SlideShare una empresa de Scribd logo
1 de 19
SANDHYA.H.S
1BM08TE048
INTRODUCTION
 The world is becoming more interconnected with advent of internet
 and networking solutions
 There is a large amount of personal, commercial, military, and
 government information on networking infrastructures worldwide.
 Network security is becoming of great importance because of
 intellectual property that can be easily acquired through internet
 In practice single security technology is not sufficient
 to build a secure network system
 Integrated application of multiple technologies will be able to
 control the security risks as much as possible within the scope of the
 small
 Prevention through a variety of techniques is to resist the
 overwhelming majority of attacks from outside.
NETWORK SECURITY
 Network security has become more important to personal
 computer users, and in several organizations
 With the advent of the internet, security became a major
 concern and the history of security allows a better
 understanding of the emergence of security technology.
 More enterprises using web services helps to accelerate its
 own development
 In further we introduce the architecture of network
 security, and further information on the types of security
 threats, network security so that readers with some basic
 understanding of the types of security services
 In accordance with established safety precautions, and
 finally the introduction of security rules can be achieved.
SECURITY THREATS
   CONCEPTS OF SECURITY THREATS
 This has not been filtered for the protection of the network
  nodes, the times have to bear the test of a large number of
  network attacks.
 Even if the purpose of these attacks are random, but there are
  still very likely that those who failed to break through the
  computer facilities management, impact on the network and
  even network paralysis.
 CLASSIFICATION OF SECURITY THREATS
 Internet network security threats often roughly divided into the
  following categories:
 Illegal use of Network
 Denial of Service
 Information theft
 Data tampering
CATEGORIES
 Illegal use of network is the resource are illegal users or
  unauthorized users using in illegal way, For example, the
  attacker through the speculation out of account and password
  into the computer system
 Denial of service is Server refused the users to access
  information or resources to normal requests. For example, an
  attacker using a large number of packets a short period of time
  continuously connected to the server was launched, resulting in
  overloaded servers cannot handle tasks.
 Information theft is invasion did not directly attack the target
  system, but by tapping the Internet to access important data or
  information.
 Data tampering is attacks on the system data or message flow
  selective edit, delete, delay, re-sort and insertion of false
  information, such as operations, destruction of data
  consistency.
NETWORK SECURITY CLASSIFICATIONS


 In response to these security threats, security measures taken
  by security services

 The classification of security services and explained as
  follows:

 Availability of services is information or services to ensure that
  when needed can be a normal visit.

 Confidential service is to ensure that sensitive data or
  information will not be leaked or exposed to unauthorized
  entities.
SECURITY CLASSFN CONTN
 Integrity services is to ensure that data is not the way to
  unauthorized alteration or destruction.

 Identification is to identity of an entity to provide the
  guarantee the legitimacy of security service.

 Authorization is the use of system resources for the
  implementation of control provisions, such as the visitor's
  access permissions.
IMPLEMENTATION OF SECURITY
 As a result of the early stage of the Internet has not been
 designed for the specific IP security program, it is necessary to
 network security, services and products to improve the IP
 network, Internet Protocol in order to weaken the inherent
 security risks, and the following precautions.
 TABLE I. SAFETY PRECAUTIONS AND SUMMARY

      EVALUVATION ASPECTS       SUMMARY
       Encryption               Encryption technology
       Authentication           Identification and
                                verification of identity
       Access control           Access control and access
                                rights
       Visit to the security    Network security protocols
      agreement                 and layering
ENCRYPTION
 Encrypted message is converted into readable From
  unreadable text encrypted process. Not only to provide users
  with encrypted communication security, but also many other
  security mechanisms.
 Encryption technology can be used in the following
  mechanisms:
 Password authentication process design
 Safety communication protocol design
 Design of digital signatures
 Encryption methods are mainly classified into three
Types:
Symmetric cryptosystem
 Key is same to Characterize for the encryption and
 decryption, each pair of users share the same key to exchange
 information, and key must be kept confidential.
 A typical representative include:
 Data Encryption Standard DES
 Triple Data Encryption Standard 3DES

Public-key cryptosystem
 Compared with the symmetric cryptography, public key
 cryptography there are two different keys can be encryption
 and decryption functions separately.
 A key known as the private key must be secret preservation;
 another called the public key can be distributed publicly
Hash function

