SlideShare a Scribd company logo
Seminar
On
Network security
Soumya Sourav nayak
Roll no:-ME-19-23
 Introduction
 What is Network Security
 History
 Basic Network Security
 Need for Network Security
 Types
 Authentication
 Network Attacks Methods
 Advantages
 Problems
 Network Security Architecture
 Conclusion
 Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
 However, as more and more people become
``wired'', an increasing number of people
need to understand the basics of security in a
networked world.
Network security is a level of guarantee that all
the machines in a network are working optimally
and the users of these machines only possess
the rights that were granted to them.
This can include:
 preventing unauthorized people from acting on
the system
 preventing users from performing involuntary
operations that are capable of harming the
system
 securing data by anticipating failures
 guaranteeing that services are not interrupted
 Internet security has been an issue since the
Internet rose to an international phenomenon.
 By 1996, the Internet already connected 13
million computers, so early security protocols
were required.
 These protocols required computer information
to be confidential, available, and have integrity.
 Because the Internet made information
available to everyone, people needed network
security to make their information confidential.
 When connecting a matching to a network, we need
to make sure no one will easily break in to it.
 Even if you don't think anyone will try to break into
your machines - chances are that someone might try.
 Crackers often run network scan utilities that check a
large range of IP addresses, and automatically try to
find machines running servers with security holes.
 To protect against that, one could simply disable any
unnecessary network service they are running.
 In the past, hackers were highly skilled programmers
who understood the details of computer
communications and Today almost anyone can become
a hacker by downloading tools from the Internet.
 These complicated attack tools and generally open
networks have generated an increased need for network
security and dynamic security policies.
 The easiest way to protect a network from an outside
attack is to close it off completely from the outside
world.
 A closed network provides connectivity only to trusted
known parties and sites; a closed network does not
allow a connection to public networks.
 Wi-Fi Protected Access (WPA)
 WPA encrypts information, and checks to
make sure that the network security key has
not been modified.
 WPA also authenticates users to help ensure
that only authorized people can access the
network.
 WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
 Wired Equivalent Privacy (WEP)
 WEP is an older network security method that is
still available to support older devices, but it is
no longer recommended.
 When you enable WEP, you set up a network
security key.
 This key encrypts the information that one
computer sends to another computer across
your network. However,WEP security is
relatively easy to crack.
One-factor authentication – this is
“something a user knows.”The
most recognized type of one-factor
authentication method is the
password.
Two-factor authentication – in
addition to the first factor, the
second factor is “something a user
has.”
Three-factor authentication – in
addition to the previous two
factors, the third factor is
“something a user is.”
 Eavesdropping – Interception of communications
by an unauthorized party
 Data Modification – Data altering, reading from
unauthorized party
 Identity Spoofing (IP Address Spoofing) – IP
address to be falsely assumed— identity spoofing
and the attacker can modify or delete your data
 Password-BasedAttacks – By gaining your access
rights to a computer and network resources are
determined by who you are, that is, your user
name and your password
 Network Security helps in protecting personal data
of clients existing on network.
 Network Security help to protection of information
that is shared between computers on the network.
 Hacking attempts or virus / spyware attacks from
the internet will not be able to harm physical
computers. External possible attacks are prevented.
 Computer networks are typically a shared
resource used by many applications
representing different interests.
 The Internet is particularly widely shared, being
used by competing businesses, mutually
antagonistic governments, and opportunistic
criminals.
 The owner of the website can be attacked as
well. Some websites have been defaced; the files
that make up the website content have been
remotely accessed and modified without
authorization.
What & why
an organization's network infrastructure evolves
over many years.
 Although this evolution is in direct response to the
changing business needs, in many cases security has
been an afterthought.
 Even implementing the most advanced security
technologies of the day won't help if the underlying
security architecture is flawed.
Our systematic approach to the evaluation of the
current state ensures a detailed review of the
current architecture, technology & security
policy of the organization, management
practices and planned changes.
Some of the aspects that will be examined are:
 Review latestThreat Risk Analysis report.
 Analysis of current IT network, information flow
according to business requirements and points
of access to information.
 That is why network security is an important
field that is increasingly gaining attention as
the Internet usage increases.
 The security threats and Internet protocols
were analyzed to determine the necessary
security technology.
 However, the current development in
network security is not very impressive and
significant.
 The Code book by Simon Singh
 Network Security byV. S. Bagad
 Defensive Security Handbook
network_security_ppt[1].pptx

