1 / 22

NETWORK SECURITY

NETWORK SECURITY. PRESENTed By. SADASIVARAO.G. ABSTRACT:. Network security is a complicated subject, historically only tackled by well-trained and experienced experts.

Download Presentation

NETWORK SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETWORK SECURITY PRESENTed By SADASIVARAO.G

  2. ABSTRACT: • Network security is a complicated subject, historically only tackled by well-trained and experienced experts. • However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. • Some history of networking is included, as well as an introduction to TCP/IP and internetworking • We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices.

  3. CONTENTS: • Introduction to Networking • TCP/IP –The language of the model • Risk management • Firewalls • Secure network devices • Conclusion s • References

  4. What is Network? Computer Networks can be defined as an Inter-connection of “autonomous computers”. • Uses: It can be used to many organizations to share, process and Exchange information. Like- Resource sharing ,Realibility,Saving Money, • Scalability,communication etc

  5. Network A network is a group of two or more computer systems linked together. There are many types of computer Networks, including:

  6. Local_area Networks(LAN): The computers are geographically close together • Wide_area Networks(WAN):The computers are farther apart and are connected by telephone lines or radio waves. • Campus_area Networks(CAN): The computers are within a limited geographic area, such as a campus or military base. • Metropolitan_area Networks(MAN):A data network designed for a town or city. • Home_area Networks(HAN): A network contained within a user's home that

  7. NETWORK SECURITY It is a measure taken to protect data During communication between the computers in a Network . The Network security is becoming more and more cricial as the volume of data being exchanged on the internet increases. Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations.

  8. Aspects of security NETWORK SECURITY PRIVACY AUTHENTICATION DATA INTEGRITY NON REPUDIATION

  9. TCP/IP –The language of the model • IP • Open Design • TCP • Guaranteed packet delivery • UDP • lower overhead than TCP

  10. Open Design: The protocol is an ``open'' protocol, and anyone who wishes to implement it may do so freely. Engineers and scientists from all over the world participate in the IETF (Internet Engineering Task Force) working groups that design the protocols that make the Internet work. IP: This is the layer that allows the hosts to actually ``talk'' to each other. mapping the Internet address (such as 10.2.3.4) to a physical network address (such as 08:00:69:0a:ca:8f), and routing, which takes care of making sure that all of the devices that have Internet connectivity can find the way to each other.

  11. TCP TCP is a transport-layer protocol. It needs to sit on top of a network-layer protocol, and was designed to ride atop IP. TCP provides a connection-oriented,relible,byte steam service. oriented means the two application using TCP must establish a TCP connection with each other before Exchanging any data. Guaranteed packet delivery

  12. UDP: UDP (User Datagram Protocol) is a simple transport-layer protocol. This protocol is used in place of TCP.UDP is connectionless protocol provides no reliability or flow control mechanisms. UDP serves as simple application interface to the IP IP Datagram UDP Datagram 20 Bytes 8 Bytes UDP encapsulation

  13. Risk management: The Game of Security It's very important to understand that in security, one simply cannot say ``what's the best firewall?'' There are two extremes: absolute security and absolute access The closest we can get to an absolutely secure machine is one unplugged from the network, power supply, locked in a safe, and thrown at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state

  14. Firewalls: Firewalls is nothing but a combination of hardware and software that Provides a security system ,It can be used to prevent unauthorized access to an Internal network. It prevents direct communication between network and external computers By routing communication through a proxy server outside of the network

  15. Firewalls Connection Packet filtering routers Ports Firewalls Application gateway Inside LAN Outside LAN Firewalls

  16. Secure network devices It's important to remember that the firewall is only one entry point to your network. Modems, if you allow them to answer incoming calls, can provide an easy means for an attacker to sneak around • Devices Secure Modems Crypto-Capable Routers Virtual Private Networks

  17. References: S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989.

  18. Conclusion s Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable. The key for building a secure network is to define what security means to your organization Many people pay great amounts of lip service to security, but do not want to be bothered with it when it gets in their way. It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him.

  19. THANK YOU

More Related