slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
NETWORK SECURITY PowerPoint Presentation
Download Presentation
NETWORK SECURITY

Loading in 2 Seconds...

play fullscreen
1 / 22

NETWORK SECURITY - PowerPoint PPT Presentation


  • 77 Views
  • Uploaded on

NETWORK SECURITY. PRESENTed By. SADASIVARAO.G. ABSTRACT:. Network security is a complicated subject, historically only tackled by well-trained and experienced experts.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'NETWORK SECURITY' - tasha-richard


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

NETWORK SECURITY

PRESENTed

By

SADASIVARAO.G

slide2

ABSTRACT:

  • Network security is a complicated subject, historically only tackled by well-trained and experienced experts.
  • However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
  • Some history of networking is included, as well as an introduction to TCP/IP and internetworking
  • We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices.
slide3

CONTENTS:

  • Introduction to Networking
  • TCP/IP –The language of the model
  • Risk management
  • Firewalls
  • Secure network devices
  • Conclusion s
  • References
slide4

What is Network?

Computer Networks can be defined as an Inter-connection of “autonomous computers”.

  • Uses: It can be used to many organizations to share, process and Exchange information. Like- Resource sharing ,Realibility,Saving Money,
  • Scalability,communication etc
slide6

Network

A network is a group of two or more computer systems linked together. There are many types of computer Networks, including:

slide7

Local_area Networks(LAN): The computers are geographically close together

  • Wide_area Networks(WAN):The computers are farther apart and are connected by telephone lines or radio waves.
  • Campus_area Networks(CAN): The computers are within a limited geographic area, such as a campus or military base.
  • Metropolitan_area Networks(MAN):A data network designed for a town or city.
  • Home_area Networks(HAN): A network contained within a user's home that
slide8

NETWORK SECURITY

It is a measure taken to protect data During communication between the computers in a Network .

The Network security is becoming more and more cricial as the volume of data being exchanged on the internet increases.

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations.

slide11

Aspects of security

NETWORK SECURITY

PRIVACY

AUTHENTICATION

DATA INTEGRITY

NON REPUDIATION

slide12

TCP/IP –The language of the model

  • IP
  • Open Design
  • TCP
  • Guaranteed packet delivery
  • UDP
  • lower overhead than TCP
slide13

Open Design:

The protocol is an ``open'' protocol, and anyone who wishes to implement it may do so freely.

Engineers and scientists from all over the world participate in the IETF (Internet Engineering Task Force) working groups that design the protocols that make the Internet work.

IP:

This is the layer that allows the hosts to actually ``talk'' to each other.

mapping the Internet address (such as 10.2.3.4) to a physical network address (such as 08:00:69:0a:ca:8f), and routing, which takes care of making sure that all of the devices that have Internet connectivity can find the way to each other.

slide14

TCP

TCP is a transport-layer protocol. It needs to sit on top of a network-layer protocol, and was designed to ride atop IP.

TCP provides a connection-oriented,relible,byte steam service.

oriented means the two application using

TCP must establish a TCP connection with each other before

Exchanging any data.

Guaranteed packet delivery

slide15

UDP:

UDP (User Datagram Protocol) is a simple transport-layer protocol. This protocol is used in place of TCP.UDP is connectionless protocol provides no reliability or flow control mechanisms.

UDP serves as simple application interface to the IP

IP Datagram

UDP Datagram

20 Bytes

8 Bytes

UDP encapsulation

slide16

Risk management:

The Game of Security

It's very important to understand that in security, one simply cannot say ``what's the best firewall?'' There are two extremes: absolute security and absolute access

The closest we can get to an absolutely secure machine is one unplugged from the network, power supply, locked in a safe, and thrown at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state

slide17

Firewalls:

Firewalls is nothing but a combination of hardware and software that

Provides a security system ,It can be used to prevent unauthorized access to an Internal network.

It prevents direct communication between network and external computers By routing communication through a proxy server outside of the network

slide18

Firewalls

Connection

Packet

filtering

routers

Ports

Firewalls

Application

gateway

Inside

LAN

Outside

LAN

Firewalls

slide19

Secure network devices

It's important to remember that the firewall is only one entry point to your network. Modems, if you allow them to answer incoming calls, can provide an easy means for an attacker to sneak around

  • Devices

Secure Modems

Crypto-Capable Routers

Virtual Private Networks

slide20

References:

S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989.

slide21

Conclusion s

Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable.

The key for building a secure network is to define what security means to your organization

Many people pay great amounts of lip service to security,

but do not want to be bothered with it when it gets in their way. It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him.