SlideShare uma empresa Scribd logo
1 de 25
DEPARTMENT OF MICROBIOLOGY
     AND BIOTECNOLOGY




                  PRESENTED BY
                  SAPNA KUMARI
               I MSc ( MICROBIOLOGY)
NETWORK SECURITY
 It is the control of unwanted intrusion into or damage to
communications on our organizations computer network.

 It supports essential communications which are necessary to the
organizations mission and goals.

 It includes elements that prevent unwanted activities while
supporting desirable activities.

 It involves the authorization of access to data in a network which
is controlled by the network administrator.

It involved in organizations , enterprises and other types of
institutions.
SECURITY OBJECTIVES
  Confidentiality

  Integrity

  Authentication

  Authorization

  Non repudiation

  Availability

  Privacy
GOALS OF NETWORK SECURITY
 Ensures the confidentiality of resources


 Protect the integrity of data


 Maintain availability of the IT infrastructure


 Ensure the privacy of personally identifiable data


 Enforces access control


 Monitor the IT environment for violations of policy
GROUP POLICY
 It is the feature of the Microsoft windows NT family of operating
systems.

 It controls the working environment of user accounts and
computer accounts.

 It provides the centralized management and configuration of
operating systems, applications and users settings in an ACTIVE
DIRECTORY environment.

It controls what users can and cannot do on a computer.
TYPES OF GROUP POLICY
  Account policies
  Local policies
  Event log
  Restricted groups
  Systems services
  Registry
  File system
  Public key policies
  Internet protocol security policies
TYPES OF GROUP POLICY( cont’d)
ACCOUNT POLICIES
   Account policies are the first subcategory of security settings.
 The account policies include :
•   Password policy
•   Account lock out policy


LOCAL POLICIES
   It is the second subcategory of security policy. It includes
 security settings.
EVENT LOG POLICIES
     It is used to control the settings of the application , system
and security event logs on local computers.

RESTRICTED GROUPS

        It contain a list of members of specific groups whose
membership are defined centrally as part of the security policy.
It can be used to manage membership in the built in groups.

SYSTEMS SERVICES POLICIES

      It offer a mechanism for potential exploitation by
intruders who can take over the services or use the services as an
entry point to gain access to computers and computer network
resources.
REGISTRY
   It is used to configure security and control security auditing for registry keys
and their subkeys.

FILE SYSTEM

   It is used to configure the security for files and folders . It control security
auditing of files and folders.


PUBLIC KEY POLICIES

  It add a new encrypted data recovery agent and set up automatic certificate
requests. It can also manage the lists of trusted certification authorities.
IP SECURITY POLICIES ON ACTIVE DIRECTORY
   It tell the server how to respond to a request for IPsec communications .
The server might require secure communication, permit secure
communication, or communicate without using Ipsec.
OSI Reference Model
 Consists of seven layers.

 Each layer provides a set of functions to the layers above and relies on
  the functions provided by the layers below.

 Each layer communicates with its peer layer on the other node
  (protocols).

 The layer boundaries (interfaces) should be designed in such a way as to
  minimize the information flow between the boundaries .

 The main idea is to have independent standards for different layers so
  that changes to one would not cause changes in other layers.
OSI Reference Model (cont’d)
LAYER 7 : APPLICATION LAYER

       It is the user interface to your computer or programs.
Eg: word processor , e-mail application etc.

LAYER 6 : PRESENTATION LAYER

       It acts as the translator between systems, converting application
layer information to a common format understandable by different
systems.

LAYER 5 : SESSION LAYER

    It manages the connections or service requests between
computers.

LAYER 4 : TRANSPORT LAYER

      It prepares data for delivery to the network.
LAYER 3 : NETWORK LAYER

      It is where IP addressing and routing happen. Data at this layer is
considered a “ packet” .

LAYER 2 : DATA LINK LAYER

    It handles the reliable sending of information. Media access control is a
component of layer 2. Data at this layer would be reffered to as a “FRAME”.

LAYER 1 : PHYSICAL LAYER

       It is composed of the objects that you can see and some that you cannot
, such as electrical characteristics.
A firewall :                            Internet

  Acts as a security gateway
  between two networks
                                                   “Allow Traffic
                                                   Corporate Network
     Usually between trusted                        to Internet”
                                                   Gateway
     and untrusted networks
     (such    as  between    a
     corporate network and the
     Internet)

     Decides       whether      to
     pass, reject, encrypt, or log   Corporate
     communications (Access          Site
     Control)
Why Firewalls are Needed

 Prevent attacks from untrusted
  networks

 Protect data integrity of critical
  information

 Preserve customer and partner
  confidence
Evolution of Firewalls
                             Stateful
                           Inspection
                                        teful
             Application
               Proxy




   Packet
    Filter
TYPES OF FIREWALLS

   PACKET FILTERS

  APPLICATION LAYER GATEWAYS

  STATEFUL INSPECTION
PACKET FILTER
 The first paper on firewall was published in 1988.

 This was the first generation of highly involved and technical internet
security.

 It was developed by BILL CHESWICK AND STEVE BELLOVIN.

