SlideShare a Scribd company logo
1 of 21
NETWORK SECURITY
Define Network:
A Network is a series of points or nodes
interconnected by communication paths.
Interconnect with other networks and
contain sub networks.
Define Security:
Security is “Freedom from risk or danger.“
The ability of a system to protect information
and system resources with respect to
confidentiality and integrity.
Network security:
Any activities designed to protect your
network .
Target- variety of threats and stops them from
entering or spreading on your network.
Handled by a network administrator.
Objective:
• Access
• Confidentiality
• Authentication
• Integrity
• Non‐repudiation
History:
During the 1980s, the hackers and crimes
were beginning to emerge.
CERT was created to overcome network
security issues.
In the 1990s, Internet became public and the
security concerns increased tremendously.
Types:
Five types of network security can aid in secure
networking.
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
 We need multiple layers of
security
 Network security is
accomplished through
hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall
Intrusion prevention systems
Virtual Private Networks
Security tools:
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual private network
• Identity services
• Encryption
• Security management
Network security technology :
Different mechanisms to deal with these
attacks.
Cryptographic systems:
plaintext is converted in to cipher text.
 Secret Key Cryptography (SKC)
• Public Key Cryptography (PKC):
• Hash Function:
Hash function
Plain text Cipher text
 A typical border control mechanism.
 Metaphor for network security.
 Designed to prevent unauthorized access
to or from a private network.
◦ Packet Filtering Firewall
◦ State Full Firewall
◦ ApplicationAware Firewall etc..
Network-based IDs (NIDS):
The sensor are located at the choke in network
It monitored, it captures all the network traffic
and analyze each packets for malicious traffic.
 It is a good level of
security between a web
browser and a website.
 There is a tunnel
between them.
 Clients present a
certificate to the server to
prove their identity.
 prevention of unauthorized access using wireless
networks.
Security Policies:
 Wireless Intrusion Prevention System(WIPS)
 Wireless Intrusion Detection System (WIDS)
Implementation:
Three components: sensor, server, and console.
 It is a short program aiming at securing
communication over a network.
Example:
Transport layer security (TLS)
PPP / Point-to-Point Protocol
Internet Protocols security (IPSec)
 Network Security Services (NSS) comprises
a set of libraries
 It develops security-enabled client and
server applications.
Some are:
Mozilla client products, including Firefox etc
Google Chrome
Sun server products
Hardware Developments
 Biometric systems -secure workstation
logons
 Smart cards -undeniable proof of a user’s
identity.
Software Developments
 Current research develops security software
using neural networks.
 Objective- use neural networks for the facial
recognition software.
The network security will be able to function
as an immune system.
The same set of security technology that is
being used today with some minor
adjustments.
 The network security field evolve more rapidly to
deal with the threats further in the future.
“As threats tweaks,
Security tremendously Tweaks”
By ,
I.Madhumithah
V.Kalpana

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network Security
Network Security Network Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network security Network security
Network security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Firewall
Firewall Firewall
Firewall
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Similar to Network security

Network security
Network securityNetwork security
Network security
snegacmr
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
prosunghosh7
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
sandeepsandy75
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
Anand Kater
 

Similar to Network security (20)

Online security
Online securityOnline security
Online security
 
NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Network security
Network securityNetwork security
Network security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 

More from Madhumithah Ilango (8)

Project confiration-letter-sample
Project confiration-letter-sampleProject confiration-letter-sample
Project confiration-letter-sample
 
4 g technology
4 g technology4 g technology
4 g technology
 
Clientserver
ClientserverClientserver
Clientserver
 
Bit info
Bit infoBit info
Bit info
 
Network simulator
Network  simulatorNetwork  simulator
Network simulator
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Gps
GpsGps
Gps
 
4 g technology
4 g technology4 g technology
4 g technology
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Network security

  • 2. Define Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks.
  • 3. Define Security: Security is “Freedom from risk or danger.“ The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  • 4. Network security: Any activities designed to protect your network . Target- variety of threats and stops them from entering or spreading on your network. Handled by a network administrator.
  • 5. Objective: • Access • Confidentiality • Authentication • Integrity • Non‐repudiation
  • 6. History: During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.
  • 7. Types: Five types of network security can aid in secure networking. • Physical security • Perimeter protection • User training and education • Wireless encryption protocol (WEP) • MAC address filtering
  • 8.  We need multiple layers of security  Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  • 9. Security tools: • Antivirus software packages • Secure network infrastructure • DNS hardware and software • Virtual private network • Identity services • Encryption • Security management
  • 10. Network security technology : Different mechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text.  Secret Key Cryptography (SKC)
  • 11. • Public Key Cryptography (PKC): • Hash Function: Hash function Plain text Cipher text
  • 12.  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  • 13. ◦ Packet Filtering Firewall ◦ State Full Firewall ◦ ApplicationAware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic.
  • 14.  It is a good level of security between a web browser and a website.  There is a tunnel between them.  Clients present a certificate to the server to prove their identity.
  • 15.  prevention of unauthorized access using wireless networks. Security Policies:  Wireless Intrusion Prevention System(WIPS)  Wireless Intrusion Detection System (WIDS) Implementation: Three components: sensor, server, and console.
  • 16.  It is a short program aiming at securing communication over a network. Example: Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)
  • 17.  Network Security Services (NSS) comprises a set of libraries  It develops security-enabled client and server applications. Some are: Mozilla client products, including Firefox etc Google Chrome Sun server products
  • 18. Hardware Developments  Biometric systems -secure workstation logons  Smart cards -undeniable proof of a user’s identity. Software Developments  Current research develops security software using neural networks.  Objective- use neural networks for the facial recognition software.
  • 19. The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.
  • 20.  The network security field evolve more rapidly to deal with the threats further in the future. “As threats tweaks, Security tremendously Tweaks”