Top Banner
NETWORK SECURITY PRESENTed By SADASIVARAO.G
22

NETWORK SECURITY

Dec 31, 2015

Download

Documents

tasha-richard

NETWORK SECURITY. PRESENTed By. SADASIVARAO.G. ABSTRACT:. Network security is a complicated subject, historically only tackled by well-trained and experienced experts. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NETWORK SECURITY

NETWORK SECURITY

PRESENTed BySADASIVARAO.G

Page 2: NETWORK SECURITY

ABSTRACT:

Network security is a complicated subject, historically only tackled by well-trained and experienced experts.

However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.

Some history of networking is included, as well as an introduction to TCP/IP and internetworking

We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices.

Page 3: NETWORK SECURITY

CONTENTS:Introduction to Networking

TCP/IP –The language of the model Risk management Firewalls Secure network devices Conclusion s References

Page 4: NETWORK SECURITY

What is Network? Computer Networks can be defined

as an Inter-connection of “autonomous computers”.

Uses: It can be used to many organizations to share, process and Exchange information. Like- Resource sharing ,Realibility,Saving Money,Scalability,communication etc

Page 5: NETWORK SECURITY
Page 6: NETWORK SECURITY

Network

A network is a group of two or more computer systems linked together. There are many types of computer Networks, including:

Page 7: NETWORK SECURITY

Local_area Networks(LAN): The computers are geographically close together Wide_area Networks(WAN):The computers are farther apart and are connected by telephone lines or radio waves. Campus_area Networks(CAN): The computers are within a limited geographic area, such as a campus or military base. Metropolitan_area Networks(MAN):A data network designed for a town or city. Home_area Networks(HAN): A network contained within a user's home that

Page 8: NETWORK SECURITY

It is a measure taken to protect data During communication between the computers in a Network . The Network security is becoming more and more cricial as the volume of data being exchanged on the internet increases.

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations.

NETWORK SECURITY

Page 9: NETWORK SECURITY
Page 10: NETWORK SECURITY
Page 11: NETWORK SECURITY

NETWORK SECURITY

PRIVACY AUTHENTICATION DATA INTEGRITY

NON REPUDIATION

Aspects of security

Page 12: NETWORK SECURITY

TCP/IP –The language of the model

IP Open Design TCP Guaranteed packet delivery UDP lower overhead than TCP

Page 13: NETWORK SECURITY

The protocol is an ``open'' protocol, and anyone who wishes to implement it may do so freely.

Engineers and scientists from all over the world participate in the IETF (Internet Engineering Task Force) working groups that design the protocols that make the Internet work.

Open Design:

This is the layer that allows the hosts to actually ``talk'' to each other.

mapping the Internet address (such as 10.2.3.4) to a physical network address (such as 08:00:69:0a:ca:8f), and routing, which takes care of making sure that all of the devices that have Internet connectivity can find the way to each other.

IP:

Page 14: NETWORK SECURITY

TCP TCP is a transport-layer protocol. It needs to sit on top of a network-layer protocol, and was designed to ride atop IP.

TCP provides a connection-oriented,relible,byte steam service.oriented means the two application using TCP must establish a TCP connection with each other beforeExchanging any data.

Guaranteed packet delivery

Page 15: NETWORK SECURITY

UDP: UDP (User Datagram Protocol) is a simple transport-layer protocol. This protocol is used in place of TCP.UDP is connectionless protocol provides no reliability or flow control mechanisms. UDP serves as simple application interface to the IP

IP Header

UDP Header

UDP Data

IP Datagram

UDP Datagram

20 Bytes 8 Bytes

UDP encapsulation

Page 16: NETWORK SECURITY

Risk management:It's very important to understand that in security, one simply cannot say ``what's the best firewall?'' There are two extremes: absolute security and absolute access

The Game of Security

The closest we can get to an absolutely secure machine is one unplugged from the network, power supply, locked in a safe, and thrown at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state

Page 17: NETWORK SECURITY

Firewalls:

Firewalls is nothing but a combination of hardware and software that Provides a security system ,It can be used to prevent unauthorized access to an Internal network.It prevents direct communication between network and external computers By routing communication through a proxy server outside of the network

Page 18: NETWORK SECURITY

Firewalls

Connection

Ports

Firewalls

Packet filtering routers

Application gateway

InsideLAN

Outside LAN

Firewalls

Page 19: NETWORK SECURITY

Secure network devicesIt's important to remember that the firewall is only one

entry point to your network. Modems, if you allow them to answer incoming calls, can provide an easy means for an attacker to sneak around

Secure Modems

Crypto-Capable Routers

Virtual Private Networks

Devices

Page 20: NETWORK SECURITY

S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989.

References:

Page 21: NETWORK SECURITY

Conclusion s

Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable.The key for building a secure network is to define what security means to your organization Many people pay great amounts of lip service to security,but do not want to be bothered with it when it gets in their way. It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him.

Page 22: NETWORK SECURITY

THANK YOU