2. Define Network:
A Network is a series of points or nodes
interconnected by communication paths.
Interconnect with other networks and
contain sub networks.
3. Define Security:
Security is “Freedom from risk or danger.“
The ability of a system to protect information
and system resources with respect to
confidentiality and integrity.
4. Network security:
Any activities designed to protect your
network .
Target- variety of threats and stops them from
entering or spreading on your network.
Handled by a network administrator.
6. History:
During the 1980s, the hackers and crimes
were beginning to emerge.
CERT was created to overcome network
security issues.
In the 1990s, Internet became public and the
security concerns increased tremendously.
7. Types:
Five types of network security can aid in secure
networking.
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
8. We need multiple layers of
security
Network security is
accomplished through
hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall
Intrusion prevention systems
Virtual Private Networks
10. Network security technology :
Different mechanisms to deal with these
attacks.
Cryptographic systems:
plaintext is converted in to cipher text.
Secret Key Cryptography (SKC)
11. • Public Key Cryptography (PKC):
• Hash Function:
Hash function
Plain text Cipher text
12. A typical border control mechanism.
Metaphor for network security.
Designed to prevent unauthorized access
to or from a private network.
13. ◦ Packet Filtering Firewall
◦ State Full Firewall
◦ ApplicationAware Firewall etc..
Network-based IDs (NIDS):
The sensor are located at the choke in network
It monitored, it captures all the network traffic
and analyze each packets for malicious traffic.
14. It is a good level of
security between a web
browser and a website.
There is a tunnel
between them.
Clients present a
certificate to the server to
prove their identity.
15. prevention of unauthorized access using wireless
networks.
Security Policies:
Wireless Intrusion Prevention System(WIPS)
Wireless Intrusion Detection System (WIDS)
Implementation:
Three components: sensor, server, and console.
16. It is a short program aiming at securing
communication over a network.
Example:
Transport layer security (TLS)
PPP / Point-to-Point Protocol
Internet Protocols security (IPSec)
17. Network Security Services (NSS) comprises
a set of libraries
It develops security-enabled client and
server applications.
Some are:
Mozilla client products, including Firefox etc
Google Chrome
Sun server products
18. Hardware Developments
Biometric systems -secure workstation
logons
Smart cards -undeniable proof of a user’s
identity.
Software Developments
Current research develops security software
using neural networks.
Objective- use neural networks for the facial
recognition software.
19. The network security will be able to function
as an immune system.
The same set of security technology that is
being used today with some minor
adjustments.
20. The network security field evolve more rapidly to
deal with the threats further in the future.
“As threats tweaks,
Security tremendously Tweaks”