Internet and Network Security Introduction to Network Security.
Network security
-
Upload
madhumithah-ilango -
Category
Technology
-
view
1.547 -
download
5
description
Transcript of Network security
![Page 1: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/1.jpg)
NETWORK SECURITY
![Page 2: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/2.jpg)
Define Network:
A Network is a series of points or nodes interconnected by communication paths.
Interconnect with other networks and contain sub networks.
![Page 3: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/3.jpg)
Define Security:Security is “Freedom from risk or danger.“
The ability of a system to protect information and system resources with respect to confidentiality and integrity.
![Page 4: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/4.jpg)
Network security:
Any activities designed to protect your network .
Target- variety of threats and stops them from entering or spreading on your network.
Handled by a network administrator.
![Page 5: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/5.jpg)
Objective:
• Access• Confidentiality • Authentication • Integrity• Non‐repudiation
![Page 6: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/6.jpg)
History:
During the 1980s, the hackers and crimes were beginning to emerge.
CERT was created to overcome network security issues.
In the 1990s, Internet became public and thesecurity concerns increased tremendously.
![Page 7: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/7.jpg)
Types:Five types of network security can aid
in securenetworking.
• Physical security• Perimeter protection• User training and education• Wireless encryption protocol
(WEP)• MAC address filtering
![Page 8: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/8.jpg)
Working: We need multiple layers of
security Network security is
accomplished through hardware and software.
Network security components: Anti-virus and anti-spywareFirewallIntrusion prevention systemsVirtual Private Networks
![Page 9: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/9.jpg)
Security tools:• Antivirus software packages• Secure network infrastructure• DNS hardware and software• Virtual private network• Identity services• Encryption• Security management
![Page 10: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/10.jpg)
Network security technology :Different mechanisms to deal with
these attacks.Cryptographic systems:plaintext is converted in to cipher text. Secret Key Cryptography (SKC)
![Page 11: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/11.jpg)
• Public Key Cryptography (PKC):
• Hash Function: Hash function
Plain text Cipher text
![Page 12: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/12.jpg)
Firewall: A typical border control
mechanism. Metaphor for network security. Designed to prevent
unauthorized access to or from a private network.
![Page 13: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/13.jpg)
◦Packet Filtering Firewall◦State Full Firewall◦Application Aware Firewall etc..
Network-based IDs (NIDS):The sensor are located at the choke in network
It monitored, it captures all the network traffic and analyze each packets for malicious traffic.
Firewall Types:
![Page 14: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/14.jpg)
Secure Socket Layer (SSL):
It is a good level of security between a web browser and a website.
There is a tunnel between them.
Clients present a certificate to the server to prove their identity.
![Page 15: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/15.jpg)
WIRELESS NETWORK SECURITY
prevention of unauthorized access using wireless networks.
Security Policies: Wireless Intrusion Prevention
System(WIPS) Wireless Intrusion Detection System
(WIDS)Implementation: Three components: sensor, server, and
console.
![Page 16: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/16.jpg)
SECURITY PROTOCOLS:
It is a short program aiming at securing communication over a network.
Example:Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)
![Page 17: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/17.jpg)
IMPLEMENTATION: Network Security Services (NSS)
comprises a set of libraries It develops security-enabled client
and server applications.Some are:
Mozilla client products, including Firefox etcGoogle Chrome Sun server products
![Page 18: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/18.jpg)
CURRENT DEVELOPMENTS: Hardware Developments
Biometric systems -secure workstation logons
Smart cards -undeniable proof of a user’s identity.
Software DevelopmentsCurrent research develops security
software using neural networks. Objective- use neural networks for
the facial recognition software.
![Page 19: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/19.jpg)
FUTURE TREND:
The network security will be able to function as an immune system.
The same set of security technology that is being used today with some minor adjustments.
![Page 20: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/20.jpg)
CONCLUSION:
The network security field evolve more rapidly to deal with the threats further in the future.
“As threats tweaks, Security tremendously
Tweaks”
![Page 21: Network security](https://reader033.fdocuments.net/reader033/viewer/2022061210/54906a87b47959e76e8b4657/html5/thumbnails/21.jpg)
By ,I.MadhumithahV.Kalpana