SlideShare a Scribd company logo
1 of 20
Wireless Networking (WSN Networking)
Presented By:
Rana Atiq ur Rehman
MS170401013
MS COMPUTER SCIENCES,
COMPUTER NETWORKING
Virtual University of Pakistan, Sahiwal Campus, Sahiwal
Network Security
Network security is an organization’s strategy
that enables guaranteeing the security of its
assets including all network traffic. It includes
both software and hardware technologies.
Access to the network is managed by effective
network security, which targets a wide range
of threats and then arrests them from
spreading or entering in the network.
Network Security
Network security is an integration of
multiple layers of defenses in the
network and at the network. Policies
and controls are implemented by
each network security layer. Access to
networks is gained by authorized
users, whereas, malicious actors are
indeed blocked from executing threats
and exploits.
Our world has presently been transformed by digitization,
resulting in changes in almost all our daily activities. It is
essential for all organizations to protect their networks if
they aim at delivering the services demanded by
employees and customers. This eventually protects the
reputation of your organization. With hackers increasing
and becoming smarter day by day, the need to
utilize network security tool becomes more and more
impotent.
Network Security
Types of Network Security
1. Antivirus and Antimalware Software
2. Application Security
3. Behavioral Analytics
4. Data Loss Prevention (DLP)
5. Email Security
6. Firewalls
7. Mobile Device Security
8. Network Segmentation
9. Security Information and Event Management (SIEM)
10.Virtual Private Network (VPN)
11.Web Security
12.Wireless Security
13.Endpoint Security
14.Network Access Control (NAC)
Network Security
Antivirus and Antimalware Software : This software is used for
protecting against malware, which includes spyware, ransomware,
Trojans, worms, and viruses. Malware can also become very
dangerous as it can infect a network and then remain calm for days
or even weeks. This software handles this threat by scanning for
malware entry and regularly tracks files afterward in order to detect
anomalies, remove malware, and fix damage.
Application Security: It is important to have an application security
since no app is created perfectly. It is possible for any application to
comprise of vulnerabilities, or holes, that are used by attackers to enter
your network. Application security thus encompasses the software,
hardware, and processes you select for closing those holes.
Network Security
Network Security
Behavioral Analytics: In order to detect abnormal network
behaviour, you will have to know what normal behavior looks like.
Behavioral analytics tools are capable of automatically discerning
activities that deviate from the norm. Your security team will thus
be able to efficiently detect indicators of compromise that pose a
potential problem and rapidly remediate threats.
Data Loss Prevention (DLP): Organizations should guarantee that
their staff does not send sensitive information outside the network.
They should thus use DLP technologies, network security
measures, that prevent people from uploading, forwarding, or even
printing vital information in an unsafe manner.
Network Security
Email Security: Email gateways are considered to be the number one threat
vector for a security breach. Attackers use social engineering tactics and personal
information in order to build refined phishing campaigns to deceive recipients
and then send them to sites serving up malware. An email security application is
capable of blocking incoming attacks and controlling outbound messages in order
to prevent the loss of sensitive data.
Firewalls: Firewalls place a barrier between your trusted internal network and
un-trusted outside networks, like the Internet. A set of defined rules are
employed to block or allow traffic. A firewall can be software, hardware, or both.
The free firewall efficiently manages traffic on your PC, monitors in/out
connections, and secures all connections when you are online. Intrusion
Prevention System (IPS): An IPS is a network security capable of scanning network
traffic in order to actively block attacks. The IPS Setting interface permits the
administrator to configure the rule set updates for Snort. It is possible to
schedule the rule set updates allowing them to automatically run at particular
intervals and these updates can be run manually on demand.
Network Security
Mobile Device Security: Mobile devices and apps are increasingly being targeted
by cybercriminals. 90% of IT organizations could very soon support corporate
applications on personal mobile devices. There is indeed the necessity for you to
control which devices can access your network. It is also necessary to configure
their connections in order to keep network traffic private.
Network Segmentation: Software-defined segmentation places network traffic
into varied classifications and makes enforcing security policies a lot easier. The
classifications are ideally based on endpoint identity, not just IP addresses. Rights
