SlideShare a Scribd company logo
1 of 14
1


Introduction



What is security?



Why do we need security?



Common security attacks and countermeasures
 Firewalls
 Intrusion Detection Systems

 Denial of Service Attacks


Conclusion
2


The term Security refers to a range from data protection
to protect from unauthorized access.For each company is
different, you might find some existing models, but it
will always fit your case.



New threats emerge every month, quickly followed by

new protection methods ,so it's a never ending task.

3
 Freedom from risk or danger; safety.
 Freedom from doubt, anxiety, or fear; confidence.
 Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a
visitor acts suspicious.
2. Measures adopted by a government to prevent espionage, sabotage, or
attack.
3. Measures adopted, as by a business or homeowner, to prevent a crime
such as burglary or assault: Security was lax at the firm's smaller plant.
4


Protect vital information while still allowing access to
those who need it
 Trade secrets, medical records, etc.



Provide authentication and access control for resources
 Ex: AFS



Guarantee availability of resources

5


Finding a way into the network
 Firewalls



Exploiting software bugs, buffer overflows
 Intrusion Detection Systems



Denial of Service
 Ingress filtering, IDS



Packet sniffing
 Encryption (SSH, SSL, HTTPS)

6


Basic problem – many network applications and
protocols have security problems that are fixed over time
 Difficult for users to keep up with changes and keep host

secure
 Solution

▪ Administrators limit access to end hosts by using a firewall
▪ Firewall is kept up-to-date by administrators
7


A firewall is like a castle with a drawbridge
 Only one point of access into the network
 This can be good or bad



Can be hardware or software
 Ex. Some routers come with firewall functionality

8


Used to monitor for “suspicious activity” on a network
 Can protect against known software exploits, like buffer

overflows


Uses “intrusion signatures”
 Well known patterns of behavior

▪ Ping sweeps, port scanning, web server indexing, OS fingerprinting,
DoS attempts, etc.


However, IDS is only useful if contingency plans are in place
to curb attacks as they are occurring
9


Purpose: Make a network service unusable, usually by
overloading the server or network



Many different kinds of DoS attacks
 SYN flooding
 SMURF

10
SYN flooding attack


Send SYN packets with bogus source address
 Why?



Server responds with SYN ACK and keeps state about TCP half-open
connection
 Eventually, server memory is exhausted with this state



Solution: use “SYN cookies”
 In response to a SYN, create a special “cookie” for the connection, and

forget everything else
 Then, can recreate the forgotten information when the ACK comes in from

a legitimate connection
11
Smurf attack


In a Smurf attack, the attacker sends ping requests directed to a
broadcast address, with the source address of the IP datagram set to
the address of the target system under attack (spoofed source
address).



All systems within the broadcast domain will answer back to the
target address, thus flooding the target system with ICMP traffic

and causing network congestion => little or no bandwidth left for
legitimate users.
12


Security is a very difficult topic. Everyone has a different idea of
what ``security'' is, and what levels of risk are acceptable.



The key for building a secure network is to define what security
means to your organization . Once that has been defined, everything
that goes on with the network can be evaluated with respect to that
policy.



Projects and systems can then be broken down into their

components, and it becomes much simpler to decide whether what
is proposed will conflict with your security policies and practices.
13
14

More Related Content

What's hot

Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 

What's hot (20)

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fire walls
Fire wallsFire walls
Fire walls
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security
Network securityNetwork security
Network security
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 

Viewers also liked

网络攻击与防御-tseek
网络攻击与防御-tseek网络攻击与防御-tseek
网络攻击与防御-tseek
hamaci
 
加快互联网核心协议,提高Web速度yuchungcheng
加快互联网核心协议,提高Web速度yuchungcheng加快互联网核心协议,提高Web速度yuchungcheng
加快互联网核心协议,提高Web速度yuchungcheng
Michael Zhang
 
Guide d'utilisation de l'exerciseur Test-Info
Guide d'utilisation de l'exerciseur Test-InfoGuide d'utilisation de l'exerciseur Test-Info
Guide d'utilisation de l'exerciseur Test-Info
ATPENSC-Group
 
Chapitre iv entrées sorties et bus
Chapitre iv entrées sorties et busChapitre iv entrées sorties et bus
Chapitre iv entrées sorties et bus
Sana Aroussi
 
Les typologies des Réseaux informatiques
Les  typologies des Réseaux informatiquesLes  typologies des Réseaux informatiques
Les typologies des Réseaux informatiques
Fatima Zohra BENHACINE
 

Viewers also liked (16)

网络攻击与防御-tseek
网络攻击与防御-tseek网络攻击与防御-tseek
网络攻击与防御-tseek
 
加快互联网核心协议,提高Web速度yuchungcheng
加快互联网核心协议,提高Web速度yuchungcheng加快互联网核心协议,提高Web速度yuchungcheng
加快互联网核心协议,提高Web速度yuchungcheng
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
 
