SlideShare a Scribd company logo
1 of 18
www.techsparks.co.in
techsparks2013@gmail.com Call For Any Kind Of M.tech
Thesis
Thesis Presentation
On
Network security
Content
◼ Introduction
◼ What is Network Security
◼ History
◼ Basic Network Security
◼ Need for Network Security
◼ Types
◼ Authentication
◼ Network Attacks Methods
◼ Advantages
◼ Problems
◼ Network Security Architecture
◼ Conclusion
Introduction
◼Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
◼However, as more and more people become
``wired'', an increasing number of people
need to understand the basics of security in a
networked world.
What is Network Security?
Network security is a level of guarantee that all
the machines in a network are working optimally
and the users of these machines only possess the
rights that were granted to them.
◼ preventing unauthorized people from acting on
the system maliciously
◼ preventing users from performing involuntary
operations that are capable of harming the
system
◼ securing data by anticipating failures
◼ guaranteeing that services are not interrupted
History
◼ Internet security has been an issue since the
Internet rose to an international phenomenon.
◼ By 1996, the Internet already connected 13
million computers, so early security protocols
were required.
◼ These protocols required computer information
to be confidential, available, and have integrity.
◼ Because the Internet made information available
to everyone, people needed network security to
make their information confidential.
Basic Network Security
◼ When connecting a matching to a network, we need
to make sure no one will easily break in to it.
◼ Even if you don't think anyone will try to break into
your machines - chances are that someone might try.
◼ Crackers often run network scan utilities that check a
large range of IP addresses, and automatically try to
find machines running servers with security holes.
◼ To protect against that, one could simply disable any
unnecessary network service they are running.
Need for Network Security
◼ In the past, hackers were highly skilled programmers
who understood the details of computer
communications and how to exploit vulnerabilities.
Today almost anyone can become a hacker by
downloading tools from the Internet.
◼ These complicated attack tools and generally open
networks have generated an increased need for
network security and dynamic security policies.
◼ The easiest way to protect a network from an outside
attack is to close it off completely from the outside
world.
◼ A closed network provides connectivity only to trusted
known parties and sites; a closed network does not
allow a connection to public networks.
Types
◼Wi-Fi Protected Access (WPA)
◼WPA encrypts information, and checks to
make sure that the network security key has
not been modified.
◼WPA also authenticates users to help ensure
that only authorized people can access the
network.
◼WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
Types…
◼ Wired Equivalent Privacy (WEP)
◼ WEP is an older network security method that is
still available to support older devices, but it is no
longer recommended.
◼ When you enable WEP, you set up a network
security key.
◼ This key encrypts the information that one
computer sends to another computer across your
network. However, WEP security is relatively
easy to crack.
Authentication
One-factor authentication – this is
“something a user knows.” The most
recognized type of one-factor
authentication method is the password.
Two-factor authentication – in addition
to the first factor, the second factor is
“something a user has.”
Three-factor authentication – in
addition to the previous two factors, the
third factor is “something a user is.”
Network Attacks Methods
◼ Eavesdropping – Interception of communications by an
unauthorized party
◼ Data Modification – Data altering, reading from
unauthorized party
◼ Identity Spoofing (IP Address Spoofing) – IP address to
be falsely assumed— identity spoofing and the attacker
can modify, reroute, or delete your data
◼ Password-Based Attacks – By gaining your access
rights to a computer and network resources are
determined by who you are, that is, your user name
and your password
◼ Denial-of-Service Attack – Prevents normal use of your
computer or network by valid users, and it could be
used for sending invalid data to application.
Advantages of Network Security
◼ Network Security helps in protecting personal data
of clients existing on network.
◼ Network Security facilitates protection of
information that is shared between computers on
the network.
◼ Hacking attempts or virus / spyware attacks from
the internet will not be able to harm physical
computers. External possible attacks are prevented.
Problems
◼ Computer networks are typically a shared resource
used by many applications representing different
interests.
◼ The Internet is particularly widely shared, being used
by competing businesses, mutually antagonistic
governments, and opportunistic criminals.
◼ Unless security measures are taken, a network
conversation or a distributed application may be
compromised by an adversary.
◼ The owner of the website can be attacked as well.
Some websites have been defaced; the files that
make up the website content have been remotely
accessed and modified without authorization.
Network Security Architecture
What & why
an organization's network infrastructure evolves
over many years.
◼ Although this evolution is in direct response to the
changing business needs, in many cases security has
been an afterthought.
◼ Even implementing the most advanced security
technologies of the day won't help if the underlying
security architecture is flawed.
How?
Our systematic approach to the evaluation of the
current state ensures a detailed review of the
current architecture, technology & security policy
of the organization, management practices and
planned changes.
Some of the aspects that will be examined are:
◼ Review latest Threat Risk Analysis report.
◼ Analysis of current IT network, information flow
according to business requirements and points of
access to information.
Conclusion
◼That is why network security is an important
field that is increasingly gaining attention as
the Internet usage increases.
◼The security threats and Internet protocols
were analyzed to determine the necessary
security technology.
◼ However, the current development in
network security is not very impressive and
significant.
References
◼www.techsparks.co.in
◼www.google.com
◼www.wikipedia.com
◼www.youtube.com
Thanks…!!!
www.techsparks.co.in
+91-96531-59085
techsparks2013@gmail.com