 It act by inspecting the “PACKET” which transfer between computers on the
internet.

 If a packet matches the filters set of rules, the packet filter will drop or
reject the packet.

 It work mainly first 3 layers of the OSI model, which means most of the
work is done between the network and the physical layer.

 It is the simplest type of firewalls.
APPLICATION PROXY
It is called as also known as PROXY FEREWALL.

The key benefit of the application layer filtering is that it can “
understand” certain applications and protocols( SUCH AS WEB
BROWSING).

It can detect if an unwanted protocol is sneaking through on a non
standard port or if a protocol is being abused in any harmful way.

It mainly works on layer 7 of the OSI model.

When a connection comes into an application gateway, the firewall
completes the connection and creates a new connection from the firewall
to the final destination . In a sense , a true proxy doesnot route network
traffic. It buffers traffic, modifies the data , if necessary then sends the
data to the destination.
STATEFUL INSPECTION
It was developed in 1989- 1990.

It was developed by DAVE PRESSETTO, JANARDAN SHARMA AND KSHITY
NIGAM.

It is also called as CIRCUIT LEVEL FIREWALLS.

It work upto layer 4 of OSI model( transport layer).

It used to record all the connection passing through it and determines whether
a packet is the start of the new connection, a part of an existing connection or
not a part of any connection.

It allows the firewall to have a complete application awarness without breaking
the client / server model.
Firewalls and Proxy Servers
LIMITATION OF FIREWALLS
 It cant protect the attacks that don’t go through the firewall.


 It cannot protect the morons which are present inside the network.


 Firewall policies must be realistic and reflect the level of security in the
  entire network.

 It has no concept of the value or sensitivity of the data ,it is transferring
  between networks and therefore,it cannot protect information on that
  basis.
CONCLUSION
 Network security is the ongoing process of
 maintaining the privacy of data that should
 remain private.

 Group policy contains the goals, objectives and
 standards for security activities.

 A firewall is a network security product that acts
 as a barrier between two or more network
 segments.
network security, group policy and firewalls

Mais conteúdo relacionado

Mais procurados

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
FIREWALL
FIREWALL FIREWALL
FIREWALL Akash R
 
Cloning vectors based on m13 and lambda bacteriophage
Cloning vectors based on m13 and lambda bacteriophageCloning vectors based on m13 and lambda bacteriophage
Cloning vectors based on m13 and lambda bacteriophageRashmi Rawat
 
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...UzairAhmad81
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networksPositiveTechnologies
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 

Mais procurados (20)

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Network security
Network securityNetwork security
Network security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall
FirewallFirewall
Firewall
 
Cloning vectors based on m13 and lambda bacteriophage
Cloning vectors based on m13 and lambda bacteriophageCloning vectors based on m13 and lambda bacteriophage
Cloning vectors based on m13 and lambda bacteriophage
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Network security
Network security Network security
Network security
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 

Destaque

Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLNoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLDATAVERSITY
 
Research data policy
Research data policyResearch data policy
Research data policySarah Jones
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionDavid Lapsley
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsGiuseppe Paterno'
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 

Destaque (20)

Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLNoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
 
Research data policy
Research data policyResearch data policy
Research data policy
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups Session
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Dmz
DmzDmz
Dmz
 
Dmz
Dmz Dmz
Dmz
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 

Semelhante a network security, group policy and firewalls

CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxsaad504633
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...IJNSA Journal
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...IJNSA Journal
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?ezoicxcom
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?haq107457
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxBluechipComputerSyst
 

Semelhante a network security, group policy and firewalls (20)

CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Web security
Web securityWeb security
Web security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 

