2. INTRODUCTION.
The security system is used as in various fields,
particularly the internet, communications data
storage, identification and authentication and
other applications.
3. WHAT IS WIRE-LESS NETWORK?
Wireless technologies, in the simplest
sense, enable one or more devices to
communicate without physical connections
—without requiring network or peripheral
cabling.
Wireless networks serve as the transport
mechanism between devices and among
devices and the traditional wired networks
4. TYPES OF WIRE-LESS
NETWORK.
Wireless Personal Area Networks
(WPAN)
Wireless local area networks (WLAN)
Wireless Wide Area Networks
(WWAN)
8. WHY WE NEED SECURITY
SYSTEM
when an unauthorized user gains
access to the network and consumes
network resources.
Malicious hackers, sometimes called
crackers, are individuals who break into
a system without authorization, usually
for personal gain or to do harm.
9. WHY WE NEED SECURITY
SYSTEM
Malicious code involves viruses,Trojan
horses, logic bombs, or other unwanted
software that is designed to damage files or
bring down a system.
10. Different types of threats
to network:
Application backdoors .
Operating system bugs .
E-mail bombs .
Macros .
Viruses .
Spam .
Trojan/key logger attacks.
11. Threats to network:
Application backdoors:
Some programs have special features that
allow for backdoor or hidden access , that
provides some level of access of data.
Operating system bugs:
some operating systems Have backdoors with
insufficient security controls .
12. Threats to network:
E-mail bombs :
An e-mail bomb is usually a personal attack . Someone
sends you the same e-mail hundreds or thousands of
times until your e-mail system cannot accept any more
messages.
Macros:
A script of commands that the application can run.
Hackers have taken advantage of this to create their
own macros that , depending on the application , can
destroy your data or crash your computer.
13. Threats to network:
VIRSUSES:
Probably the most well-known threat is
computer viruses .
A virus is a small program that can copy itself to
other computers .
SPAM:
spam is the electronic equivalent of mail.
TROJAN / KEY ATTACKS:
Trojan is a tool which when installed in a system, can be
misused for malicious purposes by the attacker.
14. Network security can be
done by various methods.
Virtual Private Network.
Firewalls.
Internet Protocol Security
(IP Sec).
AAA Server.
15. Virtual Private Network
(VPN).
A virtual private network ( VPN ) is a way to use
a public telecommunication infrastructure.
In Internet , to provide remote offices or
individual users with secure access to their
organization's network.
The goal of a VPN is to provide the
organization with the security , but at a much
lower cost.
17. INTERNET FIREWALLS.
FireWallFireWall
A firewall provides a strong barrier between your private network and the
Internet .
Set firewalls to restrict the number of open ports , what type of packets are
passed and what are blocked .
18. INTERNET PROTOCOL
SECURITY. (IP SEC)
It provides enhanced security features
such as better encryption algorithms
and more comprehensive
authentication.
IP Sec can encrypt data between
various devices , such as :
Firewall to server
Server to PC
19. AAA Server.
AAA (authentication , authorization and
accounting)
When a request to establish a session comes
in from a dial up client ,the Request is proxies to
the AAA server.
AAA then checks the following :
Who you are (authentication)
What you are allowed to do (authorization)
What you actually do (accounting)
20. CONCLUSION:
There is no gain saying the fact that
SECURITY plays an essential role in
protecting the privacy of electronic
information against threats from a
variety of potential attackers.