Top Banner
NETWORK SECURITY
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network security

NETWORK SECURITY

Page 2: Network security

Define Network:

A Network is a series of points or nodes interconnected by communication paths.

Interconnect with other networks and contain sub networks.

Page 3: Network security

Define Security:Security is “Freedom from risk or danger.“

The ability of a system to protect information and system resources with respect to confidentiality and integrity.

Page 4: Network security

Network security:

Any activities designed to protect your network .

Target- variety of threats and stops them from entering or spreading on your network.

Handled by a network administrator.

Page 5: Network security

Objective:

• Access• Confidentiality • Authentication • Integrity• Non‐repudiation

Page 6: Network security

History:

During the 1980s, the hackers and crimes were beginning to emerge.

CERT was created to overcome network security issues.

In the 1990s, Internet became public and thesecurity concerns increased tremendously.

Page 7: Network security

Types:Five types of network security can aid

in securenetworking.

• Physical security• Perimeter protection• User training and education• Wireless encryption protocol

(WEP)• MAC address filtering

Page 8: Network security

Working: We need multiple layers of

security Network security is

accomplished through hardware and software.

Network security components: Anti-virus and anti-spywareFirewallIntrusion prevention systemsVirtual Private Networks

Page 9: Network security

Security tools:• Antivirus software packages• Secure network infrastructure• DNS hardware and software• Virtual private network• Identity services• Encryption• Security management

Page 10: Network security

Network security technology :Different mechanisms to deal with

these attacks.Cryptographic systems:plaintext is converted in to cipher text. Secret Key Cryptography (SKC)

Page 11: Network security

• Public Key Cryptography (PKC):

• Hash Function: Hash function

Plain text Cipher text

Page 12: Network security

Firewall: A typical border control

mechanism. Metaphor for network security. Designed to prevent

unauthorized access to or from a private network.

Page 13: Network security

◦Packet Filtering Firewall◦State Full Firewall◦Application Aware Firewall etc..

Network-based IDs (NIDS):The sensor are located at the choke in network

It monitored, it captures all the network traffic and analyze each packets for malicious traffic.

Firewall Types:

Page 14: Network security

Secure Socket Layer (SSL):

It is a good level of security between a web browser and a website.

There is a tunnel between them.

Clients present a certificate to the server to prove their identity.

Page 15: Network security

WIRELESS NETWORK SECURITY

prevention of unauthorized access using wireless networks.

Security Policies: Wireless Intrusion Prevention

System(WIPS) Wireless Intrusion Detection System

(WIDS)Implementation: Three components: sensor, server, and

console.

Page 16: Network security

SECURITY PROTOCOLS:

It is a short program aiming at securing communication over a network.

Example:Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)

Page 17: Network security

IMPLEMENTATION: Network Security Services (NSS)

comprises a set of libraries It develops security-enabled client

and server applications.Some are:

Mozilla client products, including Firefox etcGoogle Chrome Sun server products

Page 18: Network security

CURRENT DEVELOPMENTS: Hardware Developments

Biometric systems -secure workstation logons

Smart cards -undeniable proof of a user’s identity.

Software DevelopmentsCurrent research develops security

software using neural networks. Objective- use neural networks for

the facial recognition software.

Page 19: Network security

FUTURE TREND:

The network security will be able to function as an immune system.

  The same set of security technology that is being used today with some minor adjustments.   

Page 20: Network security

CONCLUSION:

The network security field evolve more rapidly to deal with the threats further in the future.

“As threats tweaks, Security tremendously

Tweaks”

Page 21: Network security

By ,I.MadhumithahV.Kalpana