SlideShare a Scribd company logo
SANDHYA.H.S
1BM08TE048
INTRODUCTION
 The world is becoming more interconnected with advent of internet
 and networking solutions
 There is a large amount of personal, commercial, military, and
 government information on networking infrastructures worldwide.
 Network security is becoming of great importance because of
 intellectual property that can be easily acquired through internet
 In practice single security technology is not sufficient
 to build a secure network system
 Integrated application of multiple technologies will be able to
 control the security risks as much as possible within the scope of the
 small
 Prevention through a variety of techniques is to resist the
 overwhelming majority of attacks from outside.
NETWORK SECURITY
 Network security has become more important to personal
 computer users, and in several organizations
 With the advent of the internet, security became a major
 concern and the history of security allows a better
 understanding of the emergence of security technology.
 More enterprises using web services helps to accelerate its
 own development
 In further we introduce the architecture of network
 security, and further information on the types of security
 threats, network security so that readers with some basic
 understanding of the types of security services
 In accordance with established safety precautions, and
 finally the introduction of security rules can be achieved.
SECURITY THREATS
   CONCEPTS OF SECURITY THREATS
 This has not been filtered for the protection of the network
  nodes, the times have to bear the test of a large number of
  network attacks.
 Even if the purpose of these attacks are random, but there are
  still very likely that those who failed to break through the
  computer facilities management, impact on the network and
  even network paralysis.
 CLASSIFICATION OF SECURITY THREATS
 Internet network security threats often roughly divided into the
  following categories:
 Illegal use of Network
 Denial of Service
 Information theft
 Data tampering
CATEGORIES
 Illegal use of network is the resource are illegal users or
  unauthorized users using in illegal way, For example, the
  attacker through the speculation out of account and password
  into the computer system
 Denial of service is Server refused the users to access
  information or resources to normal requests. For example, an
  attacker using a large number of packets a short period of time
  continuously connected to the server was launched, resulting in
  overloaded servers cannot handle tasks.
 Information theft is invasion did not directly attack the target
  system, but by tapping the Internet to access important data or
  information.
 Data tampering is attacks on the system data or message flow
  selective edit, delete, delay, re-sort and insertion of false
  information, such as operations, destruction of data
  consistency.
NETWORK SECURITY CLASSIFICATIONS


 In response to these security threats, security measures taken
  by security services

 The classification of security services and explained as
  follows:

 Availability of services is information or services to ensure that
  when needed can be a normal visit.

 Confidential service is to ensure that sensitive data or
  information will not be leaked or exposed to unauthorized
  entities.
SECURITY CLASSFN CONTN
 Integrity services is to ensure that data is not the way to
  unauthorized alteration or destruction.

 Identification is to identity of an entity to provide the
  guarantee the legitimacy of security service.

 Authorization is the use of system resources for the
  implementation of control provisions, such as the visitor's
  access permissions.
IMPLEMENTATION OF SECURITY
 As a result of the early stage of the Internet has not been
 designed for the specific IP security program, it is necessary to
 network security, services and products to improve the IP
 network, Internet Protocol in order to weaken the inherent
 security risks, and the following precautions.
 TABLE I. SAFETY PRECAUTIONS AND SUMMARY

      EVALUVATION ASPECTS       SUMMARY
       Encryption               Encryption technology
       Authentication           Identification and
                                verification of identity
       Access control           Access control and access
                                rights
       Visit to the security    Network security protocols
      agreement                 and layering
ENCRYPTION
 Encrypted message is converted into readable From
  unreadable text encrypted process. Not only to provide users
  with encrypted communication security, but also many other
  security mechanisms.
 Encryption technology can be used in the following
  mechanisms:
 Password authentication process design
 Safety communication protocol design
 Design of digital signatures
 Encryption methods are mainly classified into three
Types:
Symmetric cryptosystem
 Key is same to Characterize for the encryption and
 decryption, each pair of users share the same key to exchange
 information, and key must be kept confidential.
 A typical representative include:
 Data Encryption Standard DES
 Triple Data Encryption Standard 3DES

Public-key cryptosystem
 Compared with the symmetric cryptography, public key
 cryptography there are two different keys can be encryption
 and decryption functions separately.
 A key known as the private key must be secret preservation;
 another called the public key can be distributed publicly
Hash function

