SlideShare a Scribd company logo
Network Security
Table of content
 Introduction
 Network Security Process
 Network Security Components
 Network Attacks
 Conclusions
 References
Introduction
 Information on networks may get compromised by
 unauthorized access,
 misuse,
 malfunction,
 modification,
 destruction, or improper disclosure.
 To prevent and monitor the unwanted threats policies
and practices are adopted.
 The process of taking physical and software
preventative measures to protect the networking
infrastructure is network security.
Network security process (1)
 Authentication-
1. One-factor authentication-
This requires just one detail, password, to authenticate a
user-name.
2. Two-factor authentication-
Authentication is done with the help of secondary device such
as a mobile phone, ATM card, security token etc.
3. Three-factor authentication-
This authentication procedure is bounded to user’s body
making the authentication unique for each user. Fingerprint
scan, retinal scan are some of the ways to implement this
authentication technique.
 Access control-
1. Firewall-
Enforces access policies such as
what services are allowed to be
accessed by the network users.
Though firewall are effective to prevent unauthorized access, but it
fails in dealing with potentially harmful content.
2. Anti-virus software, IPS/IDS-
Anti-virus software or intrusion prevention system (IPS) find
and tackle malwares while Intrusion detection system (IDS)
helps monitor the network.
Network security process (2)
Figure :Pictorial representation of firewall’s worki
Network security components (1)
 Encryption-
 It is a process in cryptography in which a message or
information is encoded in such a way that only authorized
users (those who have decryption key) can access it.
 Information or message, plaintext, is encrypted using an
encryption algorithm generating cipher-text that can only
be read after decryption, process of decrypting.
 Two types-
 Public key encryption
 Private key encryption
Network security components (2)
 Encryption-
Figure :Public key encryption
Network security components (3)
 Wireless security-
 Prevention of unauthorized access or damage to
computers using wireless networks.
 Types of wireless security-
 Wired Equivalent Privacy (WEP)-
 Introduced to provide data confidentiality comparable to that of wired
networks.
 Succeeded completely by WPA in 2003.
 Wi-Fi Protected Access (WPA)-
 WPA and WPA2 are the two protocols developed by Wi-Fi alliance in
2003.
 WPA3 was launched in Jan 2018 with better security than WPA2
Network Attacks (1)
Figure :Attacks on networks’ statistics
Network Attacks (2)
 Browser attack/Man-in-the-middle-
 Most common type of network attack as per the survey.
 Internet surfers are tricked into downloading malware that
is disguised as an update or an application.
 Cyber criminals target popular OS and apps by exploiting.
Network Attacks (3)
 Browser attack/Man-in-the-middle-
 Prevention measures-
“Detecting a MITM attack can be very difficult as user does not realize
about the data traffic interception until data is modified. Taking
precautions in this attack is much better than cure.”- ComputerWeekly
 Setting up an Intrusion detection system that monitors the
network and if someone tries to hijack, it gives immediate
alerts.
 Use of Virtual Private Network (VPN) that creates
encrypted tunnels providing additional security.
Network Attacks (4)
 Brute force attack-
 A method of defeating a cryptography scheme by trying a
large number of possibilities.
 The attacker systematically checks all possible
passwords and passphrases until the correct one is
found.
 A dictionary attack is similar and tries words in a dictionary
— or a list of common passwords — instead of all possible
passwords.
Network Attacks (5)
 Brute force attack-
 Prevention measures-
 Long and secure passwords, containing special
characters, is first and most important prevention measure
to be taken.
 Use of strong encryption algorithms like SHA-512.
 Login limits should be set on the services that accept
login. Server software is generally set to do this out of the
box, as it’s a good security practice.
 Occasionally changing passwords in a period of time.
Network Attacks (6)
 DoS/DDoS attack-
 Making service unavailable temporarily or indefinitely by
flooding the network with useless traffic in order to
overload systems.
 In DoS attack, typically one system is involved to flood a
network whereas in DDoS attack multiple systems and
multiple networks are involved.
 Due to the overloading of requests on a network,
legitimate users get a difficulty in accessing the services.
Network Attacks (7)
 DoS/DDoS attack-
Figure :DoS/DDoS attack explaination
Network Attacks (6)
 DoS/DDoS attack-
 Prevention measures-
 Limiting traffic by authentication of users, which can be
done by configuring servers.
 Using Firewall or Antivirus programs on the network.
 Keeping a check on the suspicious activities, which may
give a hint on starting stage of the attack.
“With 1.35 terabits per second of traffic hit, Github, on 28 Feb 2018
survived the biggest DDoS attack ever recorded in the history.”
Conclusion
 Procedural steps of network security are discussed,
comprising of authentication followed by access
control.
 Crucial network security components that enforces
and enriches the security over a network help in
protecting a network.
 Network attacks that are common among the
internet world are visited to get a better
understanding of the real world.
“No one connected to a network is safe, literally no one. Knowledge of
getting compromised is way less than compromising a network.”-
Anonymous
References
 https://www.calyptix.com/top-threats/top-7-network-attack-
types-2016/
 https://www.webopedia.com/TERM/N/network_security.html
 http://www.cert.org/encyc_article/tocencyc.html
 https://www.springer.com/computer/communications/book/978
-1-4419-0165-1
 http://www.scmagazine.com/case-study-network-
clarity/article/324988
 https://www.cisco.com/c/en/us/products/security/what-is-
network-security.html
Questions are appreciated…

More Related Content

What's hot

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
Vamsee Krishna Kiran
 
Network security
Network securityNetwork security
Network security
Ali Kamil
 
Cyber security
Cyber securityCyber security
Cyber security
TaimoorArshad5
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Network security ppt
Network security pptNetwork security ppt
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 

What's hot (20)

