Network security

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

By: fathimathaiba3 (20 month(s) ago)

plz mail to mymoonasiya@gmail.com

By: ramsan (45 month(s) ago)

pls send me tis ppt i need it..urgent pls...

By: ishidewan (45 month(s) ago)

plzzzz mail me dis presentation on ishidewan@hotmail.com plzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz sir i need it very urgently

By: SJ_COOL (45 month(s) ago)

pls sir mail it on shikhajain_91@yahoo.in

By: jajideen (45 month(s) ago)

plz send this ppt to my mail id jajideen233@gmail.com

See all

Presentation Transcript

Slide 1: 

NETWORK SECURITY

Slide 2: 

SEMINAR ON NETWORK SECURITY Sunayna sharma

CONTENTS : 

CONTENTS Introduction Why do we need security Need of Network Security Intruders Security Threats Types of Network Security Problems of client-server security network Its protection methods Emerging client-server security threats Techniques of network security

INTRODUCTION : 

INTRODUCTION Usability Reliability Integrity Safety of your network and data. Network Security refers to any activities designed to protect your network. Specifically, these activities protect :

Why do we need security? : 

Why do we need security? Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. Provide authentication and access control for resources Ex: AFS Guarantee availability of resources Ex: 5 9’s (99.999% reliability)

SERVICES : 

SERVICES SECURITY SERVICES MESSAGE ENTITY CONFIDENTIALITY INTEGRITY AUTHENTICATION NONREPUDIATION AUNTHENTICATION

INTRUDERS : 

INTRUDERS INTRUDERS Intruders are those who perform cyber crime. Passive Active

PASSIVE INTRUDERS : 

PASSIVE INTRUDERS A passive intruders attempts to learn or make use of information from the system but doesn't effect system resources. An active intruders attempts to change system resources which can have effect on their operation. ACTIVE INTRUDERS

NEED Of NETWORK SECURITY : 

NEED Of NETWORK SECURITY Hacking Security related crimes E-mail bombing Denial of service attack Cyber pornography

SECURITY THREATS : 

SECURITY THREATS A Security Threat is defined as a circumstance, condition or event with a potential to cause economic hardship to data or network resources in the form of : Destruction Disclosure Modification of data Denial of service or fraud Waste and Abuse.

Slide 11: 

FIG:protected Internet Connection

Slide 12: 

TYPES OF NETWORK SECURITY CLIENT-SERVER SECURITY DATA & TRANSACTION SECURITY

Slide 13: 

CLIENT-SERVER SECURITY Uses various authorization method to make sure that only valid users and programs have access to information resources. DATA & TRANSACTION SECURITY It ensure privacy and confidentiality in electronic messages & data packets including the authentication of remote users in network transaction . TYPES OF NETWORK SECURITY

PROBLEMS OF CLIENT-SERVER SECURITY NETWORK : 

PROBLEMS OF CLIENT-SERVER SECURITY NETWORK PHYSICAL SECURITY HOLES SOFTWARE SECURITY HOLES INCONSISTENT SECURITY HOLES

ITS PROTECTION METHODS : 

ITS PROTECTION METHODS TRUST BASED SECURITY SECURITY THROUGH OBSCURITY PASSWORD SCHEMES BIOMETRIC SYSTEMS

EMERGING CLIENT-SERVER THREATS : 

EMERGING CLIENT-SERVER THREATS SOFTWARE AGENTS & MALICIOUS CODE THREATS TO SERVER VIRUSES TROJAN HORSES WORMS

TECHNIQUES OF NETWORK SECURITY : 

TECHNIQUES OF NETWORK SECURITY CRYPTOGRAPHY DIGITAL SIGNATURE FIREWALLS

CRYPTOGRAPHY : 

CRYPTOGRAPHY Cryptography refers to the science and art of transforming messages to make them secure and immune to attacks.

DIGITAL SIGNATURE : 

DIGITAL SIGNATURE Digital Signatures is cryptographic mechanisms that perform a similar function to a written signature. It is used to verify the originator and contents of the message .

FIREWALLS : 

FIREWALLS Firewall is a protection device to shield valuable area from some form of danger. Firewall can be defined as a system or group of systems that enforces an access control policy between two networks.

ADVANTAGES OF NETWORK SECURITY : 

ADVANTAGES OF NETWORK SECURITY Less drag Time saving