SlideShare a Scribd company logo
1 of 29
NETWORK
SECURITY
Present By:-
Name :- AFAQUE JAYA
Branch :- C.S.E.
Semester :- 5th sem
Roll No :- CSE/12/15
CONTENT• What is NETWORK SECURITY &
why it is important?
• Types of Attacker
• Types of Network Attack?
• Top 10 Cyber Attack Country
• Penalty for Cyber Attack.
• How to be safe and Secure?
What is NETWORK SECURITY?
• Network security is the security provided to a network
from unauthorized access and risk. It is the duty of
Network administrators to adopt preventing measures
to protect their network from Security threats.
• Types of Network Security devices :-
1. Active Devices
2. Passive Devices
3. Preventative Devices e.t.c.
Types of Hacker
White Hat
Grey Hat
Black hat
Types of Attack : -
• HACKING
• ATTRITION :- Method used to Damaged Network and
systems. It include –
1: Distributed Denial Of Attacks(DDOA)
2: Resource Depletion Attacks.
• MALWARE
• TROZON HORSE
• WORM
• SPAM
• PHISHING
• BOTNET
• PACKET SNIFFER
Virus and worm
• A Virus is a “program or piece of code that is loaded
onto your computer without your knowledge and runs
against your wishes .
• Viruses can cause a huge amount of damage to
computers.
• An example of a virus would be if you opened an email
and a malicious piece of code was downloaded onto
your computer causing your computer to freeze.
• Solution: Install a security suite, such as Kaspersky
Total Protection, that protects the computer against
threats such as viruses and worms.
Trozon Horse
• A Trojan Horse is “a program in which malicious or
harmful code is contained inside apparently harmless
programming or data in such a way that it can get
control and do its chosen form of damage, such as
ruining the file allocation table on your hard disk.
• In a network if a Trojan Horse is installed on a
computer and tampers with the file allocation table it
could cause a massive amount of damage to all
computers of that network.
• Solution: Security suites, such as Norton Internet
Security, will prevent you from downloading Trojan
Horses.
SPAM
• SPAM is “flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
.I believe that SPAM wouldn’t be the biggest risk to a
network because even though it may get annoying and
plentiful it still doesn’t destroy any physical elements
of the network.
• Solution: SPAM filters are an effective way to stop
SPAM, these filters come with most of the e-mail
providers online. Also you can buy a variety of SPAM
filters that work effectively.
Phishing
• Phishing is “an e-mail fraud method in which the
perpetrator sends out legitimate-looking emails in an
attempt to gather personal and financial information
from recipients.
• In my opinion phishing is one of the worst security
threats over a network because a lot of people that use
computers linked up to a network are amateurs and
would be very vulnerable to giving out information that
could cause situations such as theft of money or
identity theft.
• Solution: Similar to SPAM use Phishing filters to filter
out this unwanted mail and to prevent threat.
Packet Sniffer
• “A packet sniffer is a device or program that allows
eavesdropping on traffic travelling between networked
computers. The packet sniffer will capture data that is
addressed to other machines, saving it for later
analysis.
• In a network a packet sniffer can filter out personal
information and this can lead to areas such as identity
theft so this is a major security threat to a network.
• Solution: “When strong encryption is used, all packets
are unreadable to any but the destination address,
making packet sniffers useless.So one solution is to
obtain strong encryption.
Zombie Computer & Botnet
• “A zombie computer, or “drone” is a computer
that has been secretly compromised by
hacking tools which allow a third party to
control the computer and its resources
remotely.
• A hacker could hack into a computer and
control the computer and obtain data.
• Solution: Antivirus software can help prevent
zombie computers.
Zombie Computer & Botnet
• A botnet “is a number of Internet computers that,
although their owners are unaware of it, have
been set up to forward transmissions (including
spam or viruses) to other computers on the
internet.
• This is a major security threat on a network
because the network, unknown to anyone, could
be acting as a hub that forwards malicious files
etc to other computers.
• Solution: Network Intrusion Prevention (NIP)
systems can help prevent botnets.
Protecting Critical
Information Infrastructure
Critical information infrastructure is the
backbone of a country’s national and economic
security. It includes power plants, highways,
bridges, chemical plants, networks, as well as
the buildings where millions of people work
every day. These can be secured with stringent
collaboration plans and disciplined
implementations.
FIREWALL
Types of FIREWALL
• PACKET FILTERRING FIREWALL
• APPLICATION/PROXY FIREWALL
• HYBRID FIREWALL
PASSWORD DISCOVERY TABLE
List of Blocked Website In INDIA : -
While Opening BLOCKED Page
Way to Hide IP : -
WANACRY Attack
Punishments For Cyber Crime :-
The World (05) Biggest
Cyber Crime
0
5
10
15
20
25
30
AMERICA CHINA BRAZIL INDIA GERMANY
2017
2017
How to be safe and secure
• Keep updated
• Keep a paid anti-virus and keep it up to date
• Don’t go to unknown link
• Keep your fire wall on
• Quantum computing
NETWORK SECURITYT SOFTWARE
• Malwarebytes
• Kaspersky endpoint security
• SolarWinds RMM
• Norton Security
• Splunk
• Black Duck hub
CONCLUSION
• Network Security is a very broad field and
being a Network Security manager is not an
easy job.
• There are still threats such as password
attacks that have no prevention.
• Many of the threats set out to get personal
information.
References
• https://www.csoonline.com/category/hacking
/
• https://www.youtube.com/watch?v=Y3fYULVI
ZR0
• Latest update about any type of ransomeware
or vulnaribility http://www.cert-in.org.in/