can be accessed based on location, role, and more so that the right people get
the correct level of access and suspicious devices are thus contained and
remediated.
Security Information and Event Management (SIEM): SIEM products bring
together all the information needed by your security staff in order to identify and
respond to threats. These products are available in different forms, including
virtual and physical appliances and server software.
Network Security
Virtual Private Network (VPN): A VPN is another type of network security
capable of encrypting the connection from an endpoint to a network, mostly over
the Internet. A remote-access VPN typically uses IPsec or Secure Sockets Layer in
order to authenticate the communication between network and device.
Web Security: A perfect web security solution will help in controlling your
staff’s web use, denying access to malicious websites, and blocking
Wireless Security: The mobile office movement is presently gaining
momentum along with wireless networks and access points. However,
wireless networks are not as secure as wired ones and this makes way for
hackers to enter. It is thus essential for the wireless security to be strong. It
should be noted that without stringent security measures installing a wireless
LAN could be like placing Ethernet ports everywhere. Products specifically
designed for protecting a wireless network will have to be used in order to
prevent an exploit from taking place.
Network Security
Endpoint Security: Endpoint Security, also known Endpoint Protection or
Network Security, is a methodology used for protecting corporate networks
when accessed through remote devices such as laptops or several other
wireless devices and mobile devices. For instance, Comodo Advanced
Endpoint Protection software presents seven layers of defense that include
viruscope, file reputation, auto-sandbox, host intrusion prevention, web URL
filtering, firewall, and antivirus software. All this is offered under a single
offering in order to protect them from both unknown and known threats.
Network Access Control (NAC): This network security process helps you to
control who can access your network. It is essential to recognize each device
and user in order to keep out potential attackers. This indeed will help you to
enforce your security policies. Noncompliant endpoint devices can be given
only limited access or just blocked.
Network Security
Network Security
Network Security
Network Security
The network security key is the password or pass phrase
that you use to authenticate with your homenetwork. In
order to establish a secure connection with your wireless
router, you have to provide the keyto prove that you are
authorized to do so.
Network Security
Definition - What does Network Security Key mean?
A network security key usually refers to the password
or alphanumeric key that end users enter to access a
local area network.
In common use, the network security key differs from
other network keys used to determine network
addresses, etc.
A security key is a resource for a specific security
protocol that helps secure the local network.
Network Security
What is a Network Security Key and How Can You Identify Yours?
Your Network Security Key is the Password for Your
Internet Network.
It connects your computers or other devices to your router,
allowing you to receive the signal and get online. If your
computer forgets or someone changes the network security
key, you will be unable to access your internet-based websites,
programs, and files. You very often will need it if trying to
connect a new device to your network.
Network Security
How do you find your network security key?
On Your Router
Often, the network security will be marked on a label on your router, and if you never
changed the password or reset your router to default settings, than you’re good to go. It
may be listed as “Security Key,” “WEP Key,” “WPA Key,” “WPA2 Key,” “Wireless Key,” or
“Passphrase.”
You might also find this in the documentation that came with your router.
If you can’t find it on your router or in the paperwork, how you find it depends on your
operating system.
On Your Computers and Devices
When you are connected to the network, your computer remembers it, and you can look
in your PC to obtain the password. It’s a good idea to write it down somewhere ahead of
time and keep it somewhere safe so you can easily retrieve it as needed.
Network Security
Windows 7:
Click the Start button, and then open the Control
Panel. Select “Network and Internet,” click “View
network status and tasks.” Click on “Manage
Wireless Networks” and then find the name of your
wireless network on the menu that opens.
Right-click, choose “Properties,” and then select the
Security tab. Check “Show characters,” if the
characters are concealed, and then you will see your
Network security key.
Network Security
“Thank you for your patience” is a way to acknowledge that the other person has been
waiting for an extended period of time, usually longer than they should expect to have
waited in the situation. Patience: the capacity to accept or tolerate delay, problems, or
suffering without becoming annoyed or anxious.