More Related Content

More from Techsparks

Software engineering - Topics and Research Areas
Software engineering - Topics and Research AreasSoftware engineering - Topics and Research Areas
Software engineering - Topics and Research AreasTechsparks
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
Data mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsData mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsTechsparks
 
How to write a thesis - Guidelines to Thesis Writing
How to write a thesis - Guidelines to Thesis WritingHow to write a thesis - Guidelines to Thesis Writing
How to write a thesis - Guidelines to Thesis WritingTechsparks
 
Matlab - Introduction and Basics
Matlab - Introduction and BasicsMatlab - Introduction and Basics
Matlab - Introduction and BasicsTechsparks
 
Topics in digital communication
Topics in digital communicationTopics in digital communication
Topics in digital communicationTechsparks
 
Research paper writers in hyderabad
Research paper writers in hyderabadResearch paper writers in hyderabad
Research paper writers in hyderabadTechsparks
 
Topics in wireless communication for project and thesis
Topics in wireless communication for project and thesisTopics in wireless communication for project and thesis
Topics in wireless communication for project and thesisTechsparks
 
Masters thesis in assistance indore
Masters thesis in assistance indoreMasters thesis in assistance indore
Masters thesis in assistance indoreTechsparks
 
Master's thesis assistance jalandhar
Master's thesis assistance jalandharMaster's thesis assistance jalandhar
Master's thesis assistance jalandharTechsparks
 
How to get published in Scopus/ IEEE journals
How to get published in Scopus/ IEEE journalsHow to get published in Scopus/ IEEE journals
How to get published in Scopus/ IEEE journalsTechsparks
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesisTechsparks
 
Introduction To Image processing
Introduction To Image processingIntroduction To Image processing
Introduction To Image processingTechsparks
 
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerPlagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerTechsparks
 
Hire Professional Thesis Help in Mumbai
Hire Professional Thesis Help in MumbaiHire Professional Thesis Help in Mumbai
Hire Professional Thesis Help in MumbaiTechsparks
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOTTechsparks
 
The Fundamental Structure for Good M Tech Thesis Format
The Fundamental Structure for Good M Tech Thesis FormatThe Fundamental Structure for Good M Tech Thesis Format
The Fundamental Structure for Good M Tech Thesis FormatTechsparks
 
Get your Thesis Proofread by a Thesis Maker in Delhi
Get your Thesis Proofread by a Thesis Maker in Delhi Get your Thesis Proofread by a Thesis Maker in Delhi
Get your Thesis Proofread by a Thesis Maker in Delhi Techsparks
 
Thesis Help by Techsparks
Thesis Help by TechsparksThesis Help by Techsparks
Thesis Help by TechsparksTechsparks
 

More from Techsparks (20)

Software engineering - Topics and Research Areas
Software engineering - Topics and Research AreasSoftware engineering - Topics and Research Areas
Software engineering - Topics and Research Areas
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Data mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsData mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research Topics
 
How to write a thesis - Guidelines to Thesis Writing
How to write a thesis - Guidelines to Thesis WritingHow to write a thesis - Guidelines to Thesis Writing
How to write a thesis - Guidelines to Thesis Writing
 
Matlab - Introduction and Basics
Matlab - Introduction and BasicsMatlab - Introduction and Basics
Matlab - Introduction and Basics
 
Topics in digital communication
Topics in digital communicationTopics in digital communication
Topics in digital communication
 
Research paper writers in hyderabad
Research paper writers in hyderabadResearch paper writers in hyderabad
Research paper writers in hyderabad
 
Topics in wireless communication for project and thesis
Topics in wireless communication for project and thesisTopics in wireless communication for project and thesis
Topics in wireless communication for project and thesis
 
Masters thesis in assistance indore
Masters thesis in assistance indoreMasters thesis in assistance indore
Masters thesis in assistance indore
 
Big Data Hadoop
Big Data HadoopBig Data Hadoop
Big Data Hadoop
 
Master's thesis assistance jalandhar
Master's thesis assistance jalandharMaster's thesis assistance jalandhar
Master's thesis assistance jalandhar
 
How to get published in Scopus/ IEEE journals
How to get published in Scopus/ IEEE journalsHow to get published in Scopus/ IEEE journals
How to get published in Scopus/ IEEE journals
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
 
Introduction To Image processing
Introduction To Image processingIntroduction To Image processing
Introduction To Image processing
 
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerPlagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
 
Hire Professional Thesis Help in Mumbai
Hire Professional Thesis Help in MumbaiHire Professional Thesis Help in Mumbai
Hire Professional Thesis Help in Mumbai
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOT
 
The Fundamental Structure for Good M Tech Thesis Format
The Fundamental Structure for Good M Tech Thesis FormatThe Fundamental Structure for Good M Tech Thesis Format
The Fundamental Structure for Good M Tech Thesis Format
 
