Transcript
Introduction to Network security.
Need For Network Security.
Types Of Network Security.
Tools For Network Security.
In the field of NetworkSecurity (NA )Network Adminstrator prevents theunauthorized accessI.e. Misuse, Modification etc. The Network security involves in
the Organisations , Enterprices and other types of
institutions.
Recently , Network Security was
Fueled by the crime committed
By the Kevin Mitnick. He used
Large amount Of computers for
crime. Since Then, Network
Security came into spotlight.
VPN uses the PPTP
Protocol, That stands for
The Point To Point Tunneling Protocol. It is
Microsoft product. It was
Used in 1998.
WNS stands for Wireless
Network Security. WNS was
Implemented in the 1969,
4 Years before Ethernet`s birth.
This Technology use the Radio
Frequency Transmission.
Attacks
Passive Attacks Active Attacks
Eavesdropping
Traffic Analysis
Masquerade
Replay
Message Modification
EAVESDROPPING = In This, Hacker
Hacks info. During Telephone
Conversation,Message Transmission.
TRAFFIC ANALYSIS = In This,
Attack is done in Encrypted form
,He knows info. In Encrypted form.
He also determines the user`s
Location.
MASQUERADE = In This Type,
Hacker hacks user`s Privilege.
REPLAY = In This, Hacker captures
The info. & retransmit it back to
Produce unauthorized access.
MESSAGE MODIFICATION =
Message modification after hacking
Info.
DENIAL OF SERVICE =
Termination of normal communi.
Firewall is collection of computers
Which stands b/w the Trusted
Networks. For effective communi.
Firewall must include :-
All communi. Should pass through
Firewall.
Firewall must permit to the
Authorised communi.
Firewall must capable to protect
Itself.
Firewall uses restricted access.
This is used for single goal.
Operating System independence.
Better performance.
Less Expensive.
Small reason may cause of failure.
H/W Firewall more costlier than
S/W Firewall.
Difficult to Install.
Takes Large amount of Physical
Space.
It stands for the Instrusion
Detection System . This device is
Used to inspect all Network
Traffics, Alerts the user when
There has been unauthorised
Access. It doesn`t slow the
Network.
NAT stands for Network Address
Translation. It is used by IP to
Maintain the public IP Addresses
,
Separate from the private IP
Addresses . NAT`s functionality is
Performed on Pouters & other
Gateway devices.
top related