More Related Content

What's hot

Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingSeo Tss
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)amar koppal
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Twinkle Sebastian
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 

What's hot (20)

Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 

Similar to Wireless Networking

network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxSameerShaik43
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfCareerera
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLPKnow More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLPSecninjaz Technologies LLP
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 

Similar to Wireless Networking (20)

network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLPKnow More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
information security technology
information security technologyinformation security technology
information security technology
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Wireless Networking

  • 1. Wireless Networking (WSN Networking) Presented By: Rana Atiq ur Rehman MS170401013 MS COMPUTER SCIENCES, COMPUTER NETWORKING Virtual University of Pakistan, Sahiwal Campus, Sahiwal
  • 2. Network Security Network security is an organization’s strategy that enables guaranteeing the security of its assets including all network traffic. It includes both software and hardware technologies. Access to the network is managed by effective network security, which targets a wide range of threats and then arrests them from spreading or entering in the network.
  • 3. Network Security Network security is an integration of multiple layers of defenses in the network and at the network. Policies and controls are implemented by each network security layer. Access to networks is gained by authorized users, whereas, malicious actors are indeed blocked from executing threats and exploits.
  • 4. Our world has presently been transformed by digitization, resulting in changes in almost all our daily activities. It is essential for all organizations to protect their networks if they aim at delivering the services demanded by employees and customers. This eventually protects the reputation of your organization. With hackers increasing and becoming smarter day by day, the need to utilize network security tool becomes more and more impotent. Network Security
  • 5. Types of Network Security 1. Antivirus and Antimalware Software 2. Application Security 3. Behavioral Analytics 4. Data Loss Prevention (DLP) 5. Email Security 6. Firewalls 7. Mobile Device Security 8. Network Segmentation 9. Security Information and Event Management (SIEM) 10.Virtual Private Network (VPN) 11.Web Security 12.Wireless Security 13.Endpoint Security 14.Network Access Control (NAC) Network Security
  • 6. Antivirus and Antimalware Software : This software is used for protecting against malware, which includes spyware, ransomware, Trojans, worms, and viruses. Malware can also become very dangerous as it can infect a network and then remain calm for days or even weeks. This software handles this threat by scanning for malware entry and regularly tracks files afterward in order to detect anomalies, remove malware, and fix damage. Application Security: It is important to have an application security since no app is created perfectly. It is possible for any application to comprise of vulnerabilities, or holes, that are used by attackers to enter your network. Application security thus encompasses the software, hardware, and processes you select for closing those holes. Network Security
  • 7. Network Security Behavioral Analytics: In order to detect abnormal network behaviour, you will have to know what normal behavior looks like. Behavioral analytics tools are capable of automatically discerning activities that deviate from the norm. Your security team will thus be able to efficiently detect indicators of compromise that pose a potential problem and rapidly remediate threats. Data Loss Prevention (DLP): Organizations should guarantee that their staff does not send sensitive information outside the network. They should thus use DLP technologies, network security measures, that prevent people from uploading, forwarding, or even printing vital information in an unsafe manner.
  • 8. Network Security Email Security: Email gateways are considered to be the number one threat vector for a security breach. Attackers use social engineering tactics and personal information in order to build refined phishing campaigns to deceive recipients and then send them to sites serving up malware. An email security application is capable of blocking incoming attacks and controlling outbound messages in order to prevent the loss of sensitive data. Firewalls: Firewalls place a barrier between your trusted internal network and un-trusted outside networks, like the Internet. A set of defined rules are employed to block or allow traffic. A firewall can be software, hardware, or both. The free firewall efficiently manages traffic on your PC, monitors in/out connections, and secures all connections when you are online. Intrusion Prevention System (IPS): An IPS is a network security capable of scanning network traffic in order to actively block attacks. The IPS Setting interface permits the administrator to configure the rule set updates for Snort. It is possible to schedule the rule set updates allowing them to automatically run at particular intervals and these updates can be run manually on demand.
