0% found this document useful (0 votes)
23 views18 pages

Networksecurityppt 170905090119

The document discusses the importance of network security. It covers topics such as the history of network security, types of network attacks, authentication methods, and network security architecture. Ensuring network security is crucial as it protects personal data, prevents hacking and virus attacks, and helps guarantee the confidentiality, availability and integrity of information shared across a network. However, more progress is still needed in network security development.

Uploaded by

Free fire Garena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views18 pages

Networksecurityppt 170905090119

The document discusses the importance of network security. It covers topics such as the history of network security, types of network attacks, authentication methods, and network security architecture. Ensuring network security is crucial as it protects personal data, prevents hacking and virus attacks, and helps guarantee the confidentiality, availability and integrity of information shared across a network. However, more progress is still needed in network security development.

Uploaded by

Free fire Garena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

www.oeclib.

in
Seminar
On
Network security

Submitted By:
Odisha Electronics Control Library
. Introduction
. What is Network Security
. History
. Basic Network Security
. Need for Network Security
. Types
. Authentication
. Network Attacks Methods
. Advantages
. Problems
. Network Security Architecture
. Conclusion
. Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts .
. However, as more and more people become
``wired'', an increasing number of people
need to understand the basics of security in a
networked world .
Network security is a level of guarantee that all
the machines in a network are working optimally
and the users of these machines only possess
the rights that were granted to them .
cl
This c an ude:
. ting u nauthorized people from acting on
prev e nin
thes y stem mali c iously
prev e nting user s from
. performing involuntary
operations that are capable of harming the
system
securin
. g data by anticipating failures
. guaranteeing that services are not interrupted
. Internet security has been an issue since the
Internet rose to an international phenomenon.
. By 1996, the Internet already connected 13
million computers, so early security protocols
were required .
. These protocols required computer information
to be confidential, available, and have integrity.
. Because the Internet made information
available to everyone, people needed network
security to make their information confidential .
. When connecting a matching to a network, we need
to make sure noone will easily break into it .
. Even if you don't think anyone will try to break into
your machines - chances are that someone might
try.
. Crackers often run networkscan utilities that check a
large range of IP addresses, and automatically try to
find machines running servers with security holes .
. To protect against that, one could simply disable any
unnecessary network service they are running .
. In the past, hackers were highly skilled programmers
who understood the details of computer
communications and how to exploit vulnerabilities .
Today almost anyone can become a hacker by
downloadi ng tools from t he Internet.
These com p li cated attac k to ols and g
. enerally open
snetworks have
ecurity and generated
d ynamic s ecu an
it yincreased
polici e need for network
T he eas est w ay to pr otectra networ ks
. i roman outside
attack is to close it off completely from the outside
world.
A clos
. ed network provides connectivity only to trusted
known parties and sites; a closed network does not
allow a connection to public networks .
. Wi-Fi Protected Access (WPA)
. WPA encrypts information, and checks to
make sure that the network security key has
not been modified .
. WPA also authenticates users to help ensure
that only authorized people can access the
network .
. WPA is designed to work with all wireless
network adapters, but it might not work
with older routers or access points .
. Wired Equivalent Privacy (WEP)
. WEP isan older network security method that is
still available to support older devices, but it is
no longer recommended .
. When you enable WEP, you setup a network
security key.
. This key encrypts the information that one
computersends to another computer across
your network. However, WEP security is
relatively easy to crack .
One-factor authentication - this is
“something a user knows.” The
most recognized type of one-factor
authentication method is the
password .
Two-factor authentication - in
addition to the first factor, the
second factor is “something a user
has . ”
Three-factor authentication - in
addition to the previous two
factors, the third factor is
“something a user is .”
. Eavesdropping – Interception of communications by an
u nauthori zed pa rty
. Data Mod ifi ca t i o n – Data altering, reading from
unautho rized pa r t y
.
Identity Spoof i ng (IPAddress Spoofing) – IP address to
be falsely assumed— identity spoofing and the attacker
can mo d if y, r er oute, o r del ete yo u r da ta
. Passwo rd - Based Att ac sk B–y ga n ing yo ur access rights
to a computer and network resources are determined by
wh o y u a r e, t hat is, yo ur u ser name an d y our p assw or d
. De ni a of - Ser v ice Attac k – Prevents nor ma l e of yo ur
computer or network by valid users, and it could us be used
for sending invalid data to application, to flood the
computer, block traffic, etc .
. Network Security helps in protecting personal data
of clients existing on network .
. Network Security facilitates protection of
information that is shared between computers on
the network .
. Hacking attempts or virus / spyware attacks from
the internet will not be able to harm physical
computers. External possible attacks are prevented .
. Computer networks are typically a shared resource
used by many applications representing different
r
.
inte I ests.net is particularly widely shared, being used
The nter
by competing businesses, mutually antagonistic
governments, a nd o pp o rtunis t i c cri mi nals.
. U n less security mea s ur es are t a ken, a network
conversation or a distributed application maybe
c o mpromised by an adv er sary.
. T he owner o ft he we bsit e can be attacked as well .
Some websites have been defaced; the files that
makeup the website content have been remotely
accessed and modified without authorization .
What & why
an organization's network infrastructure evolves
over many years .
. Although this evolution is indirect response to the
changing business needs, in many cases security
has been an afterthought .
. Even implementing the most advanced security
technologies of the day won't help if the underlying
security architecture is flawed .
Our systematic approach to the evaluation of the
current state ensures a detailed review of the
current architecture, technology & security
policy of the organization, management
practices and planned changes .
Some of the aspects that will be examined are:
. Review latest Threat Risk Analysis report .
. Analysis of current IT network, information flow
according to business requirements and points
of access to information .
. That is why network security is an
important field that is increasingly gaining
attention as the Internet usage increases .
. The security threats and Internet protocols
were analyzed to determine the necessary
security technology.
. However, the current development in
network security is not very impressive and
significant .
.www.oeclib.in
www.google.com.
www.wikipedia.com.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy