0% found this document useful (0 votes)
8 views18 pages

Soumya

Presentation pdf

Uploaded by

Rituraj Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views18 pages

Soumya

Presentation pdf

Uploaded by

Rituraj Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

NETWORK

SECURITY
UNDERSTANDING THE FUNDAMENTALS
Presentation By:
SOUMYA
Roll No. 218330045
B. Tech(CSE)
VI Semester Under Supervision of:
Date:2|09|2024 Mr. Ajit Shukla Sir
CONTENT
➢ INTRODUCTION
➢ WHAT IS NETWORK SECURITY
➢ BASICS OF NETWORK SECURITY
➢ TYPES OF NETWORK SECURITY
➢ ADVANTAGES AND DISADVANTAGES OF NETWORK
SECURITY
➢ APPLICATIONS OF NETWORK SECURITY
➢ WAY TO SECURE DATA
➢ SOME NETWORK SECURITY PROTOCOLS
➢ CONCLUSION
INTRODUCTION
Network security is the protection of a
network's infrastructure and data from
unauthorized access, misuse, and theft. It
involves using a combination of hardware
and software technologies to prevent
threats from entering or spreading on a
network.
NETWORK SECURITY
NETWORK:

NETWORK IS THE ARRANGMENT OF MULTIPLE DEVICES


WHICH ARE CONNECTED THROUGH MEDIA.

SECURITY:

SECURITY IS THE FREEDOM FROM RISK , DANGER OR FEAR.


IT ENSURE THE SAFETY OF ANY PARTICULAR OBJECT.
BASICS OF NETWORK SECURITY
PLAIN TEXT:

Plaintext is data that has not been encrypted and can


be read or acted upon without decryption.

CIPHERTEXT:

Ciphertext is encrypted data that is unreadable and


can only be read with an encryption key.
ENCRYPTION:

Encryption is a data security method that scrambles


information into an unreadable. This process is
known as converting plaintext into ciphertext.

DECRYPTION:

Decryption is the process of converting encrypted


data back to its original, readable form.

KEY:

a key is a piece of information that is used to


encrypt or decrypt data, or to verify the authenticity
of a message.
PLAIN TEXT TO CIPHER TEXT
TYPES OF NETWORK SECURITY
Firewall:

Firewalls control incoming and outgoing traffic on


networks, with predetermined security rules. Firewalls
keep out unfriendly traffic and is a necessary part of
daily computing.
Email Security

Email security is the practice of protecting email


accounts and communications from unauthorized
access, loss, or compromise. This is important
because email is a common target for cyberattacks
Access Control:

Access control is a security process that


manages who can access an organization's
resources and data.
ADVANTAGES OF NETWORK SECURITY

• Protection from Hackers: Network security prevents


unauthorized access to your network, protecting your data
and systems from hackers.

• Data Protection: Network security ensures that your


sensitive data is safe from theft, damage, or unauthorized
access.

• Business Continuity: Network security ensures that your


business operations continue uninterrupted, even in the
face of cyber threats.
DISADVANTAGES OF NETWORK SECURITY

• Cost: Implementing and maintaining network security


measures can be expensive.

• Complexity: Network security can be complex to set up


and manage, requiring specialized expertise.

• User Education and Training: Users need to be educated


and trained on security best practices, which can be time-
consuming.

• Overprotection: Overly restrictive security measures can


hinder business operations and productivity.
WAY TO SECURE DATA
➢ Encryption

➢ Anti-virus packages

➢ Firewall
APPLICATIONS OF NETWORK SECURITY
✓ Financial Institutions: Protecting sensitive
financial data and transactions.

✓ Healthcare: Safeguarding patient records and


medical research data.

✓ E-commerce: Securing online transactions and


customer data.

✓ Government Agencies: Protecting classified


information and national security data.

✓ Education: Safeguarding student and faculty


data, as well as research information.
SOME NETWORK SECURITY PROTOCOLS
❑ Internet Protocol Security (IPsec) Protocol—OSI
Layer 3:

IPsec is a protocol and algorithm suite that secures data


transferred over public networks like the Internet. The
Internet Engineering Task Force (IETF) released the IPsec
protocols in the 1990s. They encrypt and authenticate
network packets to provide IP layer security.

❑ SS.L and TLS—OSI Layer 5:

The Secure Sockets Layer (SSL) protocol encrypts data,


authenticates data origins, and ensures message integrity
✓ SSL/TLS provides:
1. Encryption: Protects data in transit.
2. Authentication: Verifies identities of communicating parties.
3. Integrity: Ensures data is not tampered with or altered during transmission.

❑ Datagram Transport Layer Security (DTLS)—OSI Layer 5:

DTLS is a datagram communication security protocol based on TLS. It


does not guarantee message delivery or that messages arrive in
order. DTLS introduces the advantages of datagram protocols,
including lower latency

❑ Kerberos Protocol—OSI Layer 7:

Kerberos is a service request authentication protocol for untrusted


networks like the public Internet. It authenticates requests between
trusted hosts, offering built-in Windows
CONCLUSION
❖ Network Security is very important for organization.

❖ It plays a major role in protecting the network from


any type of virus attacks spywares etc.

❖ Network security is a shared responsibility. Let's


work together to build a culture of security and
protect our networks from evolving threats

❖ In conclusion, network security is a critical


investment in our digital future. Let's make it a
priority and build a secure tomorrow, today
THANK YOU

You might also like