SlideShare a Scribd company logo
1 of 16
Network
security
◾ Introduction
◾ What is Network Security
◾ History
◾ Basic Network Security
◾ Need for Network Security
◾ Types
◾ Authentication
◾ NetworkAttacks Methods
◾ Advantages
◾ Problems
◾ Network SecurityArchitecture
◾ Conclusion
◾ Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
◾ However, as more and more people become
``wired'', an increasing number of people
need to understand the basics of security in a
networked world.
Network security is a level of guarantee that all
the machines in a network are working optimally
and the users of these machines only possess
the rights that were granted to them.
This can include:
◾ preventing unauthorized people from acting on
the system maliciously
◾ preventing users from performing involuntary
operations that are capable of harming the
system
◾ securing data by anticipating failures
◾ guaranteeing that services are not interrupted
◾ Internet security has been an issue since the
Internet rose to an international phenomenon.
◾ By 1996, the Internet already connected 13
million computers, so early security protocols
were required.
◾ These protocols required computer information
to be confidential, available, and have integrity.
◾ Because the Internet made information
available to everyone, people needed network
security to make their information confidential.
◾ When connecting a matching to a network, we need
to make sure no one will easily break in to it.
◾ Even if you don't think anyone will try to break into
your machines - chances are that someone might try.
◾ Crackers often run network scan utilities that check a
large range of IP addresses, and automatically try to
find machines running servers with security holes.
◾ To protect against that, one could simply disable any
unnecessary network service they are running.
◾ In the past, hackers were highly skilled programmers
who understood the details of computer
communications and how to exploit vulnerabilities.
Today almost anyone can become a hacker by
downloading tools from the Internet.
◾ These complicated attack tools and generally open
networks have generated an increased need for network
security and dynamic security policies.
◾ The easiest way to protect a network from an outside
attack is to close it off completely from the outside
world.
◾ A closed network provides connectivity only to trusted
known parties and sites; a closed network does not
allow a connection to public networks.
◾ Wi-Fi ProtectedAccess (WPA)
◾ WPA encrypts information, and checks to
make sure that the network security key has
not been modified.
◾ WPA also authenticates users to help ensure
that only authorized people can access the
network.
◾ WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
◾ Wired Equivalent Privacy (WEP)
◾ WEP is an older network security method that is
still available to support older devices, but it is
no longer recommended.
◾ When you enable WEP, you set up a network
security key.
◾ This key encrypts the information that one
computer sends to another computer across
your network. However,WEP security is
relatively easy to crack.
One-factor authentication – this is
“something a user knows.”The
most recognized type of one-factor
authentication method is the
password.
Two-factor authentication – in
addition to the first factor, the
second factor is “something a user
has.”
Three-factor authentication – in
addition to the previous two
factors, the third factor is
“something a user is.”
◾ Eavesdropping – Interception of communications by an
unauthorized party
◾ Data Modification – Data altering, reading from
unauthorized party
◾ Identity Spoofing (IPAddress Spoofing) – IP address to
be falsely assumed— identity spoofing and the attacker
can modify, reroute, or delete your data
◾ Password-Based Attacks – By gaining your access rights
to a computer and network resources are determined by
who you are, that is, your user name and your password
◾ Denial-of-ServiceAttack – Prevents normal use of your
computer or network by valid users, and it could be used
for sending invalid data to application, to flood the
computer, block traffic, etc.
◾ Network Security helps in protecting personal data
of clients existing on network.
◾ Network Security facilitates protection of
information that is shared between computers on
the network.
◾ Hacking attempts or virus / spyware attacks from
the internet will not be able to harm physical
computers. External possible attacks are prevented.
◾ Computer networks are typically a shared resource
used by many applications representing different
interests.
◾ The Internet is particularly widely shared, being used
by competing businesses, mutually antagonistic
governments, and opportunistic criminals.
◾ Unless security measures are taken, a network
conversation or a distributed application may be
compromised by an adversary.
◾ The owner of the website can be attacked as well.
Some websites have been defaced; the files that
make up the website content have been remotely
accessed and modified without authorization.
What & why
an organization's network infrastructure evolves
over many years.
◾ Although this evolution is in direct response to the
changing business needs, in many cases security has
been an afterthought.
◾ Even implementing the most advanced security
technologies of the day won't help if the underlying
security architecture is flawed.
Our systematic approach to the evaluation of the
current state ensures a detailed review of the
current architecture, technology & security
policy of the organization, management
practices and planned changes.
Some of the aspects that will be examined are:
◾ Review latestThreat RiskAnalysis report.
◾ Analysis of current IT network, information flow
according to business requirements and points
of access to information.
◾ That is why network security is an important
field that is increasingly gaining attention as
the Internet usage increases.
◾ The security threats and Internet protocols
were analyzed to determine the necessary
security technology.
◾ However, the current development in
network security is not very impressive and
significant.

