
• Threat to network
• Contact & spread
• Monitor the telltale signs in network
• Trg of users in handling antivirus
• Re-infect capability
• Ensure backups
27
Elements of a comprehensive
security program
 Have Good Passwords
 Use Good Antiviral Products
 Use Good Cryptography
 Have Good Firewalls
 Have a Backup System
 Audit and Monitor Systems and Networks
 Have Training and Awareness Programs
 Test Your Security Frequently
28
Conclusion
• The Internet was not created with security in mind.
• Comn can be altered, examined and exploited.
• There is a growing need to protect private info
crossing the public networks that make up the Internet
infrastructure.
• A network security policy, an auditing procedure, and a
violation response plan must all be in place to deal
with any breach or breakdown of network security
before it occurs.
•
Questions IF ANY….

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 

What's hot (20)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Software security
Software securitySoftware security
Software security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network security
Network securityNetwork security
Network security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Dmz
Dmz Dmz
Dmz
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 

Similar to Network Security

Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Cis326week1lesson1
Cis326week1lesson1Cis326week1lesson1
Cis326week1lesson1Fahad_1
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptxFAKHARZAMANPROUD
 
Network security
Network securityNetwork security
Network securityhajra azam
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptxBinod Rimal
 

Similar to Network Security (20)

Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Cis326week1lesson1
Cis326week1lesson1Cis326week1lesson1
Cis326week1lesson1
 
Computer security
Computer securityComputer security
Computer security
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
 
Network security
Network securityNetwork security
Network security
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Network Security

  • 2. OVERVIEW • What is security? • Why do we need security? • Who is vulnerable? • Types of network • Threats • Areas of Security Weakness • Hackers & methods of attack 2
  • 3. OVERVIEW • Backups, Encryption & Virus protection • Common security attacks and countermeasures – Firewalls – Intrusion Detection Systems – IP Sec – Packet Sniffing – Social Problems 3
  • 4. What is “Security” • Definition says: – Freedom from risk or danger; something that gives or assures SAFETY. – Freedom from doubt, anxiety, or fear; CONFIDENCE. 4
  • 5. What is “Security” • Security Attack: Any action that compromises the security of information. • Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. • Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms. 5
  • 6. Why do we need security? • Protect vital info while still allowing access to those who need it • Provide authentication and access control for resources • Guarantee privacy and correct access 6
  • 7. Who is vulnerable? • Govt and defense agencies • Contractors to various govt agencies • Financial institutions and banks • Internet service providers • Multinational corporations • ANYONE ON THE NETWORK 7
  • 8. Types of Networks • LAN • Interconnected Networks • Heterogeneous Networks • Campus Metropolitan & WANs 8
  • 9. Areas of Weakness • Easily guessed/leaked passwords • Poor login settings • Data with viruses • Poorly Implemented Firewalls • Loss of sys having imp data/info • Honey-trap or compromise 9
  • 10. Hackers • One who seeks and exploits weaknesses in a sys or network • An electronic sport • Use sophisticated tech to break into sys • Info useful for others 10
  • 11. Hacker Motivations  Money, profit  Access to addn resources  Experimentation and desire to learn  “Gang” mentality  Psychological needs  Self-gratification  Personal vengeance  Desire to embarrass the tgt 11
  • 12. Methods of attack • Phone attack (preachers) • Accts & pswd attack • Viruses & Trojan Horses 12
  • 13. Methods of attack • Phone attack (preachers) • Accts & pswd attack • Viruses & Trojan Horses 14
  • 14. Common security attacks and their countermeasures • Finding a way into the network : FIREWALLS • Exploiting software bugs, buffer overflows : IDS • TCP hijacking : IP SEC • Packet sniffing : ENCRYPTION • Social problems : EDUCATION 15
  • 15. Firewalls • A gp of components that collectively form a barrier between two networks. • A firewall is like a castle with a drawbridge – Only one point of access into the network – This can be good or bad • Solution – Admin limits access to end hosts by using a firewall – Firewall is kept up-to-date by admin 16
  • 17. Intrusion Detection Sys • Monitors network or sys activities for malicious activities or policy violations and produces reports to mgt stn. • Used to monitor for “suspicious activity” on a network – Can protect against known software exploits • Uses “intrusion signatures” – Well known patterns of behaviour 18
  • 18. IP Sec • Internet Protocol Security (IP Sec) is a protocol suite for securing Internet Protocol (IP) comn by authenticating and encrypting each IP packet of a comn session. • IP Sec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
  • 19. Packet Sniffing • A packet sniffer simply captures all of the packets of data that pass through a given network interface. • Typically, it would only capture packets that were intended for the machine in question. • However, if placed into random mode, the packet sniffer is also capable of capturing ALL packets traversing the network regardless of destination. 20
  • 20. Social Problems • People/Users can be just as dangerous as unprotected computer systems • People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable info • Most humans will breakdown once they are at the “harmed” stage, unless they have been specially trained 21
  • 21. Social Problems • Humans will continue to be tricked into giving out information they shouldn’t • Educating them may help a little here, but, depending on how bad you want the info, there are a lot of bad things you can do to get it • Implement a wide variety of solutions and more closely monitor who has access to what network resources and info 22
  • 22. Countermeasures • Identification & authentication • Access Cont • Accountability & auditing • Accuracy • Reliabilty • Data Exchange 23
  • 23. Countermeasures • Identification & authentication • Access Cont • Accountability & auditing • Accuracy • Reliabilty • Data Exchange 24
  • 24. Backups • Physical loss of sys • Sys crash • Virus attack • Ensure non-corrupted backup • Reg backups • Safety of backups as well 25
  • 25. Encryption • Cryptographic tech/the process of encoding messages (or info) in such a way that others (hackers) cannot read it, but that authorized indl can. • Data remains pvt even after compromised • Encryption sys/software is protected & secure 26
  • 26. Virus Protection • Threat to network • Contact & spread • Monitor the telltale signs in network • Trg of users in handling antivirus • Re-infect capability • Ensure backups 27
  • 27. Elements of a comprehensive security program  Have Good Passwords  Use Good Antiviral Products  Use Good Cryptography  Have Good Firewalls  Have a Backup System  Audit and Monitor Systems and Networks  Have Training and Awareness Programs  Test Your Security Frequently 28
  • 28. Conclusion • The Internet was not created with security in mind. • Comn can be altered, examined and exploited. • There is a growing need to protect private info crossing the public networks that make up the Internet infrastructure. • A network security policy, an auditing procedure, and a violation response plan must all be in place to deal with any breach or breakdown of network security before it occurs. •