SlideShare a Scribd company logo
1 of 22
INTRODUCTION.
The security system is used as in various fields,
particularly the internet, communications data
storage, identification and authentication and
other applications.
WHAT IS WIRE-LESS NETWORK?
 Wireless technologies, in the simplest
sense, enable one or more devices to
communicate without physical connections
—without requiring network or peripheral
cabling.
 Wireless networks serve as the transport
mechanism between devices and among
devices and the traditional wired networks
TYPES OF WIRE-LESS
NETWORK.
 Wireless Personal Area Networks
(WPAN)
 Wireless local area networks (WLAN)
 Wireless Wide Area Networks
(WWAN)
WIRE-LESS NETWORK.
EXAMPLE OF WWPN.
WIRE-LESS NETWORK.
EXAMPLE OF WLAN.
WIRE-LESS NETWORK.
EXAMPLE OF WWAN
WHY WE NEED SECURITY
SYSTEM
 when an unauthorized user gains
access to the network and consumes
network resources.
 Malicious hackers, sometimes called
crackers, are individuals who break into
a system without authorization, usually
for personal gain or to do harm.
WHY WE NEED SECURITY
SYSTEM
 Malicious code involves viruses,Trojan
horses, logic bombs, or other unwanted
software that is designed to damage files or
bring down a system.
Different types of threats
to network:
 Application backdoors .
 Operating system bugs .
 E-mail bombs .
 Macros .
 Viruses .
 Spam .
 Trojan/key logger attacks.
Threats to network:
Application backdoors:
Some programs have special features that
allow for backdoor or hidden access , that
provides some level of access of data.
Operating system bugs:
some operating systems Have backdoors with
insufficient security controls .
Threats to network:
E-mail bombs :
An e-mail bomb is usually a personal attack . Someone
sends you the same e-mail hundreds or thousands of
times until your e-mail system cannot accept any more
messages.
Macros:
A script of commands that the application can run.
Hackers have taken advantage of this to create their
own macros that , depending on the application , can
destroy your data or crash your computer.
Threats to network:
VIRSUSES:
Probably the most well-known threat is
computer viruses .
A virus is a small program that can copy itself to
other computers .
SPAM:
spam is the electronic equivalent of mail.
TROJAN / KEY ATTACKS:
Trojan is a tool which when installed in a system, can be
misused for malicious purposes by the attacker.
Network security can be
done by various methods.
 Virtual Private Network.
 Firewalls.
 Internet Protocol Security
(IP Sec).
 AAA Server.
Virtual Private Network
(VPN).
 A virtual private network ( VPN ) is a way to use
a public telecommunication infrastructure.
 In Internet , to provide remote offices or
individual users with secure access to their
organization's network.
 The goal of a VPN is to provide the
organization with the security , but at a much
lower cost.
Virtual Private Network
(VPN).
BEFORE SEURITY. AFTER SECURITY.
INTERNET FIREWALLS.
FireWallFireWall
A firewall provides a strong barrier between your private network and the
Internet .
Set firewalls to restrict the number of open ports , what type of packets are
passed and what are blocked .
INTERNET PROTOCOL
SECURITY. (IP SEC)
 It provides enhanced security features
such as better encryption algorithms
and more comprehensive
authentication.
 IP Sec can encrypt data between
various devices , such as :
 Firewall to server
 Server to PC
AAA Server.
 AAA (authentication , authorization and
accounting)
 When a request to establish a session comes
in from a dial up client ,the Request is proxies to
the AAA server.
 AAA then checks the following :
 Who you are (authentication)
 What you are allowed to do (authorization)
 What you actually do (accounting)
CONCLUSION:
 There is no gain saying the fact that
SECURITY plays an essential role in
protecting the privacy of electronic
information against threats from a
variety of potential attackers.
REFERENCES:
 WWW.GOOGLE.COM
 WWW.INTERNET SECURITY.COM
 DATA COMMUNICATIONS &
NETWORKING (A.FOROUZAN)
Security system wireless technology

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYabdul talha
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...usman butt
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Firewall
FirewallFirewall
FirewallApo
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1Ryan Mc Donagh
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security
Network security Network security
Network security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network security
Network securityNetwork security
Network security
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network Security Network Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
internet security
internet securityinternet security
internet security
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
Network security
Network securityNetwork security
Network security
 

