SlideShare uma empresa Scribd logo
1 de 15
Network
&
Information
Security
DEFINITION
◈ The protection of information and its elements including
systems, hardware that use, store and transmit the information.
◈ Computer facilities have been physically protected for three
reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
PRINCIPLES OF COMPUTER SECURITY
◈ Guarantee data CONFIDENT
◈Protect the information INTEGRITY
◈ Assure resources AVAILABILITY
Ensuring that information is
accessible only to those authorized
to have access
Safeguarding the accuracy and
completeness of information and
processing methods
Ensuring that authorized users
have access to information and
associated assets when required
PASSIVE Attacks
◈Passive attack attempts to learn
or make use of information from
the system but does not affect
system resources.
◈Two types of passive attacks are
release of message contents and
traffic analysis.
NETWORK SECURITY THREATS
ACTIVE Attacks
◈ Active attacks involve some
modification of the data stream
or the creation of a false stream
and can be subdivided into four
categories : masquerade , replay,
modification of messages, and
denial of service.
1
PASSIVE Attacks
2
ACTIVE Attacks
VULNERABILITIES
◈Malicious Software
🔨
 Trap Doors
 Logic Bomb
 Trojan Horses
 Viruses
 Worms & Bacteria
Malicious Software
◈ Software deliberately designed to harm computer systems.
◈ Malicious software program causes undesired actions in
information systems.
◈ Spreads from one system to another through:
1. E-mail (through attachments)
2. Infected Pen drives
3. Downloading / Exchanging of corrupted files
4. Embedded into computer games
🔨
Trap Doors
◈ Secret undocumented entry point to the program.
 An example of such feature is so called back door, which enables
intrusion to the target by passing user authentication methods.
 A hole in the security of a system deliberately left in place by
designers or maintainers.
 Trapdoor allows unauthorized access to the system.
 Only purpose of a trap door is to "bypass" internal controls. It is up
to the attacker to determine how this circumvention of control can be
utilized for his benefit.
Logic Bomb
◈ A logic bomb is a piece of code intentionally inserted into a
software system that will set off a malicious function when specified
conditions are met.
◈Piggybacking: Many viruses, worms, and other code that are
malicious in nature, often carry a logic bomb that “detonates” under
given conditions. This may help the code on it’s journey as it worms
through your system undetected.
💣
Trojan Horse
◈ This is a malicious program with unexpected additional
functionality. It includes harmful features of which the user is not
aware.
Perform a different function than what these are advertised to do
(some malicious action e.g., steal the passwords).
Infects when user installs and executes infected programs.
Some types of Trojan horses include Remote Access Trojans (RAT),
Key Loggers, Password-Stealers (PSW), and logic bombs.
Virus
◈ These are the programs that spread to other software in the
system .i.e., program that incorporates copies of itself into other
programs.
Two major categories of viruses:
1. Boot sector virus : infect boot sector of systems.
become resident.
activate while booting machine
2. File virus : infects program files.
activates when program is run.
Worm /Bacteria
◈ Computer worms are similar to viruses in that they replicate
functional copies of themselves and can cause the same type of
damage.
◈ In contrast to viruses, which require the spreading of an infected
host file, worms are standalone software and do not require a host
program or human help to propagate.
◈ worm is faster than virus. E.g. The code red worm affected 3 lack
PCs in just 14 Hrs.
Preventing infection by malicious software
Use only trusted software, not pirated software.
Regularly take backup of the programs.
Use anti-virus software to detect and remove viruses.
Update virus database frequently to get new virus signatures.
Install firewall software, which hampers or prevents the functionality of
worms and Trojan horses.
Make sure that the e-mail attachments are secure.
Thank
you !

