NETWORK SECURITY
BY RAAZ KARKEE
OBJECTIVE
• What is network security?
• Types of network security?
• Network security technology?
• Current Developments?
CONTENTS
• Introduction
• Objective of Network security
• History
• Types
• Network security technology
• Wireless network security
• Current development
• Future development
• conclusion
NETWORK
• A Network is a series of points or nodes interconnected by
communication paths.
• Interconnect with other networks and contain
sub networks.
DEFINE SECURITY
• Security is “Freedom from risk or danger.“
• The ability of a system to protect information and system
resources with respect to confidentiality and integrity.
NETWORK SECURITY
• Any activities designed to protect your network .
• Target- variety of threats and stops them from entering or
spreading on your network.
• Handled by a network administrator.
OBJECTIVE
• Access
• Confidentiality
• Authentication
• Integrity
• Non‐repudiation
HISTORY
• During the 1980s, the hackers and crimes were beginning to
emerge.
• CERT was created to overcome network security issues.
• In the 1990s, Internet became public and the
• security concerns increased tremendously.
TYPES
• Five types of network security can aid in secure networking.
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
SECURITY TOOLS
• Antivirus software packages
• Secure network infrastructure
• Virtual private network
• Encryption
• Security management
NETWORK SECURITY TECHNOLOGY
Different mechanisms to deal with these attacks.
Cryptographic systems:
plaintext is converted in to cipher text.
• Secret Key Cryptography (SKC)
Public Key Cryptography (PKC):
Hash Function:
Hash function
Plain text Cipher text
FIREWALL
• A typical border control mechanism.
• Metaphor for network security.
• Designed to prevent unauthorized access to or from a private network.
FIREWALL TYPES
• Packet Filtering Firewall
• State Full Firewall
• Application Aware Firewall etc..
Network-based IDs (NIDS):
The sensor are located at the choke in network
It monitored, it captures all the network traffic and analyze each packets for
malicious traffic
SECURE SOCKET LAYER (SSL):
• It is a good level of security between a web browser
and a website.
• There is a tunnel between them.
• Clients present a certificate to the server to
prove their identity.
WIRELESS NETWORK SECURITY
• prevention of unauthorized access using wireless networks.
Security Policies:
• Wireless Intrusion Prevention System(WIPS)
• Wireless Intrusion Detection System (WIDS)
CURRENT DEVELOPMENTS:
Hardware Developments
• Biometric systems -secure workstation logons
• Smart cards -undeniable proof of a user’s identity.
Software Developments
• Current research develops security software using neural
networks.
• Objective- use neural networks for the facial recognition software.
FUTURE TREND:
The network security will be able to function as an immune system.
The same set of security technology that is being used today with some
minor adjustments.
CONCLUSION
• The network security field evolve more rapidly to deal with the threats further in the future.
“As threats tweaks,
Security tremendously Tweaks”
Source: wikipedia

Network security

  • 1.
  • 2.
    OBJECTIVE • What isnetwork security? • Types of network security? • Network security technology? • Current Developments?
  • 3.
    CONTENTS • Introduction • Objectiveof Network security • History • Types • Network security technology • Wireless network security • Current development • Future development • conclusion
  • 4.
    NETWORK • A Networkis a series of points or nodes interconnected by communication paths. • Interconnect with other networks and contain sub networks.
  • 5.
    DEFINE SECURITY • Securityis “Freedom from risk or danger.“ • The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  • 6.
    NETWORK SECURITY • Anyactivities designed to protect your network . • Target- variety of threats and stops them from entering or spreading on your network. • Handled by a network administrator.
  • 7.
    OBJECTIVE • Access • Confidentiality •Authentication • Integrity • Non‐repudiation
  • 8.
    HISTORY • During the1980s, the hackers and crimes were beginning to emerge. • CERT was created to overcome network security issues. • In the 1990s, Internet became public and the • security concerns increased tremendously.
  • 9.
    TYPES • Five typesof network security can aid in secure networking. • Physical security • Perimeter protection • User training and education • Wireless encryption protocol (WEP) • MAC address filtering
  • 10.
    SECURITY TOOLS • Antivirussoftware packages • Secure network infrastructure • Virtual private network • Encryption • Security management
  • 11.
    NETWORK SECURITY TECHNOLOGY Differentmechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text. • Secret Key Cryptography (SKC)
  • 12.
    Public Key Cryptography(PKC): Hash Function: Hash function Plain text Cipher text
  • 13.
    FIREWALL • A typicalborder control mechanism. • Metaphor for network security. • Designed to prevent unauthorized access to or from a private network.
  • 14.
    FIREWALL TYPES • PacketFiltering Firewall • State Full Firewall • Application Aware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic
  • 15.
    SECURE SOCKET LAYER(SSL): • It is a good level of security between a web browser and a website. • There is a tunnel between them. • Clients present a certificate to the server to prove their identity.
  • 16.
    WIRELESS NETWORK SECURITY •prevention of unauthorized access using wireless networks. Security Policies: • Wireless Intrusion Prevention System(WIPS) • Wireless Intrusion Detection System (WIDS)
  • 17.
    CURRENT DEVELOPMENTS: Hardware Developments •Biometric systems -secure workstation logons • Smart cards -undeniable proof of a user’s identity. Software Developments • Current research develops security software using neural networks. • Objective- use neural networks for the facial recognition software.
  • 18.
    FUTURE TREND: The networksecurity will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.
  • 19.
    CONCLUSION • The networksecurity field evolve more rapidly to deal with the threats further in the future. “As threats tweaks, Security tremendously Tweaks” Source: wikipedia