NETWORK SECURITY.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
January 2011 As a precaution, re-check the exam time in early January. Various rooms are used, your room will be on your personal timetable, available.
IS Network and Telecommunications Risks
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
E-Commerce Security and Fraud Issues and Protections
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Securing Information Systems
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
BUSINESS B1 Information Security.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Chapter 13 – Network Security
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
C8- Securing Information Systems
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Csci5233 computer security & integrity 1 Cryptography: an overview.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing Interconnect Networks By: Bryan Roberts.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Module 8: Securing Network Traffic by Using IPSec and Certificates
ISMS Information Security Management System
VPN: Virtual Private Network
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction to Network Security
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

NETWORK SECURITY

Define Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks.

Define Security: Security is “Freedom from risk or danger.“ The ability of a system to protect information and system resources with respect to confidentiality and integrity.

Network security: Any activities designed to protect your network . Target- variety of threats and stops them from entering or spreading on your network. Handled by a network administrator.

Objective: Access Confidentiality Authentication Integrity Non‐repudiation

History: During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.

Types: Physical security Perimeter protection Five types of network security can aid in secure networking. Physical security Perimeter protection User training and education Wireless encryption protocol (WEP) MAC address filtering

Working: We need multiple layers of security Network security is accomplished through hardware and software. Network security components: Anti-virus and anti-spyware Firewall Intrusion prevention systems Virtual Private Networks

Security tools: Antivirus software packages Secure network infrastructure DNS hardware and software Virtual private network Identity services Encryption Security management

Network security technology : Different mechanisms to deal with these attacks. Cryptographic systems: plaintext is converted in to cipher text. Secret Key Cryptography (SKC)

Public Key Cryptography (PKC): Hash Function: Hash function Plain text Cipher text

Firewall: A typical border control mechanism. Metaphor for network security. Designed to prevent unauthorized access to or from a private network.

Firewall Types: Packet Filtering Firewall State Full Firewall Application Aware Firewall etc.. Network-based IDs (NIDS): The sensor are located at the choke in network It monitored, it captures all the network traffic and analyze each packets for malicious traffic.

Secure Socket Layer (SSL): It is a good level of security between a web browser and a website. There is a tunnel between them. Clients present a certificate to the server to prove their identity.

WIRELESS NETWORK SECURITY prevention of unauthorized access using wireless networks. Security Policies: Wireless Intrusion Prevention System(WIPS) Wireless Intrusion Detection System (WIDS) Implementation: Three components: sensor, server, and console.

It is a short program aiming at securing communication over a network. SECURITY PROTOCOLS: It is a short program aiming at securing communication over a network. Example: Transport layer security (TLS) PPP / Point-to-Point Protocol Internet Protocols security (IPSec)

IMPLEMENTATION: Network Security Services (NSS) comprises a set of libraries It develops security-enabled client and server applications. Some are: Mozilla client products, including Firefox etc Google Chrome Sun server products

CURRENT DEVELOPMENTS: Hardware Developments Biometric systems -secure workstation logons Smart cards -undeniable proof of a user’s identity. Software Developments Current research develops security software using neural networks. Objective- use neural networks for the facial recognition software.

FUTURE TREND: The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.

Security tremendously Tweaks” CONCLUSION: The network security field evolve more rapidly to deal with the threats further in the future. “As threats tweaks, Security tremendously Tweaks”

By , RAJAN SHUKLA