SlideShare a Scribd company logo
1 of 30
Seminar Guide
Mr . Mahesh Dali
Asst. Professor
Mr. Mahesh Dali
Asst.Professor
TRISHLA THAKUR
1DS11TE098
Department of telecommunication Engineering
 Introduction- Why network security is necessary
 Existing risks-Be aware of vulnerabalities and threats
 Security technologies-Understand security services
 Discussion on SAPPDRR model and other dynamic
model
 further Improvement of campus network
Why we need security?
 Protect vital information while still allowing access to
those who need it
 Provide authentication & access control for resources
 Campus network is a highly professional LAN,
which is interconnected with internet which is in
harsh environment
 Managing the network of a higher-education
campus or organization has raised problems of
massive growth of stored data and need to share it
causing over-stressed network, network misuse and
security breaches.
 They is a continuous risk of hacker’s attacks, system
failure and information leakage
Campus network should be formed
on
Unified plan
Based on
Security risk
analysis
Adopt advance
technologies
Such as
firewall,honeynet,VPN
&
monitoring system
Strengthen systems and
specifications
Under the
guidance of dynamic
model
 Campus network is based on TCP/IP protocol
of the large scale LAN
 TCP/IP is constructed by the physical layer,
network interface layer, transport layer and
application layers.
 The risk of campus network security comes
from all the layers.
Improper placement of physical devices or
environmental preventive measures are ineffective
 This layer directly threatens to attack the other
layer. security issues are mainly
 MAC addresses related attacking
 DHCP discontented fool
 ARP attacks
layer encapsulates IP datagram routing forward to
address the problem of communication between
machine.
The common security problems of this layer are:
 IP Address spoofing,
 RIP (routing information protocol) attacks
 Port scanning threat
 Introduction- Why network security is necessary
 Existing risks-Be aware of vulnerabilities and threats
 Security technologies-Understand security services
 Discussion on SAPPDRR model and other dynamic
model
 Improvement of campus network
 Lots of vulnerabilities on hosts in network
 Users don’t keep systems up to date
 Solution?
 Limit access to the network
 Put firewalls across the perimeter of the
network
A firewall is an integrated collection of security
measures designed to prevent unauthorized
electronic access to a networked computer system.
 Packet Filtering
 Network Address Translation (NAT)
 Proxy Services
 Virus Scanning
 Content Filtering
WHAT IS VPN?
VPN is a technology that allows private networks to make
use of a public network, such as the Internet, as a means
of communication .
 Two connections – one is made to the Internet and
the second is made to the VPN.
 Datagram – contains data, destination and source
information.
 Firewalls – VPNs allow authorized users to pass
through the firewalls.
 Protocols – protocols create the VPN tunnels.
 Authentication – validates that the data was
sent from the sender.
 Access control – limiting unauthorized users
from accessing the network.
 Confidentiality – preventing the data to be read
or copied as the data is being transported.
 Data Integrity – ensuring that the data has not
been altered
 A honeynet is a trap set to detect, deflect, or, in
some manner, counteract attempts at unauthorized
use of information systems.
 High-interaction honeypot designed to:
 capture in-depth information
 learn who would like to use your
system without your permission
for their own ends
 Its an architecture, not a product or software.
 Digital certificates provide a mechanism to
authenticate and secure information on open
networks.
 Applications using this mechanism include
o secure email
o secure web communications
o digital signing of software files
o smart card authentication
o encrypting file systems
 SSL is a digital certificates issued by a trusted Certificate
Authority for e-commerce website.
 Digital certificate is issued by a third-party Certificate
Authority (CA) like VeriSign.
 PDR(protection ,detection ,recovery ) MODEL
 PPDR (policy, protection, detection, recovery)MODEL
 APPDRR MODEL
This is a network security model based on concept of
closed-loop control.
 This model is a passive dynamic defense model
PDR,PPDR and APPDRR model minimize the loss of network attacks
but defence and protection required costly system and speed will be
affected.
 Reasonable security mechanism, risk analysis carried out
according to the specific need of the service, to develop
appropriate security policies.
 Network security of SAPPDRR model= Risk analysis+
Security strategy+ Defence system +Real-time monitoring
+Real-time response +Disaster recovery +Active
counterattack SAPPDRR model deals with all this.
 This model is active dynamic defence model
 A,B,C,D----- mutually independent safety
system
 X(attacker)from network B
Example
Dynamic
model
deals with
demand
for service
Risk
analysis
Security
policies
System
defence
Real time
monitoring
Response
Disaster
recovery
Initiative
fight back
Purpose of a monitor
 check regularly that everything is in order and,
if not, transmit an alarm
 When fault is rectified monitor will record,
update the system and again work
A monitor is often dedicated to a particular
function:
o ping monitor -checks that all equipment
o Interface monitor- checks that interfaces and
communications are operating
o Module monitor-checks switches, power supplies and fan
modules
o Threshold module- transmits an alarm if traffic load, CPU
load, etc. exceeds a pre-defined limit
A ping monitor uses an ICMP echo (ping) while other
uses SNMP. All these monitors send alarm signals to
the alarm system.
 Along with the development of computer network
technology , campus network expanding and
Increasing of users and visitors, the development of
a virtual private network technology, the popularity
of Internet and the stability of the campus network
safe operation have all become the focus of the
campus network management. SAPPDRR model &
Network monitoring is the basic measure to ensure
network stability and monitor the flow of
information online. The proper control of network
information can also be used to monitor the
network information, eliminate unhealthy Internet
information, and maintain the network environment .
SAPPDRR model can satisfy the needs of our campus
network management and security management.
1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014
2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring system, 2014
3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006.
4.Tian Bin, Research on Monitoring IP Network, 2006
5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002.
6.Network Security: History, Importance, and Future “University of Florida Department of Electrical and
Computer Engineering Bhavya Daya ”.
7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html.
8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007
I
QUESTIONS