More Related Content

Similar to network_security_ppt[1].pptx

Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
Manan Gadhiya
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
IOSR Journals
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Sachithra Gayan
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
James Steele
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
ballolliemin
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
ahmed53254
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Is4560
Is4560Is4560
Is4560
Tara Hardin
 

Similar to network_security_ppt[1].pptx (17)

Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Is4560
Is4560Is4560
Is4560
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 

network_security_ppt[1].pptx

  • 2.  Introduction  What is Network Security  History  Basic Network Security  Need for Network Security  Types  Authentication  Network Attacks Methods  Advantages  Problems  Network Security Architecture  Conclusion
  • 3.  Network security is a complicated subject, historically only tackled by well-trained and experienced experts.  However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
  • 4. Network security is a level of guarantee that all the machines in a network are working optimally and the users of these machines only possess the rights that were granted to them. This can include:  preventing unauthorized people from acting on the system  preventing users from performing involuntary operations that are capable of harming the system  securing data by anticipating failures  guaranteeing that services are not interrupted
  • 5.  Internet security has been an issue since the Internet rose to an international phenomenon.  By 1996, the Internet already connected 13 million computers, so early security protocols were required.  These protocols required computer information to be confidential, available, and have integrity.  Because the Internet made information available to everyone, people needed network security to make their information confidential.
  • 6.  When connecting a matching to a network, we need to make sure no one will easily break in to it.  Even if you don't think anyone will try to break into your machines - chances are that someone might try.  Crackers often run network scan utilities that check a large range of IP addresses, and automatically try to find machines running servers with security holes.  To protect against that, one could simply disable any unnecessary network service they are running.
  • 7.  In the past, hackers were highly skilled programmers who understood the details of computer communications and Today almost anyone can become a hacker by downloading tools from the Internet.  These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies.  The easiest way to protect a network from an outside attack is to close it off completely from the outside world.  A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
  • 8.  Wi-Fi Protected Access (WPA)  WPA encrypts information, and checks to make sure that the network security key has not been modified.  WPA also authenticates users to help ensure that only authorized people can access the network.  WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points.
  • 9.  Wired Equivalent Privacy (WEP)  WEP is an older network security method that is still available to support older devices, but it is no longer recommended.  When you enable WEP, you set up a network security key.  This key encrypts the information that one computer sends to another computer across your network. However,WEP security is relatively easy to crack.
  • 10. One-factor authentication – this is “something a user knows.”The most recognized type of one-factor authentication method is the password. Two-factor authentication – in addition to the first factor, the second factor is “something a user has.” Three-factor authentication – in addition to the previous two factors, the third factor is “something a user is.”
  • 11.  Eavesdropping – Interception of communications by an unauthorized party  Data Modification – Data altering, reading from unauthorized party  Identity Spoofing (IP Address Spoofing) – IP address to be falsely assumed— identity spoofing and the attacker can modify or delete your data  Password-BasedAttacks – By gaining your access rights to a computer and network resources are determined by who you are, that is, your user name and your password
  • 12.  Network Security helps in protecting personal data of clients existing on network.  Network Security help to protection of information that is shared between computers on the network.  Hacking attempts or virus / spyware attacks from the internet will not be able to harm physical computers. External possible attacks are prevented.
  • 13.  Computer networks are typically a shared resource used by many applications representing different interests.  The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals.  The owner of the website can be attacked as well. Some websites have been defaced; the files that make up the website content have been remotely accessed and modified without authorization.
  • 14. What & why an organization's network infrastructure evolves over many years.  Although this evolution is in direct response to the changing business needs, in many cases security has been an afterthought.  Even implementing the most advanced security technologies of the day won't help if the underlying security architecture is flawed.
  • 15. Our systematic approach to the evaluation of the current state ensures a detailed review of the current architecture, technology & security policy of the organization, management practices and planned changes. Some of the aspects that will be examined are:  Review latestThreat Risk Analysis report.  Analysis of current IT network, information flow according to business requirements and points of access to information.
  • 16.  That is why network security is an important field that is increasingly gaining attention as the Internet usage increases.  The security threats and Internet protocols were analyzed to determine the necessary security technology.  However, the current development in network security is not very impressive and significant.
  • 17.  The Code book by Simon Singh  Network Security byV. S. Bagad  Defensive Security Handbook