SlideShare una empresa de Scribd logo
1 de 25
Network Security
By Gaurav Dalvi
Final Yr BTech
Roll no:A43
Reg
no:2011BCS501
Why Security?
 The Internet was initially designed for

connectivity.
 Fundamental aspects of information must be
protected.
 We can’t keep ourselves isolated from the
Internet.
Internet Evolution

•Different Ways to handle security as the Internet
Evolves.
Type Of Security
 Computer Security

generic name for the collection of tools designed
to protect data and to thwart hackers
 Network Security
measures to protect the data during the
transmission.
 Internet Security
measure to protect the data during the
transmission over a collection of interconnected
networks.
Goals of Information Security
Attacks on Different Layers
Security on Different Layers
IP
 IP is a network layer protocol.
 This is a layer that allows the hosts to actually

“talk ” to each other.
 IP has a number of very important features which
make it an extremely robust and flexible protocol.
Attacks on IP
 Attacks exploits the fact that IP does not perform

a robust mechanism for authentication, which is
proving that the packet came from where it claims
it did.
 This means that the host authentication must be
provided by higher layers.
 Eg: IP Spoofing, IP Session hijacking.
TCP Attacks
 Exploits TCP 3-way handshake.
 Attacker sends a series of SYN packets without

replying with the ACK packet.
 Finite queue size for incomplete connections.
TCP Attacks
DNS Cache Poisoning
Common Type of Attacks
 Ping sweeps and port scans – reconnaissance.
 Sniffing – capture packet as they travel through





the network.
Man in the Middle Attack – intercept messages
that are intended for a valid device.
Spoofing – set up a fake device and trick others
to send messages to it.
Hijacking – take control of a session.
Denial of Service (DoS) and Distributed DoS
(DDoS).
Trusted Network
 Standard defensive-oriented technologies.

- Firewall – first line of defense.
- Intrusion Detection.
 Built trust on the top of the TCP/IP infrastructure.
- Strong Authentication.
- Two factor authentication.
- something you have + something you
know.
- Public key Infrastructure.(PKI)
Firewall
 A choke point of control and monitoring.
 Interconnects networks with differing trust.
 Imposes restrictions on network services.
 only authorized traffic is allowed.

 Auditing and controlling access.
 can implement alarms for abnormal behavior.

 Itself immune to penetration.
 Provides perimeter defence.
Intrusion Detection System
An intrusion detection system (IDS) is a device
or software application that monitors network or
system activities for malicious activities or policy
violations and produces reports to a management
station. Some systems may attempt to stop an
intrusion attempt but this is neither required nor
expected of a monitoring system.
 Host IDS.
 Network IDS.
Access Control
 Access Control – ability to permit or deny the use

of an object by a subject.
 It provides 3 essential services (known as AAA):
- Authentication.(who can login)
- Authorization.(what authorized user can do)
- Accountability.(identifies what a user did)
Cryptography
 Has evolved into a complex science in the field of

information security.
 Encryption – process of transforming plaintext to
ciphertext using a cryptographic key.
 Symmetric key cryptography.
- DES, 3DES, AES, etc.
 Asymmetric key cryptography.
- RSA, Diffie-Hellman, etc.
Cryptography
Public key Infrastructure
 Combines public key cryptography and digital

signatures to ensure confidentiality, integrity,
authentication, non-repudiation and access
control.
 Digital Certificate – basic element of PKI; secure
credential that identifies the owner.
 Basic Components:- Certificate Authority.
- Registry Authority.
- Repository.
- Archives.
Different Layers of Encryption
IPSec
 Provides Layer 3 Security.
 Tunnel or Transport mode.

- Tunnel mode(entire IP packet is encrypted)
- Transport mode (IPSec header is inserted into
the packet)
 Combine different components:
- Security associations, Authentication headers
(AH), Encapsulating security payload (ESP),
Internet Key Exchange (IKE).
Security Management
 Loss Prevention.

Loss prevention focuses on what your critical assets
are and how you are going to protect them.
 Security risk management.
Management of security risks applies the principles of
risk management to the management of security
threats.
 Risk options.
 Risk avoidance.
 Risk reduction.
 Risk spreading.
 Risk transfer.
 Risk acceptance.
Whois Database
 Public network Management Database.
 Tracks network Resources.