More Related Content

What's hot

Firewall
FirewallFirewall
Firewall
Apo
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
mmoizuddin
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
seanraz
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 

What's hot (20)

What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
SD WAN
SD WANSD WAN
SD WAN
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Firewall
FirewallFirewall
Firewall
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Cisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyCisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching Family
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 

Viewers also liked

Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
shilpi nagpal
 
ACPA Advisor Manual
ACPA Advisor ManualACPA Advisor Manual
ACPA Advisor Manual
emyrald79
 
Virginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and PreparednessVirginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and Preparedness
vt-hr-service-center
 
Latest seminar topics
Latest seminar topicsLatest seminar topics
Latest seminar topics
Pulla Surya
 
School safety and security management
School safety and security management  School safety and security management
School safety and security management
Ghlen Madriaga
 
Women's rights presentation
Women's rights presentationWomen's rights presentation
Women's rights presentation
Hardik Kakadiya
 

Viewers also liked (20)

Fdi in indian retail sector a s.w.ot analysis
Fdi in indian retail sector   a s.w.ot analysisFdi in indian retail sector   a s.w.ot analysis
Fdi in indian retail sector a s.w.ot analysis
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Campus security camera systems
Campus security camera systemsCampus security camera systems
Campus security camera systems
 
ACPA Advisor Manual
ACPA Advisor ManualACPA Advisor Manual
ACPA Advisor Manual
 
Campus security & safety
Campus security & safetyCampus security & safety
Campus security & safety
 
SECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABADSECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABAD
 
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANsCCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
 
researchayurveda.org
researchayurveda.orgresearchayurveda.org
researchayurveda.org
 
Virginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and PreparednessVirginia Tech - Campus Safety, Security, and Preparedness
Virginia Tech - Campus Safety, Security, and Preparedness
 
Latest seminar topics
Latest seminar topicsLatest seminar topics
Latest seminar topics
 
Retail Sector Reports November-2016
Retail Sector Reports November-2016Retail Sector Reports November-2016
Retail Sector Reports November-2016
 
School safety and security management
School safety and security management  School safety and security management
School safety and security management
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
School Safety And Security
School Safety And SecuritySchool Safety And Security
School Safety And Security
 
Nat presentation
Nat presentationNat presentation
Nat presentation
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topics
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer science
 
Women's rights presentation
Women's rights presentationWomen's rights presentation
Women's rights presentation
 

Similar to Study of campus network security

Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
Santos Kumaar.S
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
Tom Kopko
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
Akttripathi
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 

Similar to Study of campus network security (20)

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Network Security
Network SecurityNetwork Security
Network Security
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
Network security
Network security Network security
Network security
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 

Recently uploaded (20)

