SlideShare a Scribd company logo
1
ASPECTS OF NETWORK
SECURITY
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan
Aspects of Network Security:
1. Privacy
Privacy means both the sender and the
receiver expects confidentiality. The
transmitted message should be sent only
to the intended receiver while the
message should be opaque for other
users. Only the sender and receiver should
be able to understand the transmitted
message as eavesdroppers can intercept
the message. Therefore, there is a
requirement to encrypt the message so
that the message cannot be intercepted.
This aspect of confidentiality is commonly
used to achieve secure communication.
2. Message Integrity
โ€ข Data integrity means that the data must
arrive at the receiver exactly as it was sent.
There transmission, either maliciously or
accident, in a transit. As there are more and
more monetary exchanges over the internet,
data integrity is more crucial. The data
integrity must be preserved i.e there must be
no changes in the data content during secure
communication.
3. End-point authentication
โ€ข Authentication means that the receiver is
sure of the senders identity, i.e.no imposter
has sent the message .
Non-Repudiation
Non-Repudiation means that the receiver must
be able to prove that the received message has
come from a specific sender. The sender must
not deny sending a message that he or she
send. The burden of proving the identity
comes on the receiver. For example, if a
customer sends a request to transfer the
money from one account to another account,
then the bank must have a proof that the
customer has requested for the transaction.
Network Security Controls
It consists of three different
controls:
1.Physical
2.Technical
3.Administrative.
Physical Network Security
Physical security controls are designed to prevent
unauthorized personnel from gaining physical access
to network components such as routers, cabling
cupboards and so on. It protects from acquiring the
control over the confidentiality of the network.
Controlled access, such as locks, biometric
authentication and other devices, is essential in any
organization.
Physical Network Security
Physical security controls are designed to prevent
unauthorized personnel from gaining physical access to
network components such as routers, cabling cupboards and
so on. It protects from acquiring the control over the
confidentiality of the network .
Controlled access, such as locks, biometric authentication
and other devices, is essential in any organization.
Technical Network Security
Technical security controls protect data that
is stored on the network or which is in transit
across, into or out of the network. Protection
is twofold; it needs to protect data and
systems from unauthorized personnel, and it
also needs to protect against malicious
activities from employees.
Administrative Network Security
This level of network security protects user
behaviour like how the permission has been
granted and how the authorization process
takes place. This also ensures the level of
sophistication the network might need for
protecting it through all the attacks. This
level also suggests necessary amendments
that have to be done over the infrastructure.
To protect a system, we must take
Security Measures at 4 levels
LEVEL 1 : Physical :
The site or sites containing the computer systems
must be physically secured against entry by
intruders. Both the machine rooms and the
terminals or workstations that have access to the
machines must be secured.
LEVEL 2 :Human
Authorizing users must be done carefully to
assure that only appropriate users have access to
the system. Even authorized users, however, may
be "encouraged" to let others use their access (in
exchange for a bribe, for example).
Phishing
Dumpster
Diving
LEVEL 3: Operating System
The system must protect itself from accidental or
purposeful security breaches. A runaway process
could constitute an accidental denial-of-service
attack. A query to a service could reveal passwords.
A stack overflow could allow the launching of an
unauthorized process. The list of possible breaches is
almost endless.
LEVEL 4: Network
Much computer data in modern systems travels over
private leased lines, shared lines like the Internet,
wireless connections, or dial-up lines. Intercepting
these data could be just as harmful as breaking into a
computer; and interruption of communications could
constitute a remote denial-of-service attack.
ASSIGNMENT
Q1. Which is the most important aspects of
security?
Q2. What are the core components of security?

More Related Content

What's hot

System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
ย 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
SHUBHA CHATURVEDI
ย 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
ย 
Intruders
IntrudersIntruders
Intruders
ALOK KUMAR
ย 
Hacking
HackingHacking
Hacking
LutfulM
ย 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
jp tj
ย 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
Ankit Gupta
ย 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
ย 
Mobile security
Mobile securityMobile security
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
ย 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
ย 
network security
network securitynetwork security
network security
nandita0798
ย 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
ย 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
ย 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
ย 
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
ย 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
ย 
Ppt.1
Ppt.1Ppt.1
Ppt.1
veeresh35
ย 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
ย 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
ย 

What's hot (20)

System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
ย 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
ย 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
ย 
Intruders
IntrudersIntruders
Intruders
ย 
Hacking
HackingHacking
Hacking
ย 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
ย 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
ย 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
ย 
Mobile security
Mobile securityMobile security
Mobile security
ย 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
ย 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
ย 
network security
network securitynetwork security
network security
ย 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
ย 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
ย 
Cia security model
Cia security modelCia security model
Cia security model
ย 
Lect13 security
Lect13   securityLect13   security
Lect13 security
ย 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
ย 
Ppt.1
Ppt.1Ppt.1
Ppt.1
ย 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
ย 
Computer security
Computer securityComputer security
Computer security
ย 

Similar to Aspects of Network Security

information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
ย 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
ย 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
ย 
security IDS
security IDSsecurity IDS
security IDS
Gregory Hanis
ย 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
ย 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
ShreyaChavan28
ย 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
ย 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
ย 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
IJRAT
ย 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
ย 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
ย 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
ย 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
ย 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
ย 
Introduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptxIntroduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptx
abhisma21
ย 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptx
DaveN31
ย 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
BisharSuleiman
ย 
Information security
Information securityInformation security
Information security
Rohit Gir
ย 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
ย 

Similar to Aspects of Network Security (20)

information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
ย 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
ย 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
ย 
security IDS
security IDSsecurity IDS
security IDS
ย 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
ย 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
ย 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
ย 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
ย 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
ย 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
ย 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ย 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
ย 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
ย 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
ย 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
ย 
Introduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptxIntroduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptx
ย 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptx
ย 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
ย 
Information security
Information securityInformation security
Information security
ย 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
ย 