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network security
Network securityNetwork security
Network security
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Network security
Network security Network security
Network security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar to Network security

Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
AkilSayyad2
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
Editor IJMTER
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
JeganathanJayaran
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
KellyIsaac3
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
MijanurSepai1
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
Dhanvanthkesavan
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
ME1923SoumyaSouravNa
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
SyvilMaeTapinit
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
IJCNCJournal
 

Similar to Network security (20)

Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
 

Recently uploaded

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 

Recently uploaded (20)

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 

Network security

  • 2. Table of content  Introduction  Network Security Process  Network Security Components  Network Attacks  Conclusions  References
  • 3. Introduction  Information on networks may get compromised by  unauthorized access,  misuse,  malfunction,  modification,  destruction, or improper disclosure.  To prevent and monitor the unwanted threats policies and practices are adopted.  The process of taking physical and software preventative measures to protect the networking infrastructure is network security.
  • 4. Network security process (1)  Authentication- 1. One-factor authentication- This requires just one detail, password, to authenticate a user-name. 2. Two-factor authentication- Authentication is done with the help of secondary device such as a mobile phone, ATM card, security token etc. 3. Three-factor authentication- This authentication procedure is bounded to user’s body making the authentication unique for each user. Fingerprint scan, retinal scan are some of the ways to implement this authentication technique.
  • 5.  Access control- 1. Firewall- Enforces access policies such as what services are allowed to be accessed by the network users. Though firewall are effective to prevent unauthorized access, but it fails in dealing with potentially harmful content. 2. Anti-virus software, IPS/IDS- Anti-virus software or intrusion prevention system (IPS) find and tackle malwares while Intrusion detection system (IDS) helps monitor the network. Network security process (2) Figure :Pictorial representation of firewall’s worki
  • 6. Network security components (1)  Encryption-  It is a process in cryptography in which a message or information is encoded in such a way that only authorized users (those who have decryption key) can access it.  Information or message, plaintext, is encrypted using an encryption algorithm generating cipher-text that can only be read after decryption, process of decrypting.  Two types-  Public key encryption  Private key encryption
  • 7. Network security components (2)  Encryption- Figure :Public key encryption
  • 8. Network security components (3)  Wireless security-  Prevention of unauthorized access or damage to computers using wireless networks.  Types of wireless security-  Wired Equivalent Privacy (WEP)-  Introduced to provide data confidentiality comparable to that of wired networks.  Succeeded completely by WPA in 2003.  Wi-Fi Protected Access (WPA)-  WPA and WPA2 are the two protocols developed by Wi-Fi alliance in 2003.  WPA3 was launched in Jan 2018 with better security than WPA2
  • 9. Network Attacks (1) Figure :Attacks on networks’ statistics
  • 10. Network Attacks (2)  Browser attack/Man-in-the-middle-  Most common type of network attack as per the survey.  Internet surfers are tricked into downloading malware that is disguised as an update or an application.  Cyber criminals target popular OS and apps by exploiting.
  • 11. Network Attacks (3)  Browser attack/Man-in-the-middle-  Prevention measures- “Detecting a MITM attack can be very difficult as user does not realize about the data traffic interception until data is modified. Taking precautions in this attack is much better than cure.”- ComputerWeekly  Setting up an Intrusion detection system that monitors the network and if someone tries to hijack, it gives immediate alerts.  Use of Virtual Private Network (VPN) that creates encrypted tunnels providing additional security.
  • 12. Network Attacks (4)  Brute force attack-  A method of defeating a cryptography scheme by trying a large number of possibilities.  The attacker systematically checks all possible passwords and passphrases until the correct one is found.  A dictionary attack is similar and tries words in a dictionary — or a list of common passwords — instead of all possible passwords.
  • 13. Network Attacks (5)  Brute force attack-  Prevention measures-  Long and secure passwords, containing special characters, is first and most important prevention measure to be taken.  Use of strong encryption algorithms like SHA-512.  Login limits should be set on the services that accept login. Server software is generally set to do this out of the box, as it’s a good security practice.  Occasionally changing passwords in a period of time.
  • 14. Network Attacks (6)  DoS/DDoS attack-  Making service unavailable temporarily or indefinitely by flooding the network with useless traffic in order to overload systems.  In DoS attack, typically one system is involved to flood a network whereas in DDoS attack multiple systems and multiple networks are involved.  Due to the overloading of requests on a network, legitimate users get a difficulty in accessing the services.
  • 15. Network Attacks (7)  DoS/DDoS attack- Figure :DoS/DDoS attack explaination
  • 16. Network Attacks (6)  DoS/DDoS attack-  Prevention measures-  Limiting traffic by authentication of users, which can be done by configuring servers.  Using Firewall or Antivirus programs on the network.  Keeping a check on the suspicious activities, which may give a hint on starting stage of the attack. “With 1.35 terabits per second of traffic hit, Github, on 28 Feb 2018 survived the biggest DDoS attack ever recorded in the history.”
  • 17. Conclusion  Procedural steps of network security are discussed, comprising of authentication followed by access control.  Crucial network security components that enforces and enriches the security over a network help in protecting a network.  Network attacks that are common among the internet world are visited to get a better understanding of the real world. “No one connected to a network is safe, literally no one. Knowledge of getting compromised is way less than compromising a network.”- Anonymous
  • 18. References  https://www.calyptix.com/top-threats/top-7-network-attack- types-2016/  https://www.webopedia.com/TERM/N/network_security.html  http://www.cert.org/encyc_article/tocencyc.html  https://www.springer.com/computer/communications/book/978 -1-4419-0165-1  http://www.scmagazine.com/case-study-network- clarity/article/324988  https://www.cisco.com/c/en/us/products/security/what-is- network-security.html