SlideShare uma empresa Scribd logo
1 de 18
Network Security
Present by Khoa.NK
Common technics
Eavesdropping
- Put devices and/or softwares in middle layer
- Easier in wireless network
- No-way to prevent in the public networks
- Encrypt data
Common technics
Cryptanalysis
- Find information from encrypted data
- Use math methodology and high
performance machines
- Encrypt data with un-structure algorithm
- Use complex password for route-force attack
Common technics
Password Pilfering
- Guessing
- Social engineering
- Dictionary
- Password sniffing
Common technics
Guessing: 10 passwords most common in the
world by PC Magazine)
Password 123456 qwerty abc123 letmein
monkey myspace1 password1 blink182 (the
user's own first name)
Common technics
Social engineering: use social skill to find
information
- impersonate
- physing via email, website
Common technics
Identity Spoofing
Common technics
Buffer-overflow
- strcat(), strcpy(), sprintf(), vsprintf(), bcopy(),
get(), scanf(),..
Common technics
DoS and DDoS
- Type
- Smurf
- Buffer Overflow attack
- Ping of dead
- SYN attack
Tools: Jolt2, Bubonic.c, Land and LaTierra,
Targa, Blast20, Crazy Pinger, Some Trouble,...
Common technics
Malicious Softwares
- Virus
- Worms
- Trojan
- Logic bomb
- Backdoor
- Spyware
- Keylogger
Encryption
- plaintext
- cyphertext
- key
c = E(m, k)
m = D(c, k)
Network security - Basic concepts
Network security - Basic concepts
Network security - Basic concepts
Network security - Basic concepts
Network security - Basic concepts
Network security - Basic concepts
Network security - Basic concepts

Mais conteúdo relacionado

Mais procurados

Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
 

Mais procurados (20)

Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Information security
Information securityInformation security
Information security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security
Network securityNetwork security
Network security
 
Botnets
BotnetsBotnets
Botnets
 
Cyber security
Cyber securityCyber security
Cyber security
 
Networking Fundamental Course by Haris Chughtai
Networking Fundamental Course by Haris ChughtaiNetworking Fundamental Course by Haris Chughtai
Networking Fundamental Course by Haris Chughtai
 
Adware
AdwareAdware
Adware
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
Network Security
Network Security Network Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network security Network security
Network security
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Firewall
FirewallFirewall
Firewall
 

Destaque

Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
pinkutinku26
 

Destaque (20)

Network security
Network securityNetwork security
Network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
 
Network Security
Network SecurityNetwork Security
Network Security
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Party pronto pres new
Party pronto pres newParty pronto pres new
Party pronto pres new
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas
 
E securty
E securtyE securty
E securty
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 

Semelhante a Network security - Basic concepts

Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4
nayamat32
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
Iszamli Jailani
 
Backtrack
BacktrackBacktrack
Backtrack
oa Đi
 

Semelhante a Network security - Basic concepts (20)

Super1
Super1Super1
Super1
 
Hacking
Hacking Hacking
Hacking
 
Network security
Network securityNetwork security
Network security
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
 
Backtrack
BacktrackBacktrack
Backtrack
 
Network security
Network securityNetwork security
Network security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
 
Presentation1
Presentation1Presentation1
Presentation1
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 

Mais de Khoa Nguyen (6)

Coding convention
Coding conventionCoding convention
Coding convention
 
Web application attack Presentation
Web application attack PresentationWeb application attack Presentation
Web application attack Presentation
 
Network security (Mã hóa hiện đại)
Network security (Mã hóa hiện đại)Network security (Mã hóa hiện đại)
Network security (Mã hóa hiện đại)
 
Network fundamental presentation
Network fundamental presentationNetwork fundamental presentation
Network fundamental presentation
 
Hibernate Basic Concepts - Presentation
Hibernate Basic Concepts - PresentationHibernate Basic Concepts - Presentation
Hibernate Basic Concepts - Presentation
 
Bible app on android
Bible app on androidBible app on android
Bible app on android
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Network security - Basic concepts