  • 9. Network Security Mobile Device Security: Mobile devices and apps are increasingly being targeted by cybercriminals. 90% of IT organizations could very soon support corporate applications on personal mobile devices. There is indeed the necessity for you to control which devices can access your network. It is also necessary to configure their connections in order to keep network traffic private. Network Segmentation: Software-defined segmentation places network traffic into varied classifications and makes enforcing security policies a lot easier. The classifications are ideally based on endpoint identity, not just IP addresses. Rights can be accessed based on location, role, and more so that the right people get the correct level of access and suspicious devices are thus contained and remediated. Security Information and Event Management (SIEM): SIEM products bring together all the information needed by your security staff in order to identify and respond to threats. These products are available in different forms, including virtual and physical appliances and server software.
  • 10. Network Security Virtual Private Network (VPN): A VPN is another type of network security capable of encrypting the connection from an endpoint to a network, mostly over the Internet. A remote-access VPN typically uses IPsec or Secure Sockets Layer in order to authenticate the communication between network and device. Web Security: A perfect web security solution will help in controlling your staff’s web use, denying access to malicious websites, and blocking Wireless Security: The mobile office movement is presently gaining momentum along with wireless networks and access points. However, wireless networks are not as secure as wired ones and this makes way for hackers to enter. It is thus essential for the wireless security to be strong. It should be noted that without stringent security measures installing a wireless LAN could be like placing Ethernet ports everywhere. Products specifically designed for protecting a wireless network will have to be used in order to prevent an exploit from taking place.
  • 11. Network Security Endpoint Security: Endpoint Security, also known Endpoint Protection or Network Security, is a methodology used for protecting corporate networks when accessed through remote devices such as laptops or several other wireless devices and mobile devices. For instance, Comodo Advanced Endpoint Protection software presents seven layers of defense that include viruscope, file reputation, auto-sandbox, host intrusion prevention, web URL filtering, firewall, and antivirus software. All this is offered under a single offering in order to protect them from both unknown and known threats. Network Access Control (NAC): This network security process helps you to control who can access your network. It is essential to recognize each device and user in order to keep out potential attackers. This indeed will help you to enforce your security policies. Noncompliant endpoint devices can be given only limited access or just blocked.
  • 15. Network Security The network security key is the password or pass phrase that you use to authenticate with your homenetwork. In order to establish a secure connection with your wireless router, you have to provide the keyto prove that you are authorized to do so.
  • 16. Network Security Definition - What does Network Security Key mean? A network security key usually refers to the password or alphanumeric key that end users enter to access a local area network. In common use, the network security key differs from other network keys used to determine network addresses, etc. A security key is a resource for a specific security protocol that helps secure the local network.
  • 17. Network Security What is a Network Security Key and How Can You Identify Yours? Your Network Security Key is the Password for Your Internet Network. It connects your computers or other devices to your router, allowing you to receive the signal and get online. If your computer forgets or someone changes the network security key, you will be unable to access your internet-based websites, programs, and files. You very often will need it if trying to connect a new device to your network.
  • 18. Network Security How do you find your network security key? On Your Router Often, the network security will be marked on a label on your router, and if you never changed the password or reset your router to default settings, than you’re good to go. It may be listed as “Security Key,” “WEP Key,” “WPA Key,” “WPA2 Key,” “Wireless Key,” or “Passphrase.” You might also find this in the documentation that came with your router. If you can’t find it on your router or in the paperwork, how you find it depends on your operating system. On Your Computers and Devices When you are connected to the network, your computer remembers it, and you can look in your PC to obtain the password. It’s a good idea to write it down somewhere ahead of time and keep it somewhere safe so you can easily retrieve it as needed.
  • 19. Network Security Windows 7: Click the Start button, and then open the Control Panel. Select “Network and Internet,” click “View network status and tasks.” Click on “Manage Wireless Networks” and then find the name of your wireless network on the menu that opens. Right-click, choose “Properties,” and then select the Security tab. Check “Show characters,” if the characters are concealed, and then you will see your Network security key.
  • 20. Network Security “Thank you for your patience” is a way to acknowledge that the other person has been waiting for an extended period of time, usually longer than they should expect to have waited in the situation. Patience: the capacity to accept or tolerate delay, problems, or suffering without becoming annoyed or anxious.