For a variable-length messages to a fixed-length
 compressed code word into a hash or message digest.
 Hash function, including MD5 (Message Digest
 5), Secure Hash Algorithm SHA (Secure Hash
 Algorithm)
 Typical representatives: DH (Diffie-Hellman), RSA
 (Rivest, Shamir, adleman) are representatives for
 public key cryptosystem
AUTHENTICATION
Certification is usually used to access the network or
 networks to provide services to identify the user before the
 legality of identity.
 Certification by the network for each piece of equipment
 in the local provision of, nor can the implementation of a
 dedicated authentication server.
 Comparatively speaking, the latter has better
 flexibility, controllability and scalability. At present, in the
 heterogeneous network environment, the authentication
 service using RADIUS (Remote Authentication Dial in
 user service
ACCESS CONTROL
 Access Control is a way to strengthen the mandate.
  Generally divided into two categories:
 Based on the operating system access control
 Access to the resources of a computer system on the user's
  visit to conduct designated authorized. Can be based on
  the identity of groups, the rules of access control policy
  configuration.
 Web-based access control
 Refers to the access network to limit the authority. Due to
  the complexity of the network, much of its mechanism of
  access control based on the operating system more
  complex.
VISIT TO THE SECURITY
AGREEMENT
 Refers to the access network to limit the authority. Due to
 the complexity of the network, much of its mechanism of
 access control based on the operating system more
 complex.
 Application Layer Security
 It offers from a host of applications through the network
 to another host on the end-to-end application security.
 Application-layer security mechanisms must be tailored to
 specific applications of the security agreement is the
 application of the supplementary agreement. It can be
 seen, there is no generic application-layer security
 protocol.
CONTD   ….
 Transport Layer Security

 In the transport layer to provide security services to
  strengthen the idea that the IPC interface, such as BSD
  sockets and so on. Including double-end entity
  authentication, data encryption key exchange.

 According to this line of thought, there has been built on
  the reliable transmission service based on the Secure
  Sockets Layer protocol SSL (Secure Socket Layer).
CONTD…
 Network Layer Security
 If the agreement does not achieve the security level of
  protection, through the network layer packet to protect
  user information can also be automatically provided from
  the network layer security benefit.
 Therefore, IP (Internet Protocol) security is the TCP / IP
  security, but also the core of Internet security.
 Data Link Layer Security
 Provide point-to-point security, such as in a point to-point
  link to provide security. Link layer security is the main
  link connecting each end of the use of special equipment
  for the completion of encryption and decryption.
CONCLUSION
 Network operating system security and database
 management systems security and security is closely
 integrated.
 The application must be tailored to specific needs of
 the environment matched analysis and the
 development of various safety management strategy to
 ensure network security.
REFERNCES
 www.google.com
 www.wikepedia.com
 www.ieee.org
 TAN Chun-xia .On Information Technology and
 Computer Network Security and Computer
 Knowledge and Technology(Academic Exchange)


Network security by sandhya

More Related Content

What's hot

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
Meet Soni
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
this is test for today
this is test for todaythis is test for today
this is test for today
DreamMalar
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
DefCamp
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
End end-security
End end-securityEnd end-security
End end-security
Patatino Melis
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
HCL Technologies
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Network security ppt
Network security pptNetwork security ppt
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
Information Technology
 

What's hot (20)

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
End end-security
End end-securityEnd end-security
End end-security
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security
 Network security Network security
Network security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 

Viewers also liked

Wearables: a show & tell with user stories
Wearables: a show & tell with user storiesWearables: a show & tell with user stories
Wearables: a show & tell with user stories
Northern User Experience
 
7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers
Adam Jacobson
 
Death by User Story
Death by User StoryDeath by User Story
Death by User Story
Brindusa Axon
 
Write better user stories, deliver better software
Write better user stories, deliver better softwareWrite better user stories, deliver better software
Write better user stories, deliver better software
Elliot Susel
 
RE tutorial user stories
RE tutorial user storiesRE tutorial user stories
RE tutorial user stories
Garm Lucassen
 
User Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of valueUser Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of value
Angie Doyle
 
User stories — how to cook a cat?
User stories — how to cook a cat?User stories — how to cook a cat?
User stories — how to cook a cat?
Vladimir Tarasov
 
Aspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_pptAspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_pptTatiya Siengdang
 
Better user stories
Better user storiesBetter user stories
Better user stories
matteo cavucci
 
As user, I hate user stories
As user, I hate user storiesAs user, I hate user stories
As user, I hate user stories
matteo cavucci
 
Story pointing
Story pointingStory pointing
Network security ppt
Network security pptNetwork security ppt
Network security ppt
shashi712
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
anshuman.k
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 
Firewall
Firewall Firewall
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Viewers also liked (20)

Wearables: a show & tell with user stories
Wearables: a show & tell with user storiesWearables: a show & tell with user stories
Wearables: a show & tell with user stories
 
7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers
 
Death by User Story
Death by User StoryDeath by User Story
Death by User Story
 
Write better user stories, deliver better software
Write better user stories, deliver better softwareWrite better user stories, deliver better software
Write better user stories, deliver better software
 
RE tutorial user stories
RE tutorial user storiesRE tutorial user stories
RE tutorial user stories
 
User Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of valueUser Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of value
 
User stories — how to cook a cat?
User stories — how to cook a cat?User stories — how to cook a cat?
User stories — how to cook a cat?
 
Aspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_pptAspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_ppt
 
Better user stories
Better user storiesBetter user stories
Better user stories
 
As user, I hate user stories
As user, I hate user storiesAs user, I hate user stories
As user, I hate user stories
 
Story pointing
Story pointingStory pointing
Story pointing
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
Security threats
Security threatsSecurity threats
Security threats
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Firewall
Firewall Firewall
Firewall
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Network security
Network security Network security
Network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Network security by sandhya

Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
SamyLacheheub
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
ahmed53254
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
DebmalyaSingha
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
ballolliemin
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
NavanathDarwante1
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Network security
Network securityNetwork security
Network security
Simalike Peter
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
prosunghosh7
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 

Similar to Network security by sandhya (20)

Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
 
Network security
Network security Network security
Network security
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Web security
Web securityWeb security
Web security
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
information security technology
information security technologyinformation security technology
information security technology
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 