Mais conteúdo relacionado

Mais procurados

Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Mais procurados (20)

Application security
Application securityApplication security
Application security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Information security
Information securityInformation security
Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Spoofing
SpoofingSpoofing
Spoofing
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
cyber security
cyber securitycyber security
cyber security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Semelhante a Basics of Network Security

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 

Semelhante a Basics of Network Security (20)

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Unit 7
Unit 7Unit 7
Unit 7
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Computer security
Computer securityComputer security
Computer security
 
Mitppt
MitpptMitppt
Mitppt
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Malicious
MaliciousMalicious
Malicious
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdf
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Mais de Dushyant Singh

Mais de Dushyant Singh (9)

Traditional shopping (offline shop)
Traditional shopping (offline shop)Traditional shopping (offline shop)
Traditional shopping (offline shop)
 
Apache Hadoop Architecture (2016-17)
Apache Hadoop Architecture (2016-17)Apache Hadoop Architecture (2016-17)
Apache Hadoop Architecture (2016-17)
 
Technology impact on learning
Technology impact on learning Technology impact on learning
Technology impact on learning
 
How ICT causing pollution in our environment
How ICT causing pollution in our environment How ICT causing pollution in our environment
How ICT causing pollution in our environment
 
Visualization in 4th dimension ( The 4D concept)
 Visualization in 4th dimension ( The 4D concept)  Visualization in 4th dimension ( The 4D concept)
Visualization in 4th dimension ( The 4D concept)
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
E-voting
E-votingE-voting
E-voting
 
Blue Brain Project
Blue Brain Project Blue Brain Project
Blue Brain Project
 
Types of computers
Types of computers Types of computers
Types of computers
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Último (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

Basics of Network Security

  • 2. DEFINITION ◈ The protection of information and its elements including systems, hardware that use, store and transmit the information. ◈ Computer facilities have been physically protected for three reasons: • To prevent theft of or damage to the hardware • To prevent theft of or damage to the information • To prevent disruption of service
  • 3. PRINCIPLES OF COMPUTER SECURITY ◈ Guarantee data CONFIDENT ◈Protect the information INTEGRITY ◈ Assure resources AVAILABILITY Ensuring that information is accessible only to those authorized to have access Safeguarding the accuracy and completeness of information and processing methods Ensuring that authorized users have access to information and associated assets when required
  • 4. PASSIVE Attacks ◈Passive attack attempts to learn or make use of information from the system but does not affect system resources. ◈Two types of passive attacks are release of message contents and traffic analysis. NETWORK SECURITY THREATS ACTIVE Attacks ◈ Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.
  • 7. VULNERABILITIES ◈Malicious Software 🔨  Trap Doors  Logic Bomb  Trojan Horses  Viruses  Worms & Bacteria
  • 8. Malicious Software ◈ Software deliberately designed to harm computer systems. ◈ Malicious software program causes undesired actions in information systems. ◈ Spreads from one system to another through: 1. E-mail (through attachments) 2. Infected Pen drives 3. Downloading / Exchanging of corrupted files 4. Embedded into computer games 🔨
  • 9. Trap Doors ◈ Secret undocumented entry point to the program.  An example of such feature is so called back door, which enables intrusion to the target by passing user authentication methods.  A hole in the security of a system deliberately left in place by designers or maintainers.  Trapdoor allows unauthorized access to the system.  Only purpose of a trap door is to "bypass" internal controls. It is up to the attacker to determine how this circumvention of control can be utilized for his benefit.
  • 10. Logic Bomb ◈ A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. ◈Piggybacking: Many viruses, worms, and other code that are malicious in nature, often carry a logic bomb that “detonates” under given conditions. This may help the code on it’s journey as it worms through your system undetected. 💣
  • 11. Trojan Horse ◈ This is a malicious program with unexpected additional functionality. It includes harmful features of which the user is not aware. Perform a different function than what these are advertised to do (some malicious action e.g., steal the passwords). Infects when user installs and executes infected programs. Some types of Trojan horses include Remote Access Trojans (RAT), Key Loggers, Password-Stealers (PSW), and logic bombs.
  • 12. Virus ◈ These are the programs that spread to other software in the system .i.e., program that incorporates copies of itself into other programs. Two major categories of viruses: 1. Boot sector virus : infect boot sector of systems. become resident. activate while booting machine 2. File virus : infects program files. activates when program is run.
  • 13. Worm /Bacteria ◈ Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. ◈ In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. ◈ worm is faster than virus. E.g. The code red worm affected 3 lack PCs in just 14 Hrs.
  • 14. Preventing infection by malicious software Use only trusted software, not pirated software. Regularly take backup of the programs. Use anti-virus software to detect and remove viruses. Update virus database frequently to get new virus signatures. Install firewall software, which hampers or prevents the functionality of worms and Trojan horses. Make sure that the e-mail attachments are secure.