Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need For Network Security
What is Network security
Security in Application, Transport and Network Layer
Network Security for Business
Agenda
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need for Network Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
What is Network security?
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both
hardware and software technologies. Effective network security manages access to the network. It targets a variety of
threats and stops them from entering or spreading on your network.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Vulnerabilities in TCP/IP
Transfers are done in plain text
Weak authentication between
client and web-server
No solution to syn-packet flooding
IP layer susceptible to many vulnerabilities
due to IP spoofing attacks
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
The CIA Triad
Confidentiality part
of network security
makes sure that the
data is available only
to the intended and
authorized persons.
Make sure that the data is reliable
and is not changed by unauthorized
persons.
Availability is to make
sure that the data,
network
resources/services are
continuously available
to the legitimate users,
whenever they require.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Achieving Network Security
ENCIPHERMENT DIGITAL SIGNATURE ACCESS CONTROL
This mechanism provides data
confidentiality services by
transforming data into not-
readable forms for the
unauthorized persons. This
mechanism uses encryption-
decryption algorithm with secret
keys.
This mechanism is the
electronic equivalent of
ordinary signatures in
electronic data. It provides
authenticity of the data.
This mechanism is used to
provide access control
services. These
mechanisms may use the
identification and
authentication of an entity
to determine and enforce
the access rights of the
entity.
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Application Layer Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Client-Server Architecture
CLIENT
SERVER
CLIENT
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Email Architecture
MESSAGE TRANSFER AGENT (MTA)
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Email Security
Confidentiality
E-mail should be
read by intended
recipient only
Authentication
E-mail recipient
should be sure of
the identity of
sender
Integrity
E-mail recipient
should be sure of
the identity of
sender
Proof of Delivery
Sender gets a
confirmation that the
recipient received the
message.
Non Repudiation
Sender gets a
confirmation that the
recipient received the
message.
Proof of Submission
Confirmation that
message has been
submitted to the
mailing server
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
PGP
Hi Varun,
Here’s your cash.
df7abea94fcdb49611d7674434b402af
IDEARSAMD5
ksSKs
PKr ks
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Transport Layer Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need
https://www.jabong.com/kart
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need for Network Level Security
https://www.jabong.com/kart
Quantity 1Quantity 100
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
SSL
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online
communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Salient Features of SSL
SSL provides Confidentiality Integrity and
Availability
SSL is available for all TCP applications.
Supported by almost all web browsers
Provides ease in doing business with
new online entities.
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
How it Works
Encryption
Identification
Bank Acc/no: 1800 7890 6754 123df7abea94fcdb49611d7674434b402af
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Network Layer Security
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Need
In early 1990s, Internet was used
by few institutions, mostly for
academic purposes.
With the massive growth of Internet,
combined with the inherent security
weaknesses of the TCP/IP protocol, the need
was felt for a technology that can provide
network security on the Internet.
•Protect IP packets
•Data Signing
•Provide defence against network attacks
Goals
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPsec Overview
IPsec Communication Internet Key Exchange
• Encryption
• Communication
Manager
• Communication is not
involved in the creation
of keys
• IKE is the automatic key
management protocol
used for IPsec
• Communication
Manager
• Communication is not
involved in the creation
of keys
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
How IPsec Works
Will IPsec be used by
sending and receiving
computers
Security Negotiation
• Encryption Algorithm
• Decryption Algorithm
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
IPsec Policies
All computer/server will always request security for all IP based traffic
Computer will only secure the communication when security is
requested.
All IP traffic will only be transferred over a secure connection
Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Benefits of Network Security in a Business
Resource Sharing
A business can
reduce the amount of
money spent on
hardware by sharing
components and
peripherals
connected to the
network.
Streamlined
Business Processes
Computer networks
enable businesses to
streamline their
internal business
processes.
Collaboration
Among Departments
When two or more
departments of business
connect selected portions
of their networks, they
can streamline business
processes..
Improved Customer
Relations
When two or more
departments of business
connect selected portions
of their networks, they
can streamline business
processes..
