SlideShare una empresa de Scribd logo
1 de 19
SUBMITTED BY-
Himanshu Varshneya
B.Tech.-IT(VIII Semester)
  IIMET, Jaipur
 What is security

 Why do we need security

 Basic Terminology

 Security Management

 Attacks

 Others Securities

 Wireless Security

 Firewall

 Virtual Private Network
 Freedom from risk or danger; safety.

 Freedom from doubt, anxiety, or fear; confidence.

 Information Security -

    Information security = confidentiality + integrity +
                availability + authentication
 Authorization of access to data in a network, which is

  controlled by the network administrator.
 To prevent and monitor unauthorized
  access, misuse, modification, or denial of a computer
  network and network-accessible resources.
 Protect vital information while still allowing access to those
  who need it.
 Provide authentication and access control for resource.

 Guarantee availability of resources.

 To prevent malicious attacks from hacking and spamming
 Identification

 Authentication

 Access Control (Authorization)

 Confidentiality

 Integrity

 Nonrepudiation

 Availability
 Homes & Small Businesses

        Basic Firewall , Basic Antivirus software, Passwords for all accounts.

 Medium businesses

       Strong Firewall, Internet Security Software, Virtual Private Network.

 Large businesses

       Strong Firewall and Proxy, Strong Antivirus software, Physical Security
        Management

 Large government

       Strong Firewall and Proxy, Strong Encryption, Whitelist authorized
        wireless connection
 Passive Attacks
     Wiretapping

     Port scanner

     Idle scan

   Active Attacks
     Denial-of-service attack

     Spoofing

     Man in the middle

     ARP poisoning

     Smurf attack

     Buffer overflow

     Heap overflow

     Format string attack

     SQL injection
 Cloud computing security
      A set of policies, technologies, and controls to protect data,
      applications.
 Crime ware
      A class of malware designed specifically to automate cybercrime.

 Cyber security standards
     ISO/IEC 27002
    IT Baseline Protection Catalogs
 Data loss prevention
      Information Leak Detection and Prevention (ILDP)
      Information Leak Prevention (ILP)
      Content Monitoring and Filtering (CMF)
      Information Protection and Control (IPC)
 Wireless security is the prevention of unauthorized access or
  damage to computers using wireless networks.
 WLAN uses spread-spectrum or OFDM modulation technology
 wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi
  Protected Access (WPA)
 Wireless Intrusion Prevention Systems (WIPS) or Wireless
  Intrusion Detection Systems (WIDS) common used technique.

    Ad-hoc networks
    Non-traditional networks
    Man-in-the-middle attacks
    Denial of service
Independent Topology



      BSS



                                  BSS




                 Ad-hoc network
 Infrastructure topology using multiple

                        BSS




                                                 AP: Access Point
                         AP


            AP                             AP




                                           BSS
           BSS
                      wired network
 Effective means of protection a local system or network of
  systems from network-based security threats while
  affording access to the outside world via WAN`s or the
  Internet.



 Aims:
   Establish a controlled link
   Protect the premises network from Internet-based attacks
   Provide a single choke point
 Design goals:


   All traffic from inside to outside must pass through the
    firewall (physically blocking all access to the local
    network except via the firewall)

   Only authorized traffic (defined by the local security
    police) will be allowed to pass
 Three common types of Firewalls:
   Packet-filtering routers
      Applies a set of rules to each incoming IP packet and then forwards
       or discards the packet
      Filter packets going in both directions, policies (discard or forward)
   Application-level gateways
      Also called proxy server
      Acts as a relay of application-level traffic

   Circuit-level gateways
      Specialized function performed by an Application-level Gateway
      Sets up two TCP connections

   (Bastion host)
      The bastion host serves as a platform for an application-level or
       circuit-level gateway
 A VPN is a means of transporting traffic in a secure manner
  over an unsecured network.
 A VPN usually achieves this by employing some
  combination of encryption, authentication, and tunneling.
 "Tunneling" (encapsulation) refers to the process of
  encapsulating or embedding one network protocol to be
  carried within the packets of a second network.

