PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – 862 - 025 NETWORK SECURITY M.C.A III Year II Sem.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
FIREWALLS Chapter 11.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Network Security Introduction
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Security Issues With Mobile IP
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Information and Network Security
VPN: Virtual Private Network
ONLINE SECURE DATA SERVICE
Introduction to Cryptography
Topic 12: Virtual Private Networks
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
A Model For Network Security
Presentation transcript:

PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem

Network Security :  Network security measures are needed to protect data during their transmission.  Network security is a complicated subject, historically only tackled by well-trained experts.  However, as more and more people become “wired”, an increasing number of people need to understand the basics of security in a networked world.

 This document was written with the basic computer user and information systems manager in view, explaining the concepts needed to read through the hype in market place.  Understanding risks and how to deal with them.  By this we can understand how to reduce and manage risk personally, at home, and in the working place.

Security Services : Within the context of any application-to-application communication, there are some specific security services. They are  Authentication  Integrity  Confidentiality  Non-repudiation  Access Control  Availability

Authentication:  The authentication service is concerned with assuring that a communication is authentic.  The function of the authentication service is to assure the recipient that the message is from the source in the case of a single message such as alarm Signal.

Integrity :  A connection-oriented integrity service assures that messages are received as sent, with no duplication, insertion or replays.  As the integrity service relates to active attacks, we are concerned with detection rather than prevention.

Confidentiality :  Confidentiality is the protection of transmitted data from passive attacks.  Ensuring that no one can read the message except the intended receiver.  Confidentiality is the protection of traffic flow from analysis.

Non-repudiation:  Non-repudiation prevents either sender or receiver from denying a transmitted message.  When a message is sent, the receiver can prove that the message was in fact send by the alleged sender.  Similarly, when a message is received, the sender can prove that the message was in fact received by the alleged receiver.

Access Control :  Access control is the ability to limit and control the access to host systems and applications via communication links.  To achieve access control, each entity trying to gain must first be identified or authenticated.

Availability :  Availability is one of the security services.  Variety of attacks can result in the loss of or reduction in availability.

Model For Network Security :  A message is to be transferred from one party to another across some sort of internet.  The two parties, who are the principals in this transaction, must cooperate for the exchange to take place.  A logical information channel is established by defining a route through the internet from source to destination and by the cooperative use of communication protocols by the two principals.

All the techniques for providing security have two components. They are:  A security-related transformation on the information to be sent.  Secret information will be shared by the two principals and it is hoped unknown to the opponent.

Different types of threats to Network:  Application backdoors  Operating system bugs  Denial of Service  Macros  Viruses

Application backdoors :  Some programs have special features that allow for remote access.  Others contain bugs that provide a backdoor, or hidden access, that provides some level of control of the program.

Operating system bugs:  Like applications, some operating systems have backdoors.  Others provide remote access with insufficient security controls or have bugs.

Denial of Service :  Denial of service threat is impossible to counter.  By inundating a server with unanswerable session requests, a hacker causes the server to slow to a crawl or eventually crash.

Macros :  To simplify complicated procedures, many applications allow us to create a script of commands that the application can run.  This script is known as macro.  Hackers take advantage of this to create their own macros depending on the application can destroy the data or crash the computer.

Viruses :  Probably the most well-known threat is computer viruses.  A virus is a small program that can copy itself to another computers.  Viruses range from harmless messages to erasing all of our data.

Various Methods to provide Network Security :  Virtual Private Network  Firewalls  IPSec  AAA Server

Virtual Private Network :  A virtual private network is a way to use a public telecommunication infrastructure, such as internet to provide secure access.  The goal of a virtual private network is to provide the organization with the capabilities at a much lower cost.

Firewalls :  A firewall provides a strong barrier between our private network and the Internet.  We can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are passed through.  We should already have a good firewall in place before we implement a virtual private network.

IPSec : Internet Protocol Security Protocol provides enhanced security features such as better encryption algorithms and more comprehensive authentication. IPSec has two encryption modes. They are Tunnel Mode and Transport mode IPSec can encrypt data between various devices such as Router to router Firewall to router PC to router PC to server

AAA Server :  AAA stands for authentication, authorization and accounting.  AAA servers are used for more secure access in a remote- access virtual private network environment.  When a request to establish a session comes in from a dial up client, the request is proxies to the AAA server. AAA then checks the following: Who we are (Authentication) What we are allowed to do (Authorization) What we actually do (Accounting)

 Here by we conclude that by using various methods we can provide security to our data CONCLUSION

Thank You

? QUERIES ? Any Queries?