For a variable-length messages to a fixed-length
 compressed code word into a hash or message digest.
 Hash function, including MD5 (Message Digest
 5), Secure Hash Algorithm SHA (Secure Hash
 Algorithm)
 Typical representatives: DH (Diffie-Hellman), RSA
 (Rivest, Shamir, adleman) are representatives for
 public key cryptosystem
AUTHENTICATION
Certification is usually used to access the network or
 networks to provide services to identify the user before the
 legality of identity.
 Certification by the network for each piece of equipment
 in the local provision of, nor can the implementation of a
 dedicated authentication server.
 Comparatively speaking, the latter has better
 flexibility, controllability and scalability. At present, in the
 heterogeneous network environment, the authentication
 service using RADIUS (Remote Authentication Dial in
 user service
ACCESS CONTROL
 Access Control is a way to strengthen the mandate.
  Generally divided into two categories:
 Based on the operating system access control
 Access to the resources of a computer system on the user's
  visit to conduct designated authorized. Can be based on
  the identity of groups, the rules of access control policy
  configuration.
 Web-based access control
 Refers to the access network to limit the authority. Due to
  the complexity of the network, much of its mechanism of
  access control based on the operating system more
  complex.
VISIT TO THE SECURITY
AGREEMENT
 Refers to the access network to limit the authority. Due to
 the complexity of the network, much of its mechanism of
 access control based on the operating system more
 complex.
 Application Layer Security
 It offers from a host of applications through the network
 to another host on the end-to-end application security.
 Application-layer security mechanisms must be tailored to
 specific applications of the security agreement is the
 application of the supplementary agreement. It can be
 seen, there is no generic application-layer security
 protocol.
CONTD   ….
 Transport Layer Security

 In the transport layer to provide security services to
  strengthen the idea that the IPC interface, such as BSD
  sockets and so on. Including double-end entity
  authentication, data encryption key exchange.

 According to this line of thought, there has been built on
  the reliable transmission service based on the Secure
  Sockets Layer protocol SSL (Secure Socket Layer).
CONTD…
 Network Layer Security
 If the agreement does not achieve the security level of
  protection, through the network layer packet to protect
  user information can also be automatically provided from
  the network layer security benefit.
 Therefore, IP (Internet Protocol) security is the TCP / IP
  security, but also the core of Internet security.
 Data Link Layer Security
 Provide point-to-point security, such as in a point to-point
  link to provide security. Link layer security is the main
  link connecting each end of the use of special equipment
  for the completion of encryption and decryption.
CONCLUSION
 Network operating system security and database
 management systems security and security is closely
 integrated.
 The application must be tailored to specific needs of
 the environment matched analysis and the
 development of various safety management strategy to
 ensure network security.
REFERNCES
 www.google.com
 www.wikepedia.com
 www.ieee.org
 TAN Chun-xia .On Information Technology and
 Computer Network Security and Computer
 Knowledge and Technology(Academic Exchange)


Network security by sandhya

Más contenido relacionado

La actualidad más candente

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksDefCamp
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6HCL Technologies
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 

La actualidad más candente (20)

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
End end-security
End end-securityEnd end-security
End end-security
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security
 Network security Network security
Network security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 

Destacado

Wearables: a show & tell with user stories
Wearables: a show & tell with user storiesWearables: a show & tell with user stories
Wearables: a show & tell with user storiesNorthern User Experience
 
7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your NumbersAdam Jacobson
 
Write better user stories, deliver better software
Write better user stories, deliver better softwareWrite better user stories, deliver better software
Write better user stories, deliver better softwareElliot Susel
 
RE tutorial user stories
RE tutorial user storiesRE tutorial user stories
RE tutorial user storiesGarm Lucassen
 
User Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of valueUser Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of valueAngie Doyle
 
User stories — how to cook a cat?
User stories — how to cook a cat?User stories — how to cook a cat?
User stories — how to cook a cat?Vladimir Tarasov
 
Aspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_pptAspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_pptTatiya Siengdang
 
As user, I hate user stories
As user, I hate user storiesAs user, I hate user stories
As user, I hate user storiesmatteo cavucci
 
