Top Banner
what is Network Security Firewalls TCP/IP DDOS Vulnerabilities in Networks NETWORK SECURITY What is Network Security : In this concept we will deal with the needs and objectives, history , types, working, security tools, network security technology,firewalls and its types, SSL(security Socket Layer) cocept, protocol, cryptography. And also why the world is not cent percent secure, whats the actuall thing behind the Network. From a small Industries to a google servers needs Network Security methods, unless the works will be worthless. If there is not any kind of security in networks, the vulnerabilities that may appear , which we can’t expect from our mind. The vulnerabilities that are inserted by computer port. Hence the network security ensure encryptions, authentication mechanisms, intrusion detections also in some time.
5
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NETWORK SECURITY THE MOST NEEDED FOR PEOPLE

what is Network Security

Firewalls TCP/IP DDOS

Vulnerabilities in Networks

NETWORK SECURITY

What is Network Security: In this concept we will deal with the needs and

objectives, history , types, working, security tools, network security technology,firewalls and its types,

SSL(security Socket Layer) cocept, protocol, cryptography. And also why the world is not cent percent

secure, whats the actuall thing behind the Network. From a small Industries to a google servers needs

Network Security methods, unless the works will be worthless. If

there is not any kind of security in networks, the vulnerabilities that may appear , which we can’t expect

from our mind. The vulnerabilities that are inserted by computer port. Hence the network security ensure

encryptions, authentication mechanisms, intrusion detections also in some time.

Page 2: NETWORK SECURITY THE MOST NEEDED FOR PEOPLE

Firewall System: The firewalls are the strongest gate to the network

traffics. It blocks the unnecessary network traffics. In this topic we will deals with the firewall security

system, authentication encountering, firewalls for database management systems, how the firewall is not

broken and broken by hackers in some case, why it is widely used for servers, what’s the actual thing

done in firewall system. The network security Is mainly under controlled by using firewalls. The browsers,

antivirus, bank DBMS are having strong firewalls. The network based IDs(NIDS) monitor each packets

sends by a private user and the own user.

Internet F firewall

• Vulnerabilities: Attacks on Different Layers

– IP Attacks

– ICMP Attacks

– Routing Attacks

– TCP Attacks

– Application Layer Attacks

• Today, the vulnerabilities are the major affecting non-human beings, the vulnerabilities are made

through weekness in codings, improper html lines, absence of disable text editing, sql injections

methods. In the concept we will discuss about the major causes in TCP/IP transferring sessions.

Vulnerabilities leads to ARP poisoning , IP spoofing, ports weekness in software and websites,ICMP

ATTACKS, Router attacks,TCP LAYER ATTACKS,APPLICATION LAYER ATTACKS.

Page 3: NETWORK SECURITY THE MOST NEEDED FOR PEOPLE

The main objective of dos attack is make a service unusable, usually by

overloading the server or network.

Normally the dos attacks are performed by a single system. There are so

many dos and ddos attacks performed in any applications and websites. It

is of three types, simple, co -ordinated attacks and distributed attack. In

this concept we will detailed in ddos attack against any target system,

how they are performed.

Target system

unknown mac/ip address

unknown mac/ip address

unknown mac/ip address

SNIFFING

It is a process of capturing the data packets released by victim pc. That the sniffing concepts take place in

session hijacking. The tools involved in this process are CAIN n ABEL, pack sniffer. This concept also involve

in MITM (Man In the Middle Attack). In this topic, the user change its mac and ip address as the target

receiver address, hence the packets sent by the server or any data is also dropped by the hacker here. This

we called as mac spoofing, ip spoofing.(i.e) it is manually done. ARP poisoning is a kind of mac spoofing. In

this concept we will describe the mode of sniffing and its preventions.

Page 4: NETWORK SECURITY THE MOST NEEDED FOR PEOPLE

MAN IN THE MIDDLE ATTACK

The MAN IN THE MIDDLE ATTACK is kind of sniffing, in this method the attacker hide his

identity and spoofing his all IDS, capturing the all packets from the provider.

AND WE WILL DISCUSS ABOUT THE FOLLOWING:

SESSION HIJACKING

SQL INJECTIONS

CROSS SCRIPT ATTACKS

NETWORK BUGS

THANK YOU..

THIAGARAJAR COLLEGE OF ENGINEERING, MADURAI

NAME :UDHAYA PRAKASH.C & VIGNESHWARAN.B

YEAR: 1ST YEAR

DEP:CSE

MAIL IDS: [email protected] and [email protected]

Page 5: NETWORK SECURITY THE MOST NEEDED FOR PEOPLE