Similar to Security system wireless technology

NETWORK SECURITY dibyendu das.pptx
NETWORK  SECURITY dibyendu das.pptxNETWORK  SECURITY dibyendu das.pptx
NETWORK SECURITY dibyendu das.pptxSumanPatra78
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptxrishi707971
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 

Similar to Security system wireless technology (20)

NETWORK SECURITY dibyendu das.pptx
NETWORK  SECURITY dibyendu das.pptxNETWORK  SECURITY dibyendu das.pptx
NETWORK SECURITY dibyendu das.pptx
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptx
 
Network security
Network securityNetwork security
Network security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Network security
Network securityNetwork security
Network security
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Computer networking
Computer networking Computer networking
Computer networking
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 

More from Saumya Ranjan Behura (20)

Gsm
GsmGsm
Gsm
 
Quadcopters
QuadcoptersQuadcopters
Quadcopters
 
Nano technology
Nano technologyNano technology
Nano technology
 
Miling machine
Miling machineMiling machine
Miling machine
 
Manglev train
Manglev trainManglev train
Manglev train
 
E nose
E noseE nose
E nose
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
 
Night vision
Night visionNight vision
Night vision
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
 
Sensors
SensorsSensors
Sensors
 
Smart card
Smart cardSmart card
Smart card
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Security system wireless technology

  • 1.
  • 2. INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication and other applications.
  • 3. WHAT IS WIRE-LESS NETWORK?  Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections —without requiring network or peripheral cabling.  Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks
  • 4. TYPES OF WIRE-LESS NETWORK.  Wireless Personal Area Networks (WPAN)  Wireless local area networks (WLAN)  Wireless Wide Area Networks (WWAN)
  • 8. WHY WE NEED SECURITY SYSTEM  when an unauthorized user gains access to the network and consumes network resources.  Malicious hackers, sometimes called crackers, are individuals who break into a system without authorization, usually for personal gain or to do harm.
  • 9. WHY WE NEED SECURITY SYSTEM  Malicious code involves viruses,Trojan horses, logic bombs, or other unwanted software that is designed to damage files or bring down a system.
  • 10. Different types of threats to network:  Application backdoors .  Operating system bugs .  E-mail bombs .  Macros .  Viruses .  Spam .  Trojan/key logger attacks.
  • 11. Threats to network: Application backdoors: Some programs have special features that allow for backdoor or hidden access , that provides some level of access of data. Operating system bugs: some operating systems Have backdoors with insufficient security controls .
  • 12. Threats to network: E-mail bombs : An e-mail bomb is usually a personal attack . Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages. Macros: A script of commands that the application can run. Hackers have taken advantage of this to create their own macros that , depending on the application , can destroy your data or crash your computer.
  • 13. Threats to network: VIRSUSES: Probably the most well-known threat is computer viruses . A virus is a small program that can copy itself to other computers . SPAM: spam is the electronic equivalent of mail. TROJAN / KEY ATTACKS: Trojan is a tool which when installed in a system, can be misused for malicious purposes by the attacker.
  • 14. Network security can be done by various methods.  Virtual Private Network.  Firewalls.  Internet Protocol Security (IP Sec).  AAA Server.
  • 15. Virtual Private Network (VPN).  A virtual private network ( VPN ) is a way to use a public telecommunication infrastructure.  In Internet , to provide remote offices or individual users with secure access to their organization's network.  The goal of a VPN is to provide the organization with the security , but at a much lower cost.
  • 16. Virtual Private Network (VPN). BEFORE SEURITY. AFTER SECURITY.
  • 17. INTERNET FIREWALLS. FireWallFireWall A firewall provides a strong barrier between your private network and the Internet . Set firewalls to restrict the number of open ports , what type of packets are passed and what are blocked .
  • 18. INTERNET PROTOCOL SECURITY. (IP SEC)  It provides enhanced security features such as better encryption algorithms and more comprehensive authentication.  IP Sec can encrypt data between various devices , such as :  Firewall to server  Server to PC
  • 19. AAA Server.  AAA (authentication , authorization and accounting)  When a request to establish a session comes in from a dial up client ,the Request is proxies to the AAA server.  AAA then checks the following :  Who you are (authentication)  What you are allowed to do (authorization)  What you actually do (accounting)
  • 20. CONCLUSION:  There is no gain saying the fact that SECURITY plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers.
  • 21. REFERENCES:  WWW.GOOGLE.COM  WWW.INTERNET SECURITY.COM  DATA COMMUNICATIONS & NETWORKING (A.FOROUZAN)