Guide d'utilisation de l'exerciseur Test-Info
Guide d'utilisation de l'exerciseur Test-InfoGuide d'utilisation de l'exerciseur Test-Info
Guide d'utilisation de l'exerciseur Test-Info
 
Mind manager
Mind managerMind manager
Mind manager
 
Citrix Netscaler HTTP Dos Koruması
Citrix Netscaler HTTP Dos KorumasıCitrix Netscaler HTTP Dos Koruması
Citrix Netscaler HTTP Dos Koruması
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Les périphériques et les supports de stockage d'un PC
Les périphériques et les supports de stockage d'un PCLes périphériques et les supports de stockage d'un PC
Les périphériques et les supports de stockage d'un PC
 
Chapitre iv entrées sorties et bus
Chapitre iv entrées sorties et busChapitre iv entrées sorties et bus
Chapitre iv entrées sorties et bus
 
Les typologies des Réseaux informatiques
Les  typologies des Réseaux informatiquesLes  typologies des Réseaux informatiques
Les typologies des Réseaux informatiques
 
Typologie des réseaux informatiques
Typologie des réseaux informatiquesTypologie des réseaux informatiques
Typologie des réseaux informatiques
 
Supports de stockage
Supports de stockageSupports de stockage
Supports de stockage
 
Cours informatique ordinateur et système d'exploitation
Cours informatique ordinateur et système d'exploitationCours informatique ordinateur et système d'exploitation
Cours informatique ordinateur et système d'exploitation
 
Réseaux informatiques: Reseau Local LAN
Réseaux informatiques: Reseau Local  LANRéseaux informatiques: Reseau Local  LAN
Réseaux informatiques: Reseau Local LAN
 
Cours informatique internet - 7ème (2011-2012)
Cours   informatique internet - 7ème (2011-2012)  Cours   informatique internet - 7ème (2011-2012)
Cours informatique internet - 7ème (2011-2012)
 
Cours informatique supports de stockage
Cours  informatique supports de stockage Cours  informatique supports de stockage
Cours informatique supports de stockage
 

Similar to Network Security

Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
Serious_SamSoul
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
kris harden
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Network Security (20)

Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

Network Security

  • 1. 1
  • 2.  Introduction  What is security?  Why do we need security?  Common security attacks and countermeasures  Firewalls  Intrusion Detection Systems  Denial of Service Attacks  Conclusion 2
  • 3.  The term Security refers to a range from data protection to protect from unauthorized access.For each company is different, you might find some existing models, but it will always fit your case.  New threats emerge every month, quickly followed by new protection methods ,so it's a never ending task. 3
  • 4.  Freedom from risk or danger; safety.  Freedom from doubt, anxiety, or fear; confidence.  Something that gives or assures safety, as: 1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. 4
  • 5.  Protect vital information while still allowing access to those who need it  Trade secrets, medical records, etc.  Provide authentication and access control for resources  Ex: AFS  Guarantee availability of resources 5
  • 6.  Finding a way into the network  Firewalls  Exploiting software bugs, buffer overflows  Intrusion Detection Systems  Denial of Service  Ingress filtering, IDS  Packet sniffing  Encryption (SSH, SSL, HTTPS) 6
  • 7.  Basic problem – many network applications and protocols have security problems that are fixed over time  Difficult for users to keep up with changes and keep host secure  Solution ▪ Administrators limit access to end hosts by using a firewall ▪ Firewall is kept up-to-date by administrators 7
  • 8.  A firewall is like a castle with a drawbridge  Only one point of access into the network  This can be good or bad  Can be hardware or software  Ex. Some routers come with firewall functionality 8
  • 9.  Used to monitor for “suspicious activity” on a network  Can protect against known software exploits, like buffer overflows  Uses “intrusion signatures”  Well known patterns of behavior ▪ Ping sweeps, port scanning, web server indexing, OS fingerprinting, DoS attempts, etc.  However, IDS is only useful if contingency plans are in place to curb attacks as they are occurring 9
  • 10.  Purpose: Make a network service unusable, usually by overloading the server or network  Many different kinds of DoS attacks  SYN flooding  SMURF 10
  • 11. SYN flooding attack  Send SYN packets with bogus source address  Why?  Server responds with SYN ACK and keeps state about TCP half-open connection  Eventually, server memory is exhausted with this state  Solution: use “SYN cookies”  In response to a SYN, create a special “cookie” for the connection, and forget everything else  Then, can recreate the forgotten information when the ACK comes in from a legitimate connection 11
  • 12. Smurf attack  In a Smurf attack, the attacker sends ping requests directed to a broadcast address, with the source address of the IP datagram set to the address of the target system under attack (spoofed source address).  All systems within the broadcast domain will answer back to the target address, thus flooding the target system with ICMP traffic and causing network congestion => little or no bandwidth left for legitimate users. 12
  • 13.  Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable.  The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy.  Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with your security policies and practices. 13
  • 14. 14