Get your Thesis Proofread by a Thesis Maker in Delhi
Get your Thesis Proofread by a Thesis Maker in Delhi Get your Thesis Proofread by a Thesis Maker in Delhi
Get your Thesis Proofread by a Thesis Maker in Delhi
 
Thesis Help by Techsparks
Thesis Help by TechsparksThesis Help by Techsparks
Thesis Help by Techsparks
 

Recently uploaded

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

M.tech Thesis Presentation on Type of Network Security

  • 1. www.techsparks.co.in techsparks2013@gmail.com Call For Any Kind Of M.tech Thesis Thesis Presentation On Network security
  • 2. Content ◼ Introduction ◼ What is Network Security ◼ History ◼ Basic Network Security ◼ Need for Network Security ◼ Types ◼ Authentication ◼ Network Attacks Methods ◼ Advantages ◼ Problems ◼ Network Security Architecture ◼ Conclusion
  • 3. Introduction ◼Network security is a complicated subject, historically only tackled by well-trained and experienced experts. ◼However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
  • 4. What is Network Security? Network security is a level of guarantee that all the machines in a network are working optimally and the users of these machines only possess the rights that were granted to them. ◼ preventing unauthorized people from acting on the system maliciously ◼ preventing users from performing involuntary operations that are capable of harming the system ◼ securing data by anticipating failures ◼ guaranteeing that services are not interrupted
  • 5. History ◼ Internet security has been an issue since the Internet rose to an international phenomenon. ◼ By 1996, the Internet already connected 13 million computers, so early security protocols were required. ◼ These protocols required computer information to be confidential, available, and have integrity. ◼ Because the Internet made information available to everyone, people needed network security to make their information confidential.
  • 6. Basic Network Security ◼ When connecting a matching to a network, we need to make sure no one will easily break in to it. ◼ Even if you don't think anyone will try to break into your machines - chances are that someone might try. ◼ Crackers often run network scan utilities that check a large range of IP addresses, and automatically try to find machines running servers with security holes. ◼ To protect against that, one could simply disable any unnecessary network service they are running.
  • 7. Need for Network Security ◼ In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. ◼ These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies. ◼ The easiest way to protect a network from an outside attack is to close it off completely from the outside world. ◼ A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
  • 8. Types ◼Wi-Fi Protected Access (WPA) ◼WPA encrypts information, and checks to make sure that the network security key has not been modified. ◼WPA also authenticates users to help ensure that only authorized people can access the network. ◼WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points.
  • 9. Types… ◼ Wired Equivalent Privacy (WEP) ◼ WEP is an older network security method that is still available to support older devices, but it is no longer recommended. ◼ When you enable WEP, you set up a network security key. ◼ This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.
  • 10. Authentication One-factor authentication – this is “something a user knows.” The most recognized type of one-factor authentication method is the password. Two-factor authentication – in addition to the first factor, the second factor is “something a user has.” Three-factor authentication – in addition to the previous two factors, the third factor is “something a user is.”
  • 11. Network Attacks Methods ◼ Eavesdropping – Interception of communications by an unauthorized party ◼ Data Modification – Data altering, reading from unauthorized party ◼ Identity Spoofing (IP Address Spoofing) – IP address to be falsely assumed— identity spoofing and the attacker can modify, reroute, or delete your data ◼ Password-Based Attacks – By gaining your access rights to a computer and network resources are determined by who you are, that is, your user name and your password ◼ Denial-of-Service Attack – Prevents normal use of your computer or network by valid users, and it could be used for sending invalid data to application.
  • 12. Advantages of Network Security ◼ Network Security helps in protecting personal data of clients existing on network. ◼ Network Security facilitates protection of information that is shared between computers on the network. ◼ Hacking attempts or virus / spyware attacks from the internet will not be able to harm physical computers. External possible attacks are prevented.
  • 13. Problems ◼ Computer networks are typically a shared resource used by many applications representing different interests. ◼ The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals. ◼ Unless security measures are taken, a network conversation or a distributed application may be compromised by an adversary. ◼ The owner of the website can be attacked as well. Some websites have been defaced; the files that make up the website content have been remotely accessed and modified without authorization.
  • 14. Network Security Architecture What & why an organization's network infrastructure evolves over many years. ◼ Although this evolution is in direct response to the changing business needs, in many cases security has been an afterthought. ◼ Even implementing the most advanced security technologies of the day won't help if the underlying security architecture is flawed.
  • 15. How? Our systematic approach to the evaluation of the current state ensures a detailed review of the current architecture, technology & security policy of the organization, management practices and planned changes. Some of the aspects that will be examined are: ◼ Review latest Threat Risk Analysis report. ◼ Analysis of current IT network, information flow according to business requirements and points of access to information.
  • 16. Conclusion ◼That is why network security is an important field that is increasingly gaining attention as the Internet usage increases. ◼The security threats and Internet protocols were analyzed to determine the necessary security technology. ◼ However, the current development in network security is not very impressive and significant.