SlideShare a Scribd company logo
NETWORK SECURITY
Define Network:
A Network is a series of points or nodes
interconnected by communication paths.
Interconnect with other networks and
contain sub networks.
Define Security:
Security is “Freedom from risk or danger.“
The ability of a system to protect information
and system resources with respect to
confidentiality and integrity.
Network security:
Any activities designed to protect your
network .
Target- variety of threats and stops them from
entering or spreading on your network.
Handled by a network administrator.
Objective:
• Access
• Confidentiality
• Authentication
• Integrity
• Non‐repudiation
History:
During the 1980s, the hackers and crimes
were beginning to emerge.
CERT was created to overcome network
security issues.
In the 1990s, Internet became public and the
security concerns increased tremendously.
Types:
Five types of network security can aid in secure
networking.
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
 We need multiple layers of
security
 Network security is
accomplished through
hardware and software.
Network security components:
Anti-virus and anti-spyware
Firewall
Intrusion prevention systems
Virtual Private Networks
Security tools:
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual private network
• Identity services
• Encryption
• Security management
Network security technology :
Different mechanisms to deal with these
attacks.
Cryptographic systems:
plaintext is converted in to cipher text.
 Secret Key Cryptography (SKC)
• Public Key Cryptography (PKC):
• Hash Function:
Hash function
Plain text Cipher text
 A typical border control mechanism.
 Metaphor for network security.
 Designed to prevent unauthorized access
to or from a private network.
◦ Packet Filtering Firewall
◦ State Full Firewall
◦ ApplicationAware Firewall etc..
Network-based IDs (NIDS):
The sensor are located at the choke in network
It monitored, it captures all the network traffic
and analyze each packets for malicious traffic.
 It is a good level of
security between a web
browser and a website.
 There is a tunnel
between them.
 Clients present a
certificate to the server to
prove their identity.
 prevention of unauthorized access using wireless
networks.
Security Policies:
 Wireless Intrusion Prevention System(WIPS)
 Wireless Intrusion Detection System (WIDS)
Implementation:
Three components: sensor, server, and console.
 It is a short program aiming at securing
communication over a network.
Example:
Transport layer security (TLS)
PPP / Point-to-Point Protocol
Internet Protocols security (IPSec)
 Network Security Services (NSS) comprises
a set of libraries
 It develops security-enabled client and
server applications.
Some are:
Mozilla client products, including Firefox etc
Google Chrome
Sun server products
Hardware Developments
 Biometric systems -secure workstation
logons
 Smart cards -undeniable proof of a user’s
identity.
Software Developments
 Current research develops security software
using neural networks.
 Objective- use neural networks for the facial
recognition software.
The network security will be able to function
as an immune system.
The same set of security technology that is
being used today with some minor
adjustments.
 The network security field evolve more rapidly to
deal with the threats further in the future.
“As threats tweaks,
Security tremendously Tweaks”
By ,
I.Madhumithah
V.Kalpana

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Network security
Network securityNetwork security
Network security
toamma
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Information security
Information securityInformation security
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Network security ppt
Network security pptNetwork security ppt
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network Security Network Security
Network Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Information security
Information securityInformation security
Information security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Network security
Network securityNetwork security
Network security
 

Similar to Network security

Online security
Online securityOnline security
Online security
Danish Javed
 
NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
SunilNagar42
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Network security
Network securityNetwork security
Network security
snegacmr
 
Network security
Network securityNetwork security
Network security
Raaz Karkee
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
Network Security
Network SecurityNetwork Security
Network Security
Sayantan Sur
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
prosunghosh7
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
sandeepsandy75
 
Network security
Network securityNetwork security
Network security
hajra azam
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
IBM2202E_Network Security_Group Work_General Security.pptx
IBM2202E_Network Security_Group Work_General Security.pptxIBM2202E_Network Security_Group Work_General Security.pptx
IBM2202E_Network Security_Group Work_General Security.pptx
kristineply58
 

Similar to Network security (20)