- IP addresses, ASN, reverse routing.
 Records administrative info.
- Contacts(person/role), authorization(maintainer)
 All members must register their resources in the
Whois database.
 Must keep records up to date at all times.
Seminar (network security)

Más contenido relacionado

La actualidad más candente

Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

La actualidad más candente (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security
Network SecurityNetwork Security
Network Security
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Network security
Network security Network security
Network security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Security policies
Security policiesSecurity policies
Security policies
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Destacado

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Juniper SA Overview
Juniper SA OverviewJuniper SA Overview
Juniper SA OverviewDaniel Rohan
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Marco Lisi
 
Second Project PPT
Second Project PPTSecond Project PPT
Second Project PPTAmar Dhillon
 
Alice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsAlice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsMeghna Singhal
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modifiedKeerthan Shetty
 

Destacado (20)

Network security
Network securityNetwork security
Network security
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Network ppt
Network pptNetwork ppt
Network ppt
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Juniper SA Overview
Juniper SA OverviewJuniper SA Overview
Juniper SA Overview
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Network security
Network securityNetwork security
Network security
 
Second Project PPT
Second Project PPTSecond Project PPT
Second Project PPT
 
Alice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security WarningsAlice in warningland: A Large Scale Study of Browser Security Warnings
Alice in warningland: A Large Scale Study of Browser Security Warnings
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
 

Similar a Seminar (network security)

Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppttahirnaquash2
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 

Similar a Seminar (network security) (20)

Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Day4
Day4Day4
Day4
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Internet security
Internet securityInternet security
Internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 

Último

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 

Último (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

Seminar (network security)

  • 1. Network Security By Gaurav Dalvi Final Yr BTech Roll no:A43 Reg no:2011BCS501
  • 2. Why Security?  The Internet was initially designed for connectivity.  Fundamental aspects of information must be protected.  We can’t keep ourselves isolated from the Internet.
  • 3. Internet Evolution •Different Ways to handle security as the Internet Evolves.
  • 4. Type Of Security  Computer Security generic name for the collection of tools designed to protect data and to thwart hackers  Network Security measures to protect the data during the transmission.  Internet Security measure to protect the data during the transmission over a collection of interconnected networks.
  • 8. IP  IP is a network layer protocol.  This is a layer that allows the hosts to actually “talk ” to each other.  IP has a number of very important features which make it an extremely robust and flexible protocol.
  • 9. Attacks on IP  Attacks exploits the fact that IP does not perform a robust mechanism for authentication, which is proving that the packet came from where it claims it did.  This means that the host authentication must be provided by higher layers.  Eg: IP Spoofing, IP Session hijacking.
  • 10. TCP Attacks  Exploits TCP 3-way handshake.  Attacker sends a series of SYN packets without replying with the ACK packet.  Finite queue size for incomplete connections.
  • 13. Common Type of Attacks  Ping sweeps and port scans – reconnaissance.  Sniffing – capture packet as they travel through     the network. Man in the Middle Attack – intercept messages that are intended for a valid device. Spoofing – set up a fake device and trick others to send messages to it. Hijacking – take control of a session. Denial of Service (DoS) and Distributed DoS (DDoS).
  • 14. Trusted Network  Standard defensive-oriented technologies. - Firewall – first line of defense. - Intrusion Detection.  Built trust on the top of the TCP/IP infrastructure. - Strong Authentication. - Two factor authentication. - something you have + something you know. - Public key Infrastructure.(PKI)
  • 15. Firewall  A choke point of control and monitoring.  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed.  Auditing and controlling access.  can implement alarms for abnormal behavior.  Itself immune to penetration.  Provides perimeter defence.
  • 16. Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.  Host IDS.  Network IDS.
  • 17. Access Control  Access Control – ability to permit or deny the use of an object by a subject.  It provides 3 essential services (known as AAA): - Authentication.(who can login) - Authorization.(what authorized user can do) - Accountability.(identifies what a user did)
  • 18. Cryptography  Has evolved into a complex science in the field of information security.  Encryption – process of transforming plaintext to ciphertext using a cryptographic key.  Symmetric key cryptography. - DES, 3DES, AES, etc.  Asymmetric key cryptography. - RSA, Diffie-Hellman, etc.
  • 20. Public key Infrastructure  Combines public key cryptography and digital signatures to ensure confidentiality, integrity, authentication, non-repudiation and access control.  Digital Certificate – basic element of PKI; secure credential that identifies the owner.  Basic Components:- Certificate Authority. - Registry Authority. - Repository. - Archives.
  • 21. Different Layers of Encryption
  • 22. IPSec  Provides Layer 3 Security.  Tunnel or Transport mode. - Tunnel mode(entire IP packet is encrypted) - Transport mode (IPSec header is inserted into the packet)  Combine different components: - Security associations, Authentication headers (AH), Encapsulating security payload (ESP), Internet Key Exchange (IKE).
  • 23. Security Management  Loss Prevention. Loss prevention focuses on what your critical assets are and how you are going to protect them.  Security risk management. Management of security risks applies the principles of risk management to the management of security threats.  Risk options.  Risk avoidance.  Risk reduction.  Risk spreading.  Risk transfer.  Risk acceptance.
  • 24. Whois Database  Public network Management Database.  Tracks network Resources. - IP addresses, ASN, reverse routing.  Records administrative info. - Contacts(person/role), authorization(maintainer)  All members must register their resources in the Whois database.  Must keep records up to date at all times.