Network security by sandhya

  • 2. INTRODUCTION  The world is becoming more interconnected with advent of internet and networking solutions  There is a large amount of personal, commercial, military, and government information on networking infrastructures worldwide.  Network security is becoming of great importance because of intellectual property that can be easily acquired through internet  In practice single security technology is not sufficient to build a secure network system  Integrated application of multiple technologies will be able to control the security risks as much as possible within the scope of the small  Prevention through a variety of techniques is to resist the overwhelming majority of attacks from outside.
  • 3. NETWORK SECURITY  Network security has become more important to personal computer users, and in several organizations  With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology.  More enterprises using web services helps to accelerate its own development  In further we introduce the architecture of network security, and further information on the types of security threats, network security so that readers with some basic understanding of the types of security services  In accordance with established safety precautions, and finally the introduction of security rules can be achieved.
  • 4. SECURITY THREATS  CONCEPTS OF SECURITY THREATS  This has not been filtered for the protection of the network nodes, the times have to bear the test of a large number of network attacks.  Even if the purpose of these attacks are random, but there are still very likely that those who failed to break through the computer facilities management, impact on the network and even network paralysis.  CLASSIFICATION OF SECURITY THREATS  Internet network security threats often roughly divided into the following categories:  Illegal use of Network  Denial of Service  Information theft  Data tampering
  • 5. CATEGORIES  Illegal use of network is the resource are illegal users or unauthorized users using in illegal way, For example, the attacker through the speculation out of account and password into the computer system  Denial of service is Server refused the users to access information or resources to normal requests. For example, an attacker using a large number of packets a short period of time continuously connected to the server was launched, resulting in overloaded servers cannot handle tasks.  Information theft is invasion did not directly attack the target system, but by tapping the Internet to access important data or information.  Data tampering is attacks on the system data or message flow selective edit, delete, delay, re-sort and insertion of false information, such as operations, destruction of data consistency.
  • 6. NETWORK SECURITY CLASSIFICATIONS  In response to these security threats, security measures taken by security services  The classification of security services and explained as follows:  Availability of services is information or services to ensure that when needed can be a normal visit.  Confidential service is to ensure that sensitive data or information will not be leaked or exposed to unauthorized entities.
  • 7. SECURITY CLASSFN CONTN  Integrity services is to ensure that data is not the way to unauthorized alteration or destruction.  Identification is to identity of an entity to provide the guarantee the legitimacy of security service.  Authorization is the use of system resources for the implementation of control provisions, such as the visitor's access permissions.
  • 8. IMPLEMENTATION OF SECURITY  As a result of the early stage of the Internet has not been designed for the specific IP security program, it is necessary to network security, services and products to improve the IP network, Internet Protocol in order to weaken the inherent security risks, and the following precautions.  TABLE I. SAFETY PRECAUTIONS AND SUMMARY EVALUVATION ASPECTS SUMMARY  Encryption  Encryption technology  Authentication  Identification and verification of identity  Access control  Access control and access rights  Visit to the security Network security protocols agreement and layering
  • 9. ENCRYPTION  Encrypted message is converted into readable From unreadable text encrypted process. Not only to provide users with encrypted communication security, but also many other security mechanisms.  Encryption technology can be used in the following mechanisms:  Password authentication process design  Safety communication protocol design  Design of digital signatures  Encryption methods are mainly classified into three Types:
  • 10. Symmetric cryptosystem  Key is same to Characterize for the encryption and decryption, each pair of users share the same key to exchange information, and key must be kept confidential.  A typical representative include:  Data Encryption Standard DES  Triple Data Encryption Standard 3DES Public-key cryptosystem  Compared with the symmetric cryptography, public key cryptography there are two different keys can be encryption and decryption functions separately.  A key known as the private key must be secret preservation; another called the public key can be distributed publicly
  • 11. Hash function For a variable-length messages to a fixed-length compressed code word into a hash or message digest. Hash function, including MD5 (Message Digest 5), Secure Hash Algorithm SHA (Secure Hash Algorithm)  Typical representatives: DH (Diffie-Hellman), RSA (Rivest, Shamir, adleman) are representatives for public key cryptosystem
  • 12. AUTHENTICATION Certification is usually used to access the network or networks to provide services to identify the user before the legality of identity.  Certification by the network for each piece of equipment in the local provision of, nor can the implementation of a dedicated authentication server.  Comparatively speaking, the latter has better flexibility, controllability and scalability. At present, in the heterogeneous network environment, the authentication service using RADIUS (Remote Authentication Dial in user service
  • 13. ACCESS CONTROL  Access Control is a way to strengthen the mandate. Generally divided into two categories:  Based on the operating system access control  Access to the resources of a computer system on the user's visit to conduct designated authorized. Can be based on the identity of groups, the rules of access control policy configuration.  Web-based access control  Refers to the access network to limit the authority. Due to the complexity of the network, much of its mechanism of access control based on the operating system more complex.
  • 14. VISIT TO THE SECURITY AGREEMENT  Refers to the access network to limit the authority. Due to the complexity of the network, much of its mechanism of access control based on the operating system more complex.  Application Layer Security  It offers from a host of applications through the network to another host on the end-to-end application security. Application-layer security mechanisms must be tailored to specific applications of the security agreement is the application of the supplementary agreement. It can be seen, there is no generic application-layer security protocol.
  • 15. CONTD ….  Transport Layer Security  In the transport layer to provide security services to strengthen the idea that the IPC interface, such as BSD sockets and so on. Including double-end entity authentication, data encryption key exchange.  According to this line of thought, there has been built on the reliable transmission service based on the Secure Sockets Layer protocol SSL (Secure Socket Layer).
  • 16. CONTD…  Network Layer Security  If the agreement does not achieve the security level of protection, through the network layer packet to protect user information can also be automatically provided from the network layer security benefit.  Therefore, IP (Internet Protocol) security is the TCP / IP security, but also the core of Internet security.  Data Link Layer Security  Provide point-to-point security, such as in a point to-point link to provide security. Link layer security is the main link connecting each end of the use of special equipment for the completion of encryption and decryption.
  • 17. CONCLUSION  Network operating system security and database management systems security and security is closely integrated.  The application must be tailored to specific needs of the environment matched analysis and the development of various safety management strategy to ensure network security.
  • 18. REFERNCES  www.google.com  www.wikepedia.com  www.ieee.org  TAN Chun-xia .On Information Technology and Computer Network Security and Computer Knowledge and Technology(Academic Exchange) 