Online security
Online securityOnline security
Online security
 
NETWORK SECURITY.pptx
NETWORK SECURITY.pptxNETWORK SECURITY.pptx
NETWORK SECURITY.pptx
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Network security
Network securityNetwork security
Network security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
IBM2202E_Network Security_Group Work_General Security.pptx
IBM2202E_Network Security_Group Work_General Security.pptxIBM2202E_Network Security_Group Work_General Security.pptx
IBM2202E_Network Security_Group Work_General Security.pptx
 

More from Madhumithah Ilango

Project confiration-letter-sample
Project confiration-letter-sampleProject confiration-letter-sample
Project confiration-letter-sample
Madhumithah Ilango
 
4 g technology
4 g technology4 g technology
4 g technology
Madhumithah Ilango
 
Clientserver
ClientserverClientserver
Clientserver
Madhumithah Ilango
 
Bit info
Bit infoBit info
Network simulator
Network  simulatorNetwork  simulator
Network simulator
Madhumithah Ilango
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
Madhumithah Ilango
 
Gps
GpsGps
4 g technology
4 g technology4 g technology
4 g technology
Madhumithah Ilango
 

More from Madhumithah Ilango (8)

Project confiration-letter-sample
Project confiration-letter-sampleProject confiration-letter-sample
Project confiration-letter-sample
 
4 g technology
4 g technology4 g technology
4 g technology
 
Clientserver
ClientserverClientserver
Clientserver
 
Bit info
Bit infoBit info
Bit info
 
Network simulator
Network  simulatorNetwork  simulator
Network simulator
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Gps
GpsGps
Gps
 
4 g technology
4 g technology4 g technology
4 g technology
 

Recently uploaded

What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 

Recently uploaded (20)

What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 

Network security

  • 2. Define Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks.
  • 3. Define Security: Security is “Freedom from risk or danger.“ The ability of a system to protect information and system resources with respect to confidentiality and integrity.
  • 4. Network security: Any activities designed to protect your network . Target- variety of threats and stops them from entering or spreading on your network. Handled by a network administrator.
  • 5. Objective: • Access • Confidentiality • Authentication • Integrity • Non‐repudiation
  • 6. History: During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.
  • 7. Types: Five types of network security can aid in secure networking. • Physical security • Perimeter protection • User training and education • Wireless encryption protocol (WEP) • MAC address filtering
  • 8.  We need multiple layers of security  Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks
  • 9. Security tools: • Antivirus software packages • Secure network infrastructure • DNS hardware and software • Virtual private network • Identity services • Encryption • Security management
  • 10. Network security technology : Different mechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text.  Secret Key Cryptography (SKC)
  • 11. • Public Key Cryptography (PKC): • Hash Function: Hash function Plain text Cipher text
  • 12.  A typical border control mechanism.  Metaphor for network security.  Designed to prevent unauthorized access to or from a private network.
  • 13. ◦ Packet Filtering Firewall ◦ State Full Firewall ◦ ApplicationAware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic.
  • 14.  It is a good level of security between a web browser and a website.  There is a tunnel between them.  Clients present a certificate to the server to prove their identity.
  • 15.  prevention of unauthorized access using wireless networks. Security Policies:  Wireless Intrusion Prevention System(WIPS)  Wireless Intrusion Detection System (WIDS) Implementation: Three components: sensor, server, and console.
  • 16.  It is a short program aiming at securing communication over a network. Example: Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)
  • 17.  Network Security Services (NSS) comprises a set of libraries  It develops security-enabled client and server applications. Some are: Mozilla client products, including Firefox etc Google Chrome Sun server products
  • 18. Hardware Developments  Biometric systems -secure workstation logons  Smart cards -undeniable proof of a user’s identity. Software Developments  Current research develops security software using neural networks.  Objective- use neural networks for the facial recognition software.
  • 19. The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.
  • 20.  The network security field evolve more rapidly to deal with the threats further in the future. “As threats tweaks, Security tremendously Tweaks”