More Related Content

Similar to TOPIC7.pptx

Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
What are data networks?
What are data networks?What are data networks?
What are data networks?James Steele
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
Internet security
Internet security Internet security
Internet security Ayesha Rana
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network SecurityAnjan Mahanta
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 

Similar to TOPIC7.pptx (20)

Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 
Cloud security
Cloud securityCloud security
Cloud security
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Internet security
Internet security Internet security
Internet security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 

More from tahaniali27

Chapter 1- Signals and Systems Classification.pptx
Chapter 1- Signals and Systems Classification.pptxChapter 1- Signals and Systems Classification.pptx
Chapter 1- Signals and Systems Classification.pptxtahaniali27
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppttahaniali27
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppttahaniali27
 
Congestion_Control09.ppt
Congestion_Control09.pptCongestion_Control09.ppt
Congestion_Control09.ppttahaniali27
 
مفهوم شبكات الحاسب.ppt
مفهوم شبكات الحاسب.pptمفهوم شبكات الحاسب.ppt
مفهوم شبكات الحاسب.ppttahaniali27
 
antenna2-140117111353-phpapp02.pptx
antenna2-140117111353-phpapp02.pptxantenna2-140117111353-phpapp02.pptx
antenna2-140117111353-phpapp02.pptxtahaniali27
 
criticalfrequency-191012041913.pptx
criticalfrequency-191012041913.pptxcriticalfrequency-191012041913.pptx
criticalfrequency-191012041913.pptxtahaniali27
 
CS553_ST7_Ch04-TransmissionMedia (2).ppt
CS553_ST7_Ch04-TransmissionMedia (2).pptCS553_ST7_Ch04-TransmissionMedia (2).ppt
CS553_ST7_Ch04-TransmissionMedia (2).ppttahaniali27
 
مهم جدا هوائيات.pptx
مهم جدا هوائيات.pptxمهم جدا هوائيات.pptx
مهم جدا هوائيات.pptxtahaniali27
 
lecture6_16.360.ppt
lecture6_16.360.pptlecture6_16.360.ppt
lecture6_16.360.ppttahaniali27
 
Chapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptxChapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptxtahaniali27
 
Chapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.pptChapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.ppttahaniali27
 
Chapter 5 OSI Model.ppt
Chapter 5 OSI  Model.pptChapter 5 OSI  Model.ppt
Chapter 5 OSI Model.ppttahaniali27
 

More from tahaniali27 (20)

network.ppt
network.pptnetwork.ppt
network.ppt
 
signal.ppt
signal.pptsignal.ppt
signal.ppt
 
Chapter 1- Signals and Systems Classification.pptx
Chapter 1- Signals and Systems Classification.pptxChapter 1- Signals and Systems Classification.pptx
Chapter 1- Signals and Systems Classification.pptx
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
 
Congestion_Control09.ppt
Congestion_Control09.pptCongestion_Control09.ppt
Congestion_Control09.ppt
 
مفهوم شبكات الحاسب.ppt
مفهوم شبكات الحاسب.pptمفهوم شبكات الحاسب.ppt
مفهوم شبكات الحاسب.ppt
 
physical.ppt
physical.pptphysical.ppt
physical.ppt
 
antenna2-140117111353-phpapp02.pptx
antenna2-140117111353-phpapp02.pptxantenna2-140117111353-phpapp02.pptx
antenna2-140117111353-phpapp02.pptx
 
criticalfrequency-191012041913.pptx
criticalfrequency-191012041913.pptxcriticalfrequency-191012041913.pptx
criticalfrequency-191012041913.pptx
 
CS553_ST7_Ch04-TransmissionMedia (2).ppt
CS553_ST7_Ch04-TransmissionMedia (2).pptCS553_ST7_Ch04-TransmissionMedia (2).ppt
CS553_ST7_Ch04-TransmissionMedia (2).ppt
 
physical.ppt
physical.pptphysical.ppt
physical.ppt
 
مهم جدا هوائيات.pptx
مهم جدا هوائيات.pptxمهم جدا هوائيات.pptx
مهم جدا هوائيات.pptx
 
lecture6_16.360.ppt
lecture6_16.360.pptlecture6_16.360.ppt
lecture6_16.360.ppt
 
UNIT4_IN.ppt
UNIT4_IN.pptUNIT4_IN.ppt
UNIT4_IN.ppt
 
Chapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptxChapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptx
 
Chapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.pptChapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.ppt
 
Chapter 5 OSI Model.ppt
Chapter 5 OSI  Model.pptChapter 5 OSI  Model.ppt
Chapter 5 OSI Model.ppt
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

TOPIC7.pptx

  • 2. ◾ Introduction ◾ What is Network Security ◾ History ◾ Basic Network Security ◾ Need for Network Security ◾ Types ◾ Authentication ◾ NetworkAttacks Methods ◾ Advantages ◾ Problems ◾ Network SecurityArchitecture ◾ Conclusion
  • 3. ◾ Network security is a complicated subject, historically only tackled by well-trained and experienced experts. ◾ However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
  • 4. Network security is a level of guarantee that all the machines in a network are working optimally and the users of these machines only possess the rights that were granted to them. This can include: ◾ preventing unauthorized people from acting on the system maliciously ◾ preventing users from performing involuntary operations that are capable of harming the system ◾ securing data by anticipating failures ◾ guaranteeing that services are not interrupted
  • 5. ◾ Internet security has been an issue since the Internet rose to an international phenomenon. ◾ By 1996, the Internet already connected 13 million computers, so early security protocols were required. ◾ These protocols required computer information to be confidential, available, and have integrity. ◾ Because the Internet made information available to everyone, people needed network security to make their information confidential.
  • 6. ◾ When connecting a matching to a network, we need to make sure no one will easily break in to it. ◾ Even if you don't think anyone will try to break into your machines - chances are that someone might try. ◾ Crackers often run network scan utilities that check a large range of IP addresses, and automatically try to find machines running servers with security holes. ◾ To protect against that, one could simply disable any unnecessary network service they are running.
  • 7. ◾ In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. ◾ These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies. ◾ The easiest way to protect a network from an outside attack is to close it off completely from the outside world. ◾ A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
  • 8. ◾ Wi-Fi ProtectedAccess (WPA) ◾ WPA encrypts information, and checks to make sure that the network security key has not been modified. ◾ WPA also authenticates users to help ensure that only authorized people can access the network. ◾ WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points.
  • 9. ◾ Wired Equivalent Privacy (WEP) ◾ WEP is an older network security method that is still available to support older devices, but it is no longer recommended. ◾ When you enable WEP, you set up a network security key. ◾ This key encrypts the information that one computer sends to another computer across your network. However,WEP security is relatively easy to crack.
  • 10. One-factor authentication – this is “something a user knows.”The most recognized type of one-factor authentication method is the password. Two-factor authentication – in addition to the first factor, the second factor is “something a user has.” Three-factor authentication – in addition to the previous two factors, the third factor is “something a user is.”
  • 11. ◾ Eavesdropping – Interception of communications by an unauthorized party ◾ Data Modification – Data altering, reading from unauthorized party ◾ Identity Spoofing (IPAddress Spoofing) – IP address to be falsely assumed— identity spoofing and the attacker can modify, reroute, or delete your data ◾ Password-Based Attacks – By gaining your access rights to a computer and network resources are determined by who you are, that is, your user name and your password ◾ Denial-of-ServiceAttack – Prevents normal use of your computer or network by valid users, and it could be used for sending invalid data to application, to flood the computer, block traffic, etc.
  • 12. ◾ Network Security helps in protecting personal data of clients existing on network. ◾ Network Security facilitates protection of information that is shared between computers on the network. ◾ Hacking attempts or virus / spyware attacks from the internet will not be able to harm physical computers. External possible attacks are prevented.
  • 13. ◾ Computer networks are typically a shared resource used by many applications representing different interests. ◾ The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals. ◾ Unless security measures are taken, a network conversation or a distributed application may be compromised by an adversary. ◾ The owner of the website can be attacked as well. Some websites have been defaced; the files that make up the website content have been remotely accessed and modified without authorization.
  • 14. What & why an organization's network infrastructure evolves over many years. ◾ Although this evolution is in direct response to the changing business needs, in many cases security has been an afterthought. ◾ Even implementing the most advanced security technologies of the day won't help if the underlying security architecture is flawed.
  • 15. Our systematic approach to the evaluation of the current state ensures a detailed review of the current architecture, technology & security policy of the organization, management practices and planned changes. Some of the aspects that will be examined are: ◾ Review latestThreat RiskAnalysis report. ◾ Analysis of current IT network, information flow according to business requirements and points of access to information.
  • 16. ◾ That is why network security is an important field that is increasingly gaining attention as the Internet usage increases. ◾ The security threats and Internet protocols were analyzed to determine the necessary security technology. ◾ However, the current development in network security is not very impressive and significant.