More Related Content

What's hot

Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Network security
Network securityNetwork security
Network securityfatimasaham
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Network Security
Network Security Network Security
Network Security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Network security
Network securityNetwork security
Network security
 

Similar to Network Security Presentation on Types of Attacks and Defenses

Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Complete notes security
Complete notes securityComplete notes security
Complete notes securityKitkat Emoo
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Network security
Network securityNetwork security
Network securityhajra azam
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 

Similar to Network Security Presentation on Types of Attacks and Defenses (20)

Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Security
SecuritySecurity
Security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Brooks18
Brooks18Brooks18
Brooks18
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
презентация1
презентация1презентация1
презентация1
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Network security
Network securityNetwork security
Network security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 

Recently uploaded

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 

Recently uploaded (20)

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

Network Security Presentation on Types of Attacks and Defenses

  • 1. NETWORK SECURITY Present By:- Name :- AFAQUE JAYA Branch :- C.S.E. Semester :- 5th sem Roll No :- CSE/12/15
  • 2. CONTENT• What is NETWORK SECURITY & why it is important? • Types of Attacker • Types of Network Attack? • Top 10 Cyber Attack Country • Penalty for Cyber Attack. • How to be safe and Secure?
  • 3. What is NETWORK SECURITY? • Network security is the security provided to a network from unauthorized access and risk. It is the duty of Network administrators to adopt preventing measures to protect their network from Security threats. • Types of Network Security devices :- 1. Active Devices 2. Passive Devices 3. Preventative Devices e.t.c.
  • 4. Types of Hacker White Hat Grey Hat Black hat
  • 5. Types of Attack : - • HACKING • ATTRITION :- Method used to Damaged Network and systems. It include – 1: Distributed Denial Of Attacks(DDOA) 2: Resource Depletion Attacks. • MALWARE • TROZON HORSE • WORM • SPAM • PHISHING • BOTNET • PACKET SNIFFER
  • 6. Virus and worm • A Virus is a “program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes . • Viruses can cause a huge amount of damage to computers. • An example of a virus would be if you opened an email and a malicious piece of code was downloaded onto your computer causing your computer to freeze. • Solution: Install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms.
  • 7. Trozon Horse • A Trojan Horse is “a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. • In a network if a Trojan Horse is installed on a computer and tampers with the file allocation table it could cause a massive amount of damage to all computers of that network. • Solution: Security suites, such as Norton Internet Security, will prevent you from downloading Trojan Horses.
  • 8. SPAM • SPAM is “flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. .I believe that SPAM wouldn’t be the biggest risk to a network because even though it may get annoying and plentiful it still doesn’t destroy any physical elements of the network. • Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of the e-mail providers online. Also you can buy a variety of SPAM filters that work effectively.
  • 9. Phishing • Phishing is “an e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. • In my opinion phishing is one of the worst security threats over a network because a lot of people that use computers linked up to a network are amateurs and would be very vulnerable to giving out information that could cause situations such as theft of money or identity theft. • Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent threat.
  • 10. Packet Sniffer • “A packet sniffer is a device or program that allows eavesdropping on traffic travelling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis. • In a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft so this is a major security threat to a network. • Solution: “When strong encryption is used, all packets are unreadable to any but the destination address, making packet sniffers useless.So one solution is to obtain strong encryption.
  • 11. Zombie Computer & Botnet • “A zombie computer, or “drone” is a computer that has been secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely. • A hacker could hack into a computer and control the computer and obtain data. • Solution: Antivirus software can help prevent zombie computers.
  • 12. Zombie Computer & Botnet • A botnet “is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the internet. • This is a major security threat on a network because the network, unknown to anyone, could be acting as a hub that forwards malicious files etc to other computers. • Solution: Network Intrusion Prevention (NIP) systems can help prevent botnets.
  • 13. Protecting Critical Information Infrastructure Critical information infrastructure is the backbone of a country’s national and economic security. It includes power plants, highways, bridges, chemical plants, networks, as well as the buildings where millions of people work every day. These can be secured with stringent collaboration plans and disciplined implementations.
  • 15. Types of FIREWALL • PACKET FILTERRING FIREWALL • APPLICATION/PROXY FIREWALL • HYBRID FIREWALL
  • 16.
  • 18. List of Blocked Website In INDIA : -
  • 20.
  • 21. Way to Hide IP : -
  • 22.
  • 25. The World (05) Biggest Cyber Crime 0 5 10 15 20 25 30 AMERICA CHINA BRAZIL INDIA GERMANY 2017 2017
  • 26. How to be safe and secure • Keep updated • Keep a paid anti-virus and keep it up to date • Don’t go to unknown link • Keep your fire wall on • Quantum computing
  • 27. NETWORK SECURITYT SOFTWARE • Malwarebytes • Kaspersky endpoint security • SolarWinds RMM • Norton Security • Splunk • Black Duck hub
  • 28. CONCLUSION • Network Security is a very broad field and being a Network Security manager is not an easy job. • There are still threats such as password attacks that have no prevention. • Many of the threats set out to get personal information.
  • 29. References • https://www.csoonline.com/category/hacking / • https://www.youtube.com/watch?v=Y3fYULVI ZR0 • Latest update about any type of ransomeware or vulnaribility http://www.cert-in.org.in/