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 

Study of campus network security

  • 1. Seminar Guide Mr . Mahesh Dali Asst. Professor Mr. Mahesh Dali Asst.Professor TRISHLA THAKUR 1DS11TE098 Department of telecommunication Engineering
  • 2.  Introduction- Why network security is necessary  Existing risks-Be aware of vulnerabalities and threats  Security technologies-Understand security services  Discussion on SAPPDRR model and other dynamic model  further Improvement of campus network
  • 3. Why we need security?  Protect vital information while still allowing access to those who need it  Provide authentication & access control for resources
  • 4.  Campus network is a highly professional LAN, which is interconnected with internet which is in harsh environment  Managing the network of a higher-education campus or organization has raised problems of massive growth of stored data and need to share it causing over-stressed network, network misuse and security breaches.
  • 5.  They is a continuous risk of hacker’s attacks, system failure and information leakage Campus network should be formed on Unified plan Based on Security risk analysis Adopt advance technologies Such as firewall,honeynet,VPN & monitoring system Strengthen systems and specifications Under the guidance of dynamic model
  • 6.  Campus network is based on TCP/IP protocol of the large scale LAN  TCP/IP is constructed by the physical layer, network interface layer, transport layer and application layers.  The risk of campus network security comes from all the layers.
  • 7. Improper placement of physical devices or environmental preventive measures are ineffective
  • 8.  This layer directly threatens to attack the other layer. security issues are mainly  MAC addresses related attacking  DHCP discontented fool  ARP attacks
  • 9. layer encapsulates IP datagram routing forward to address the problem of communication between machine. The common security problems of this layer are:  IP Address spoofing,  RIP (routing information protocol) attacks  Port scanning threat
  • 10.  Introduction- Why network security is necessary  Existing risks-Be aware of vulnerabilities and threats  Security technologies-Understand security services  Discussion on SAPPDRR model and other dynamic model  Improvement of campus network
  • 11.  Lots of vulnerabilities on hosts in network  Users don’t keep systems up to date  Solution?  Limit access to the network  Put firewalls across the perimeter of the network
  • 12. A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
  • 13.  Packet Filtering  Network Address Translation (NAT)  Proxy Services  Virus Scanning  Content Filtering
  • 14. WHAT IS VPN? VPN is a technology that allows private networks to make use of a public network, such as the Internet, as a means of communication .
  • 15.  Two connections – one is made to the Internet and the second is made to the VPN.  Datagram – contains data, destination and source information.  Firewalls – VPNs allow authorized users to pass through the firewalls.  Protocols – protocols create the VPN tunnels.
  • 16.  Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered
  • 17.  A honeynet is a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.  High-interaction honeypot designed to:  capture in-depth information  learn who would like to use your system without your permission for their own ends  Its an architecture, not a product or software.
  • 18.
  • 19.  Digital certificates provide a mechanism to authenticate and secure information on open networks.
  • 20.  Applications using this mechanism include o secure email o secure web communications o digital signing of software files o smart card authentication o encrypting file systems  SSL is a digital certificates issued by a trusted Certificate Authority for e-commerce website.  Digital certificate is issued by a third-party Certificate Authority (CA) like VeriSign.
  • 21.  PDR(protection ,detection ,recovery ) MODEL  PPDR (policy, protection, detection, recovery)MODEL  APPDRR MODEL
  • 22. This is a network security model based on concept of closed-loop control.  This model is a passive dynamic defense model PDR,PPDR and APPDRR model minimize the loss of network attacks but defence and protection required costly system and speed will be affected.
  • 23.  Reasonable security mechanism, risk analysis carried out according to the specific need of the service, to develop appropriate security policies.  Network security of SAPPDRR model= Risk analysis+ Security strategy+ Defence system +Real-time monitoring +Real-time response +Disaster recovery +Active counterattack SAPPDRR model deals with all this.  This model is active dynamic defence model
  • 24.  A,B,C,D----- mutually independent safety system  X(attacker)from network B Example
  • 25. Dynamic model deals with demand for service Risk analysis Security policies System defence Real time monitoring Response Disaster recovery Initiative fight back
  • 26. Purpose of a monitor  check regularly that everything is in order and, if not, transmit an alarm  When fault is rectified monitor will record, update the system and again work
  • 27. A monitor is often dedicated to a particular function: o ping monitor -checks that all equipment o Interface monitor- checks that interfaces and communications are operating o Module monitor-checks switches, power supplies and fan modules o Threshold module- transmits an alarm if traffic load, CPU load, etc. exceeds a pre-defined limit A ping monitor uses an ICMP echo (ping) while other uses SNMP. All these monitors send alarm signals to the alarm system.
  • 28.  Along with the development of computer network technology , campus network expanding and Increasing of users and visitors, the development of a virtual private network technology, the popularity of Internet and the stability of the campus network safe operation have all become the focus of the campus network management. SAPPDRR model & Network monitoring is the basic measure to ensure network stability and monitor the flow of information online. The proper control of network information can also be used to monitor the network information, eliminate unhealthy Internet information, and maintain the network environment . SAPPDRR model can satisfy the needs of our campus network management and security management.
  • 29. 1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014 2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring system, 2014 3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006. 4.Tian Bin, Research on Monitoring IP Network, 2006 5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002. 6.Network Security: History, Importance, and Future “University of Florida Department of Electrical and Computer Engineering Bhavya Daya ”. 7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html. 8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007