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Nmap Demo
Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka

Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka

  • 1.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training
  • 2.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Need For Network Security What is Network security Security in Application, Transport and Network Layer Network Security for Business Agenda
  • 3.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Need for Network Security
  • 4.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training What is Network security? Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
  • 5.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Vulnerabilities in TCP/IP Transfers are done in plain text Weak authentication between client and web-server No solution to syn-packet flooding IP layer susceptible to many vulnerabilities due to IP spoofing attacks
  • 6.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training The CIA Triad Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons. Make sure that the data is reliable and is not changed by unauthorized persons. Availability is to make sure that the data, network resources/services are continuously available to the legitimate users, whenever they require.
  • 7.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Achieving Network Security ENCIPHERMENT DIGITAL SIGNATURE ACCESS CONTROL This mechanism provides data confidentiality services by transforming data into not- readable forms for the unauthorized persons. This mechanism uses encryption- decryption algorithm with secret keys. This mechanism is the electronic equivalent of ordinary signatures in electronic data. It provides authenticity of the data. This mechanism is used to provide access control services. These mechanisms may use the identification and authentication of an entity to determine and enforce the access rights of the entity.
  • 8.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Application Layer Security
  • 9.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Client-Server Architecture CLIENT SERVER CLIENT
  • 10.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Email Architecture MESSAGE TRANSFER AGENT (MTA)
  • 11.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Email Security Confidentiality E-mail should be read by intended recipient only Authentication E-mail recipient should be sure of the identity of sender Integrity E-mail recipient should be sure of the identity of sender Proof of Delivery Sender gets a confirmation that the recipient received the message. Non Repudiation Sender gets a confirmation that the recipient received the message. Proof of Submission Confirmation that message has been submitted to the mailing server
  • 12.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training PGP Hi Varun, Here’s your cash. df7abea94fcdb49611d7674434b402af IDEARSAMD5 ksSKs PKr ks
  • 13.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Transport Layer Security
  • 14.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Need https://www.jabong.com/kart
  • 15.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Need for Network Level Security https://www.jabong.com/kart Quantity 1Quantity 100
  • 16.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training SSL SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
  • 17.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Salient Features of SSL SSL provides Confidentiality Integrity and Availability SSL is available for all TCP applications. Supported by almost all web browsers Provides ease in doing business with new online entities.
  • 18.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training How it Works Encryption Identification Bank Acc/no: 1800 7890 6754 123df7abea94fcdb49611d7674434b402af
  • 19.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Network Layer Security
  • 20.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Need In early 1990s, Internet was used by few institutions, mostly for academic purposes. With the massive growth of Internet, combined with the inherent security weaknesses of the TCP/IP protocol, the need was felt for a technology that can provide network security on the Internet. •Protect IP packets •Data Signing •Provide defence against network attacks Goals
  • 21.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training IPsec Overview IPsec Communication Internet Key Exchange • Encryption • Communication Manager • Communication is not involved in the creation of keys • IKE is the automatic key management protocol used for IPsec • Communication Manager • Communication is not involved in the creation of keys
  • 22.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training How IPsec Works Will IPsec be used by sending and receiving computers Security Negotiation • Encryption Algorithm • Decryption Algorithm
  • 23.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training IPsec Policies All computer/server will always request security for all IP based traffic Computer will only secure the communication when security is requested. All IP traffic will only be transferred over a secure connection
  • 24.
    Cybersecurity Certification Coursewww.edureka.co/cybersecurity-certification-training Benefits of Network Security in a Business Resource Sharing A business can reduce the amount of money spent on hardware by sharing components and peripherals connected to the network. Streamlined Business Processes Computer networks enable businesses to streamline their internal business processes. Collaboration Among Departments When two or more departments of business connect selected portions of their networks, they can streamline business processes.. Improved Customer Relations When two or more departments of business connect selected portions of their networks, they can streamline business processes..
  • 25.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Nmap Demo