Network Security Goals
Islahuddin Jalal Lecturer at
Faculty of Computer Science
Kabul Education University(KEU), Kabul
Outlines to be discussed………
• Network Security
• Goals of Network Security
• Confidentiality
• Integrity
• Availability
Network Security
• Process of taking
• physical and software preventative measures to protect
the underlying networking infrastructure from
• unauthorized access, misuse, malfunction, modification,
destruction, or improper disclosure,
• thereby creating a secure platform for computers, users
and programs to perform their permitted critical
functions within a secure environment.
Goals of Network Security
• Confidentiality
• Integrity
• Availability
Confidentiality
What to do for Confidentiality?
Encryption
Integrity
What to do for Integrity?
Hashing
Availability
What to do for Availability?
• Developing efficient network design
• Preventing Malicious activity (DDoS)
• Having sufficient bandwidth
• Removing Duplex Mismatches
Conclusion
• Hide the data or information from
unauthorized people
• Prevent unauthorized modification
• Prevent a loss of access to resources by the
authorized user
END
Thank you very much for your patience
Faculty of Computer Science
Kabul Education University(KEU), Kabul

Network Security Goals

  • 1.
    Network Security Goals IslahuddinJalal Lecturer at Faculty of Computer Science Kabul Education University(KEU), Kabul
  • 3.
    Outlines to bediscussed……… • Network Security • Goals of Network Security • Confidentiality • Integrity • Availability
  • 4.
    Network Security • Processof taking • physical and software preventative measures to protect the underlying networking infrastructure from • unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, • thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.
  • 5.
    Goals of NetworkSecurity • Confidentiality • Integrity • Availability
  • 6.
  • 7.
    What to dofor Confidentiality? Encryption
  • 8.
  • 9.
    What to dofor Integrity? Hashing
  • 10.
  • 11.
    What to dofor Availability? • Developing efficient network design • Preventing Malicious activity (DDoS) • Having sufficient bandwidth • Removing Duplex Mismatches
  • 12.
    Conclusion • Hide thedata or information from unauthorized people • Prevent unauthorized modification • Prevent a loss of access to resources by the authorized user
  • 14.
    END Thank you verymuch for your patience Faculty of Computer Science Kabul Education University(KEU), Kabul