NETWORK
SECURITY
UNDERSTANDING THE FUNDAMENTALS
Presentation By:
SOUMYA
Roll No. 218330045
B. Tech(CSE)
VI Semester Under Supervision of:
Date:2|09|2024 Mr. Ajit Shukla Sir
CONTENT
➢ INTRODUCTION
➢ WHAT IS NETWORK SECURITY
➢ BASICS OF NETWORK SECURITY
➢ TYPES OF NETWORK SECURITY
➢ ADVANTAGES AND DISADVANTAGES OF NETWORK
SECURITY
➢ APPLICATIONS OF NETWORK SECURITY
➢ WAY TO SECURE DATA
➢ SOME NETWORK SECURITY PROTOCOLS
➢ CONCLUSION
INTRODUCTION
Network security is the protection of a
network's infrastructure and data from
unauthorized access, misuse, and theft. It
involves using a combination of hardware
and software technologies to prevent
threats from entering or spreading on a
network.
NETWORK SECURITY
NETWORK:
NETWORK IS THE ARRANGMENT OF MULTIPLE DEVICES
WHICH ARE CONNECTED THROUGH MEDIA.
SECURITY:
SECURITY IS THE FREEDOM FROM RISK , DANGER OR FEAR.
IT ENSURE THE SAFETY OF ANY PARTICULAR OBJECT.
BASICS OF NETWORK SECURITY
PLAIN TEXT:
Plaintext is data that has not been encrypted and can
be read or acted upon without decryption.
CIPHERTEXT:
Ciphertext is encrypted data that is unreadable and
can only be read with an encryption key.
ENCRYPTION:
Encryption is a data security method that scrambles
information into an unreadable. This process is
known as converting plaintext into ciphertext.
DECRYPTION:
Decryption is the process of converting encrypted
data back to its original, readable form.
KEY:
a key is a piece of information that is used to
encrypt or decrypt data, or to verify the authenticity
of a message.
PLAIN TEXT TO CIPHER TEXT
TYPES OF NETWORK SECURITY
Firewall:
Firewalls control incoming and outgoing traffic on
networks, with predetermined security rules. Firewalls
keep out unfriendly traffic and is a necessary part of
daily computing.
Email Security
Email security is the practice of protecting email
accounts and communications from unauthorized
access, loss, or compromise. This is important
because email is a common target for cyberattacks
Access Control:
Access control is a security process that
manages who can access an organization's
resources and data.
ADVANTAGES OF NETWORK SECURITY
• Protection from Hackers: Network security prevents
unauthorized access to your network, protecting your data
and systems from hackers.
• Data Protection: Network security ensures that your
sensitive data is safe from theft, damage, or unauthorized
access.
• Business Continuity: Network security ensures that your
business operations continue uninterrupted, even in the
face of cyber threats.
DISADVANTAGES OF NETWORK SECURITY
• Cost: Implementing and maintaining network security
measures can be expensive.
• Complexity: Network security can be complex to set up
and manage, requiring specialized expertise.
• User Education and Training: Users need to be educated
and trained on security best practices, which can be time-
consuming.
• Overprotection: Overly restrictive security measures can
hinder business operations and productivity.
WAY TO SECURE DATA
➢ Encryption
➢ Anti-virus packages
➢ Firewall
APPLICATIONS OF NETWORK SECURITY
✓ Financial Institutions: Protecting sensitive
financial data and transactions.
✓ Healthcare: Safeguarding patient records and
medical research data.
✓ E-commerce: Securing online transactions and
customer data.
✓ Government Agencies: Protecting classified
information and national security data.
✓ Education: Safeguarding student and faculty
data, as well as research information.
SOME NETWORK SECURITY PROTOCOLS
❑ Internet Protocol Security (IPsec) Protocol—OSI
Layer 3:
IPsec is a protocol and algorithm suite that secures data
transferred over public networks like the Internet. The
Internet Engineering Task Force (IETF) released the IPsec
protocols in the 1990s. They encrypt and authenticate
network packets to provide IP layer security.
❑ SS.L and TLS—OSI Layer 5:
The Secure Sockets Layer (SSL) protocol encrypts data,
authenticates data origins, and ensures message integrity
✓ SSL/TLS provides:
1. Encryption: Protects data in transit.
2. Authentication: Verifies identities of communicating parties.
3. Integrity: Ensures data is not tampered with or altered during transmission.
❑ Datagram Transport Layer Security (DTLS)—OSI Layer 5:
DTLS is a datagram communication security protocol based on TLS. It
does not guarantee message delivery or that messages arrive in
order. DTLS introduces the advantages of datagram protocols,
including lower latency
❑ Kerberos Protocol—OSI Layer 7:
Kerberos is a service request authentication protocol for untrusted
networks like the public Internet. It authenticates requests between
trusted hosts, offering built-in Windows
CONCLUSION
❖ Network Security is very important for organization.
❖ It plays a major role in protecting the network from
any type of virus attacks spywares etc.
❖ Network security is a shared responsibility. Let's
work together to build a culture of security and
protect our networks from evolving threats
❖ In conclusion, network security is a critical
investment in our digital future. Let's make it a
priority and build a secure tomorrow, today
THANK YOU