Top Banner
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Presentation
Page 2: Presentation

Introduction to Network security.

Need For Network Security.

Types Of Network Security.

Tools For Network Security.

Page 3: Presentation

In the field of NetworkSecurity (NA )Network Adminstrator prevents theunauthorized accessI.e. Misuse, Modification etc. The Network security involves in

the Organisations , Enterprices and other types of

institutions.

Page 4: Presentation

Recently , Network Security was

Fueled by the crime committed

By the Kevin Mitnick. He used

Large amount Of computers for

crime. Since Then, Network

Security came into spotlight.

Page 5: Presentation

Types

VPN WNS

Page 6: Presentation

VPN

ClientInternet

VPN

Server

VPN Tunnel

Corporate

Network

Page 7: Presentation

VPN uses the PPTP

Protocol, That stands for

The Point To Point Tunneling Protocol. It is

Microsoft product. It was

Used in 1998.

Page 8: Presentation

WNS stands for Wireless

Network Security. WNS was

Implemented in the 1969,

4 Years before Ethernet`s birth.

This Technology use the Radio

Frequency Transmission.

Page 9: Presentation

Attacks

Passive Attacks Active Attacks

Eavesdropping

Traffic Analysis

Masquerade

Replay

Message Modification

Page 10: Presentation

EAVESDROPPING = In This, Hacker

Hacks info. During Telephone

Conversation,Message Transmission.

TRAFFIC ANALYSIS = In This,

Attack is done in Encrypted form

,He knows info. In Encrypted form.

He also determines the user`s

Location.

Page 11: Presentation

MASQUERADE = In This Type,

Hacker hacks user`s Privilege.

REPLAY = In This, Hacker captures

The info. & retransmit it back to

Produce unauthorized access.

MESSAGE MODIFICATION =

Message modification after hacking

Info.

DENIAL OF SERVICE =

Termination of normal communi.

Page 12: Presentation

Tools

Firewalls IDS NAT

Page 13: Presentation

Firewall is collection of computers

Which stands b/w the Trusted

Networks. For effective communi.

Firewall must include :-

All communi. Should pass through

Firewall.

Firewall must permit to the

Authorised communi.

Firewall must capable to protect

Itself.

Page 14: Presentation

Firewall uses restricted access.

This is used for single goal.

Operating System independence.

Better performance.

Less Expensive.

Page 15: Presentation

Small reason may cause of failure.

H/W Firewall more costlier than

S/W Firewall.

Difficult to Install.

Takes Large amount of Physical

Space.

Page 16: Presentation

It stands for the Instrusion

Detection System . This device is

Used to inspect all Network

Traffics, Alerts the user when

There has been unauthorised

Access. It doesn`t slow the

Network.

Page 17: Presentation

Types

HIDS NIDS SIDS

Page 18: Presentation

NAT stands for Network Address

Translation. It is used by IP to

Maintain the public IP Addresses

,

Separate from the private IP

Addresses . NAT`s functionality is

Performed on Pouters & other

Gateway devices.

Page 19: Presentation

Types

Unidirectional

NAT

Port Based

NAT

Overlapping

NAT

Bidirectional

NAT

Page 20: Presentation