logging in or signing up Network security thiyagarajan6792 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 2108 Category: Entertainment License: All Rights Reserved Like it (9) Dislike it (1) Added: August 20, 2010 This Presentation is Public Favorites: 5 Presentation Description No description available. Comments Posting comment... By: fathimathaiba3 (9 month(s) ago) plz mail to email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: ramsan (33 month(s) ago) pls send me tis ppt i need it..urgent pls... Saving..... Post Reply Close Saving..... Edit Comment Close By: ishidewan (33 month(s) ago) plzzzz mail me dis presentation on firstname.lastname@example.org plzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz sir i need it very urgently Saving..... Post Reply Close Saving..... Edit Comment Close By: SJ_COOL (33 month(s) ago) pls sir mail it on email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: jajideen (33 month(s) ago) plz send this ppt to my mail id firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript Slide 1: NETWORK SECURITY Slide 2: SEMINAR ON NETWORK SECURITY Sunayna sharma CONTENTS : CONTENTS Introduction Why do we need security Need of Network Security Intruders Security Threats Types of Network Security Problems of client-server security network Its protection methods Emerging client-server security threats Techniques of network security INTRODUCTION : INTRODUCTION Usability Reliability Integrity Safety of your network and data. Network Security refers to any activities designed to protect your network. Specifically, these activities protect : Why do we need security? : Why do we need security? Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. Provide authentication and access control for resources Ex: AFS Guarantee availability of resources Ex: 5 9’s (99.999% reliability) SERVICES : SERVICES SECURITY SERVICES MESSAGE ENTITY CONFIDENTIALITY INTEGRITY AUTHENTICATION NONREPUDIATION AUNTHENTICATION INTRUDERS : INTRUDERS INTRUDERS Intruders are those who perform cyber crime. Passive Active PASSIVE INTRUDERS : PASSIVE INTRUDERS A passive intruders attempts to learn or make use of information from the system but doesn't effect system resources. An active intruders attempts to change system resources which can have effect on their operation. ACTIVE INTRUDERS NEED Of NETWORK SECURITY : NEED Of NETWORK SECURITY Hacking Security related crimes E-mail bombing Denial of service attack Cyber pornography SECURITY THREATS : SECURITY THREATS A Security Threat is defined as a circumstance, condition or event with a potential to cause economic hardship to data or network resources in the form of : Destruction Disclosure Modification of data Denial of service or fraud Waste and Abuse. Slide 11: FIG:protected Internet Connection Slide 12: TYPES OF NETWORK SECURITY CLIENT-SERVER SECURITY DATA & TRANSACTION SECURITY Slide 13: CLIENT-SERVER SECURITY Uses various authorization method to make sure that only valid users and programs have access to information resources. DATA & TRANSACTION SECURITY It ensure privacy and confidentiality in electronic messages & data packets including the authentication of remote users in network transaction . TYPES OF NETWORK SECURITY PROBLEMS OF CLIENT-SERVER SECURITY NETWORK : PROBLEMS OF CLIENT-SERVER SECURITY NETWORK PHYSICAL SECURITY HOLES SOFTWARE SECURITY HOLES INCONSISTENT SECURITY HOLES ITS PROTECTION METHODS : ITS PROTECTION METHODS TRUST BASED SECURITY SECURITY THROUGH OBSCURITY PASSWORD SCHEMES BIOMETRIC SYSTEMS EMERGING CLIENT-SERVER THREATS : EMERGING CLIENT-SERVER THREATS SOFTWARE AGENTS & MALICIOUS CODE THREATS TO SERVER VIRUSES TROJAN HORSES WORMS TECHNIQUES OF NETWORK SECURITY : TECHNIQUES OF NETWORK SECURITY CRYPTOGRAPHY DIGITAL SIGNATURE FIREWALLS CRYPTOGRAPHY : CRYPTOGRAPHY Cryptography refers to the science and art of transforming messages to make them secure and immune to attacks. DIGITAL SIGNATURE : DIGITAL SIGNATURE Digital Signatures is cryptographic mechanisms that perform a similar function to a written signature. It is used to verify the originator and contents of the message . FIREWALLS : FIREWALLS Firewall is a protection device to shield valuable area from some form of danger. Firewall can be defined as a system or group of systems that enforces an access control policy between two networks. ADVANTAGES OF NETWORK SECURITY : ADVANTAGES OF NETWORK SECURITY Less drag Time saving You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.