Network security ppt
Network security pptNetwork security ppt
Network security pptshashi712
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Destacado (20)

Wearables: a show & tell with user stories
Wearables: a show & tell with user storiesWearables: a show & tell with user stories
Wearables: a show & tell with user stories
 
7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers7 Ways To Get People To Look At Your Numbers
7 Ways To Get People To Look At Your Numbers
 
Death by User Story
Death by User StoryDeath by User Story
Death by User Story
 
Write better user stories, deliver better software
Write better user stories, deliver better softwareWrite better user stories, deliver better software
Write better user stories, deliver better software
 
RE tutorial user stories
RE tutorial user storiesRE tutorial user stories
RE tutorial user stories
 
User Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of valueUser Story Mapping: Deliverable slice of value
User Story Mapping: Deliverable slice of value
 
User stories — how to cook a cat?
User stories — how to cook a cat?User stories — how to cook a cat?
User stories — how to cook a cat?
 
Aspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_pptAspe improved user_story_writing_techniques_ppt
Aspe improved user_story_writing_techniques_ppt
 
Better user stories
Better user storiesBetter user stories
Better user stories
 
As user, I hate user stories
As user, I hate user storiesAs user, I hate user stories
As user, I hate user stories
 
Story pointing
Story pointingStory pointing
Story pointing
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
Security threats
Security threatsSecurity threats
Security threats
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Firewall
Firewall Firewall
Firewall
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Network security
Network security Network security
Network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar a Network security by sandhya

Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptxSamyLacheheub
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdfahmed53254
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxNavanathDarwante1
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptographyprosunghosh7
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 

Similar a Network security by sandhya (20)

Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
 
Network security
Network security Network security
Network security
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Web security
Web securityWeb security
Web security
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
information security technology
information security technologyinformation security technology
information security technology
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 

Último

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Último (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Network security by sandhya