   Point-to-Point Tunneling Protocol (PPTP);
   Layer 2 Tunneling Protocol (L2TP);
   Internet Protocol Security (IPSec);
   SOCKS.
Network security

Más contenido relacionado

La actualidad más candente

Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 

La actualidad más candente (20)

Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Network security
Network securityNetwork security
Network security
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Ch01
Ch01Ch01
Ch01
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network security
 Network security Network security
Network security
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 

Destacado (6)

Presentación de economía
Presentación de economía Presentación de economía
Presentación de economía
 
Oprincipemaquiavel
OprincipemaquiavelOprincipemaquiavel
Oprincipemaquiavel
 
U arq2014 1-leopoldo_plentz_lilianmartins
U arq2014 1-leopoldo_plentz_lilianmartinsU arq2014 1-leopoldo_plentz_lilianmartins
U arq2014 1-leopoldo_plentz_lilianmartins
 
Residencial
ResidencialResidencial
Residencial
 
ERP SAP : uma simulação.
ERP SAP : uma simulação.ERP SAP : uma simulação.
ERP SAP : uma simulação.
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 

Similar a Network security

Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 

Similar a Network security (20)

Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Network security
Network security Network security
Network security
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Network security.pptx
Network security.pptxNetwork security.pptx
Network security.pptx
 
Network security
Network securityNetwork security
Network security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 

Más de Harsh Kishore Mishra

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
Harsh Kishore Mishra
 

Más de Harsh Kishore Mishra (12)

Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Big data
Big dataBig data
Big data
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
 
Windows 7 Versions Features
Windows 7 Versions FeaturesWindows 7 Versions Features
Windows 7 Versions Features
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Network security

  • 2.  What is security  Why do we need security  Basic Terminology  Security Management  Attacks  Others Securities  Wireless Security  Firewall  Virtual Private Network
  • 3.  Freedom from risk or danger; safety.  Freedom from doubt, anxiety, or fear; confidence.  Information Security - Information security = confidentiality + integrity + availability + authentication  Authorization of access to data in a network, which is controlled by the network administrator.
  • 4.  To prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.  Protect vital information while still allowing access to those who need it.  Provide authentication and access control for resource.  Guarantee availability of resources.  To prevent malicious attacks from hacking and spamming
  • 5.  Identification  Authentication  Access Control (Authorization)  Confidentiality  Integrity  Nonrepudiation  Availability
  • 6.  Homes & Small Businesses Basic Firewall , Basic Antivirus software, Passwords for all accounts.  Medium businesses Strong Firewall, Internet Security Software, Virtual Private Network.  Large businesses Strong Firewall and Proxy, Strong Antivirus software, Physical Security Management  Large government Strong Firewall and Proxy, Strong Encryption, Whitelist authorized wireless connection
  • 7.  Passive Attacks  Wiretapping  Port scanner  Idle scan  Active Attacks  Denial-of-service attack  Spoofing  Man in the middle  ARP poisoning  Smurf attack  Buffer overflow  Heap overflow  Format string attack  SQL injection
  • 8.
  • 9.  Cloud computing security A set of policies, technologies, and controls to protect data, applications.  Crime ware A class of malware designed specifically to automate cybercrime.  Cyber security standards ISO/IEC 27002 IT Baseline Protection Catalogs  Data loss prevention Information Leak Detection and Prevention (ILDP) Information Leak Prevention (ILP) Content Monitoring and Filtering (CMF) Information Protection and Control (IPC)
  • 10.  Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.  WLAN uses spread-spectrum or OFDM modulation technology  wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)  Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) common used technique.  Ad-hoc networks  Non-traditional networks  Man-in-the-middle attacks  Denial of service
  • 11. Independent Topology BSS BSS Ad-hoc network
  • 12.  Infrastructure topology using multiple BSS AP: Access Point AP AP AP BSS BSS wired network
  • 13.  Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet.  Aims:  Establish a controlled link  Protect the premises network from Internet-based attacks  Provide a single choke point
  • 14.  Design goals:  All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall)  Only authorized traffic (defined by the local security police) will be allowed to pass
  • 15.
  • 16.
  • 17.  Three common types of Firewalls:  Packet-filtering routers  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions, policies (discard or forward)  Application-level gateways  Also called proxy server  Acts as a relay of application-level traffic  Circuit-level gateways  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  (Bastion host)  The bastion host serves as a platform for an application-level or circuit-level gateway
  • 18.  A VPN is a means of transporting traffic in a secure manner over an unsecured network.  A VPN usually achieves this by employing some combination of encryption, authentication, and tunneling.  "Tunneling" (encapsulation) refers to the process of encapsulating or embedding one network protocol to be carried within the packets of a second network.  Point-to-Point Tunneling Protocol (PPTP);  Layer 2 Tunneling Protocol (L2TP);  Internet Protocol Security (IPSec);  SOCKS.