Último

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

network security, group policy and firewalls

  • 1. DEPARTMENT OF MICROBIOLOGY AND BIOTECNOLOGY PRESENTED BY SAPNA KUMARI I MSc ( MICROBIOLOGY)
  • 2. NETWORK SECURITY  It is the control of unwanted intrusion into or damage to communications on our organizations computer network.  It supports essential communications which are necessary to the organizations mission and goals.  It includes elements that prevent unwanted activities while supporting desirable activities.  It involves the authorization of access to data in a network which is controlled by the network administrator. It involved in organizations , enterprises and other types of institutions.
  • 3. SECURITY OBJECTIVES  Confidentiality  Integrity  Authentication  Authorization  Non repudiation  Availability  Privacy
  • 4. GOALS OF NETWORK SECURITY  Ensures the confidentiality of resources  Protect the integrity of data  Maintain availability of the IT infrastructure  Ensure the privacy of personally identifiable data  Enforces access control  Monitor the IT environment for violations of policy
  • 5. GROUP POLICY  It is the feature of the Microsoft windows NT family of operating systems.  It controls the working environment of user accounts and computer accounts.  It provides the centralized management and configuration of operating systems, applications and users settings in an ACTIVE DIRECTORY environment. It controls what users can and cannot do on a computer.
  • 6. TYPES OF GROUP POLICY  Account policies  Local policies  Event log  Restricted groups  Systems services  Registry  File system  Public key policies  Internet protocol security policies
  • 7. TYPES OF GROUP POLICY( cont’d) ACCOUNT POLICIES Account policies are the first subcategory of security settings. The account policies include : • Password policy • Account lock out policy LOCAL POLICIES It is the second subcategory of security policy. It includes security settings.
  • 8. EVENT LOG POLICIES It is used to control the settings of the application , system and security event logs on local computers. RESTRICTED GROUPS It contain a list of members of specific groups whose membership are defined centrally as part of the security policy. It can be used to manage membership in the built in groups. SYSTEMS SERVICES POLICIES It offer a mechanism for potential exploitation by intruders who can take over the services or use the services as an entry point to gain access to computers and computer network resources.
  • 9. REGISTRY It is used to configure security and control security auditing for registry keys and their subkeys. FILE SYSTEM It is used to configure the security for files and folders . It control security auditing of files and folders. PUBLIC KEY POLICIES It add a new encrypted data recovery agent and set up automatic certificate requests. It can also manage the lists of trusted certification authorities.
  • 10. IP SECURITY POLICIES ON ACTIVE DIRECTORY It tell the server how to respond to a request for IPsec communications . The server might require secure communication, permit secure communication, or communicate without using Ipsec.
  • 11. OSI Reference Model  Consists of seven layers.  Each layer provides a set of functions to the layers above and relies on the functions provided by the layers below.  Each layer communicates with its peer layer on the other node (protocols).  The layer boundaries (interfaces) should be designed in such a way as to minimize the information flow between the boundaries .  The main idea is to have independent standards for different layers so that changes to one would not cause changes in other layers.
  • 12. OSI Reference Model (cont’d)
  • 13. LAYER 7 : APPLICATION LAYER It is the user interface to your computer or programs. Eg: word processor , e-mail application etc. LAYER 6 : PRESENTATION LAYER It acts as the translator between systems, converting application layer information to a common format understandable by different systems. LAYER 5 : SESSION LAYER It manages the connections or service requests between computers. LAYER 4 : TRANSPORT LAYER It prepares data for delivery to the network.
  • 14. LAYER 3 : NETWORK LAYER It is where IP addressing and routing happen. Data at this layer is considered a “ packet” . LAYER 2 : DATA LINK LAYER It handles the reliable sending of information. Media access control is a component of layer 2. Data at this layer would be reffered to as a “FRAME”. LAYER 1 : PHYSICAL LAYER It is composed of the objects that you can see and some that you cannot , such as electrical characteristics.
  • 15. A firewall : Internet Acts as a security gateway between two networks “Allow Traffic Corporate Network Usually between trusted to Internet” Gateway and untrusted networks (such as between a corporate network and the Internet) Decides whether to pass, reject, encrypt, or log Corporate communications (Access Site Control)
  • 16. Why Firewalls are Needed  Prevent attacks from untrusted networks  Protect data integrity of critical information  Preserve customer and partner confidence
  • 17. Evolution of Firewalls Stateful Inspection teful Application Proxy Packet Filter
  • 18. TYPES OF FIREWALLS  PACKET FILTERS APPLICATION LAYER GATEWAYS STATEFUL INSPECTION
  • 19. PACKET FILTER  The first paper on firewall was published in 1988.  This was the first generation of highly involved and technical internet security.  It was developed by BILL CHESWICK AND STEVE BELLOVIN.  It act by inspecting the “PACKET” which transfer between computers on the internet.  If a packet matches the filters set of rules, the packet filter will drop or reject the packet.  It work mainly first 3 layers of the OSI model, which means most of the work is done between the network and the physical layer.  It is the simplest type of firewalls.
  • 20. APPLICATION PROXY It is called as also known as PROXY FEREWALL. The key benefit of the application layer filtering is that it can “ understand” certain applications and protocols( SUCH AS WEB BROWSING). It can detect if an unwanted protocol is sneaking through on a non standard port or if a protocol is being abused in any harmful way. It mainly works on layer 7 of the OSI model. When a connection comes into an application gateway, the firewall completes the connection and creates a new connection from the firewall to the final destination . In a sense , a true proxy doesnot route network traffic. It buffers traffic, modifies the data , if necessary then sends the data to the destination.
  • 21. STATEFUL INSPECTION It was developed in 1989- 1990. It was developed by DAVE PRESSETTO, JANARDAN SHARMA AND KSHITY NIGAM. It is also called as CIRCUIT LEVEL FIREWALLS. It work upto layer 4 of OSI model( transport layer). It used to record all the connection passing through it and determines whether a packet is the start of the new connection, a part of an existing connection or not a part of any connection. It allows the firewall to have a complete application awarness without breaking the client / server model.
  • 23. LIMITATION OF FIREWALLS  It cant protect the attacks that don’t go through the firewall.  It cannot protect the morons which are present inside the network.  Firewall policies must be realistic and reflect the level of security in the entire network.  It has no concept of the value or sensitivity of the data ,it is transferring between networks and therefore,it cannot protect information on that basis.
  • 24. CONCLUSION  Network security is the ongoing process of maintaining the privacy of data that should remain private.  Group policy contains the goals, objectives and standards for security activities.  A firewall is a network security product that acts as a barrier between two or more network segments.