More from SHUBHA CHATURVEDI

Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
SHUBHA CHATURVEDI
ย 
Unix and its Components
Unix and its ComponentsUnix and its Components
Unix and its Components
SHUBHA CHATURVEDI
ย 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
SHUBHA CHATURVEDI
ย 
Linux Features
Linux FeaturesLinux Features
Linux Features
SHUBHA CHATURVEDI
ย 
Architecture of Linux
 Architecture of Linux Architecture of Linux
Architecture of Linux
SHUBHA CHATURVEDI
ย 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
SHUBHA CHATURVEDI
ย 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
ย 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
ย 
Stream Ciphers
Stream CiphersStream Ciphers
Stream Ciphers
SHUBHA CHATURVEDI
ย 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
SHUBHA CHATURVEDI
ย 
Product Cipher
Product CipherProduct Cipher
Product Cipher
SHUBHA CHATURVEDI
ย 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
SHUBHA CHATURVEDI
ย 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
SHUBHA CHATURVEDI
ย 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
SHUBHA CHATURVEDI
ย 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
SHUBHA CHATURVEDI
ย 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
SHUBHA CHATURVEDI
ย 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
SHUBHA CHATURVEDI
ย 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
SHUBHA CHATURVEDI
ย 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
SHUBHA CHATURVEDI
ย 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
SHUBHA CHATURVEDI
ย 

More from SHUBHA CHATURVEDI (20)

Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
ย 
Unix and its Components
Unix and its ComponentsUnix and its Components
Unix and its Components
ย 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
ย 
Linux Features
Linux FeaturesLinux Features
Linux Features
ย 
Architecture of Linux
 Architecture of Linux Architecture of Linux
Architecture of Linux
ย 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
ย 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
ย 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
ย 
Stream Ciphers
Stream CiphersStream Ciphers
Stream Ciphers
ย 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
ย 
Product Cipher
Product CipherProduct Cipher
Product Cipher
ย 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
ย 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
ย 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
ย 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
ย 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
ย 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
ย 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
ย 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
ย 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
ย 

Recently uploaded

CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
ย 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
ย 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
ย 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
ย 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Nguyen Thanh Tu Collection
ย 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
ย 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
ย 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
ย 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
ย 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
ย 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
ย 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
ย 

Recently uploaded (20)

CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
ย 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
ย 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
ย 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ย 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
ย 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
ย 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
ย 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
ย 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
ย 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
ย 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
ย 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
ย 

Aspects of Network Security

  • 1. 1 ASPECTS OF NETWORK SECURITY Prof. Neeraj Bhargava Mrs. Shubha Chaturvedi Department of Computer Science, School of Engineering & System Sciences MDS University Ajmer, Rajasthan
  • 2. Aspects of Network Security:
  • 3. 1. Privacy Privacy means both the sender and the receiver expects confidentiality. The transmitted message should be sent only to the intended receiver while the message should be opaque for other users. Only the sender and receiver should be able to understand the transmitted message as eavesdroppers can intercept the message. Therefore, there is a requirement to encrypt the message so that the message cannot be intercepted. This aspect of confidentiality is commonly used to achieve secure communication.
  • 4. 2. Message Integrity โ€ข Data integrity means that the data must arrive at the receiver exactly as it was sent. There transmission, either maliciously or accident, in a transit. As there are more and more monetary exchanges over the internet, data integrity is more crucial. The data integrity must be preserved i.e there must be no changes in the data content during secure communication.
  • 5. 3. End-point authentication โ€ข Authentication means that the receiver is sure of the senders identity, i.e.no imposter has sent the message .
  • 6. Non-Repudiation Non-Repudiation means that the receiver must be able to prove that the received message has come from a specific sender. The sender must not deny sending a message that he or she send. The burden of proving the identity comes on the receiver. For example, if a customer sends a request to transfer the money from one account to another account, then the bank must have a proof that the customer has requested for the transaction.
  • 7. Network Security Controls It consists of three different controls: 1.Physical 2.Technical 3.Administrative.
  • 8. Physical Network Security Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. It protects from acquiring the control over the confidentiality of the network. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
  • 9. Physical Network Security Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. It protects from acquiring the control over the confidentiality of the network . Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
  • 10. Technical Network Security Technical security controls protect data that is stored on the network or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.
  • 11. Administrative Network Security This level of network security protects user behaviour like how the permission has been granted and how the authorization process takes place. This also ensures the level of sophistication the network might need for protecting it through all the attacks. This level also suggests necessary amendments that have to be done over the infrastructure.
  • 12. To protect a system, we must take Security Measures at 4 levels LEVEL 1 : Physical : The site or sites containing the computer systems must be physically secured against entry by intruders. Both the machine rooms and the terminals or workstations that have access to the machines must be secured.
  • 13. LEVEL 2 :Human Authorizing users must be done carefully to assure that only appropriate users have access to the system. Even authorized users, however, may be "encouraged" to let others use their access (in exchange for a bribe, for example). Phishing Dumpster Diving
  • 14. LEVEL 3: Operating System The system must protect itself from accidental or purposeful security breaches. A runaway process could constitute an accidental denial-of-service attack. A query to a service could reveal passwords. A stack overflow could allow the launching of an unauthorized process. The list of possible breaches is almost endless. LEVEL 4: Network Much computer data in modern systems travels over private leased lines, shared lines like the Internet, wireless connections, or dial-up lines. Intercepting these data could be just as harmful as breaking into a computer; and interruption of communications could constitute a remote denial-of-service attack.
  • 15. ASSIGNMENT Q1. Which is the most important aspects of security? Q2. What are the core components of security?