  • 2. INTRODUCTION  The world is becoming more interconnected with advent of internet and networking solutions  There is a large amount of personal, commercial, military, and government information on networking infrastructures worldwide.  Network security is becoming of great importance because of intellectual property that can be easily acquired through internet  In practice single security technology is not sufficient to build a secure network system  Integrated application of multiple technologies will be able to control the security risks as much as possible within the scope of the small  Prevention through a variety of techniques is to resist the overwhelming majority of attacks from outside.
  • 3. NETWORK SECURITY  Network security has become more important to personal computer users, and in several organizations  With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology.  More enterprises using web services helps to accelerate its own development  In further we introduce the architecture of network security, and further information on the types of security threats, network security so that readers with some basic understanding of the types of security services  In accordance with established safety precautions, and finally the introduction of security rules can be achieved.
  • 4. SECURITY THREATS  CONCEPTS OF SECURITY THREATS  This has not been filtered for the protection of the network nodes, the times have to bear the test of a large number of network attacks.  Even if the purpose of these attacks are random, but there are still very likely that those who failed to break through the computer facilities management, impact on the network and even network paralysis.  CLASSIFICATION OF SECURITY THREATS  Internet network security threats often roughly divided into the following categories:  Illegal use of Network  Denial of Service  Information theft  Data tampering
  • 5. CATEGORIES  Illegal use of network is the resource are illegal users or unauthorized users using in illegal way, For example, the attacker through the speculation out of account and password into the computer system  Denial of service is Server refused the users to access information or resources to normal requests. For example, an attacker using a large number of packets a short period of time continuously connected to the server was launched, resulting in overloaded servers cannot handle tasks.  Information theft is invasion did not directly attack the target system, but by tapping the Internet to access important data or information.  Data tampering is attacks on the system data or message flow selective edit, delete, delay, re-sort and insertion of false information, such as operations, destruction of data consistency.
  • 6. NETWORK SECURITY CLASSIFICATIONS  In response to these security threats, security measures taken by security services  The classification of security services and explained as follows:  Availability of services is information or services to ensure that when needed can be a normal visit.  Confidential service is to ensure that sensitive data or information will not be leaked or exposed to unauthorized entities.
  • 7. SECURITY CLASSFN CONTN  Integrity services is to ensure that data is not the way to unauthorized alteration or destruction.  Identification is to identity of an entity to provide the guarantee the legitimacy of security service.  Authorization is the use of system resources for the implementation of control provisions, such as the visitor's access permissions.
  • 8. IMPLEMENTATION OF SECURITY  As a result of the early stage of the Internet has not been designed for the specific IP security program, it is necessary to network security, services and products to improve the IP network, Internet Protocol in order to weaken the inherent security risks, and the following precautions.  TABLE I. SAFETY PRECAUTIONS AND SUMMARY EVALUVATION ASPECTS SUMMARY  Encryption  Encryption technology  Authentication  Identification and verification of identity  Access control  Access control and access rights  Visit to the security Network security protocols agreement and layering
  • 9. ENCRYPTION  Encrypted message is converted into readable From unreadable text encrypted process. Not only to provide users with encrypted communication security, but also many other security mechanisms.  Encryption technology can be used in the following mechanisms:  Password authentication process design  Safety communication protocol design  Design of digital signatures  Encryption methods are mainly classified into three Types:
  • 10. Symmetric cryptosystem  Key is same to Characterize for the encryption and decryption, each pair of users share the same key to exchange information, and key must be kept confidential.  A typical representative include:  Data Encryption Standard DES  Triple Data Encryption Standard 3DES Public-key cryptosystem  Compared with the symmetric cryptography, public key cryptography there are two different keys can be encryption and decryption functions separately.  A key known as the private key must be secret preservation; another called the public key can be distributed publicly
  • 11. Hash function For a variable-length messages to a fixed-length compressed code word into a hash or message digest. Hash function, including MD5 (Message Digest 5), Secure Hash Algorithm SHA (Secure Hash Algorithm)  Typical representatives: DH (Diffie-Hellman), RSA (Rivest, Shamir, adleman) are representatives for public key cryptosystem
  • 12. AUTHENTICATION Certification is usually used to access the network or networks to provide services to identify the user before the legality of identity.  Certification by the network for each piece of equipment in the local provision of, nor can the implementation of a dedicated authentication server.  Comparatively speaking, the latter has better flexibility, controllability and scalability. At present, in the heterogeneous network environment, the authentication service using RADIUS (Remote Authentication Dial in user service
  • 13. ACCESS CONTROL  Access Control is a way to strengthen the mandate. Generally divided into two categories:  Based on the operating system access control  Access to the resources of a computer system on the user's visit to conduct designated authorized. Can be based on the identity of groups, the rules of access control policy configuration.  Web-based access control  Refers to the access network to limit the authority. Due to the complexity of the network, much of its mechanism of access control based on the operating system more complex.
  • 14. VISIT TO THE SECURITY AGREEMENT  Refers to the access network to limit the authority. Due to the complexity of the network, much of its mechanism of access control based on the operating system more complex.  Application Layer Security  It offers from a host of applications through the network to another host on the end-to-end application security. Application-layer security mechanisms must be tailored to specific applications of the security agreement is the application of the supplementary agreement. It can be seen, there is no generic application-layer security protocol.
  • 15. CONTD ….  Transport Layer Security  In the transport layer to provide security services to strengthen the idea that the IPC interface, such as BSD sockets and so on. Including double-end entity authentication, data encryption key exchange.  According to this line of thought, there has been built on the reliable transmission service based on the Secure Sockets Layer protocol SSL (Secure Socket Layer).
  • 16. CONTD…  Network Layer Security  If the agreement does not achieve the security level of protection, through the network layer packet to protect user information can also be automatically provided from the network layer security benefit.  Therefore, IP (Internet Protocol) security is the TCP / IP security, but also the core of Internet security.  Data Link Layer Security  Provide point-to-point security, such as in a point to-point link to provide security. Link layer security is the main link connecting each end of the use of special equipment for the completion of encryption and decryption.
  • 17. CONCLUSION  Network operating system security and database management systems security and security is closely integrated.  The application must be tailored to specific needs of the environment matched analysis and the development of various safety management strategy to ensure network security.
  • 18. REFERNCES  www.google.com  www.wikepedia.com  www.ieee.org  TAN Chun-xia .On Information Technology and Computer Network Security and Computer Knowledge and Technology(Academic Exchange) 