NETWORK
SECURITY
CREATED BY:-
DEBOPRIO SARKAR
SOUMITRA GHOSH
SUBHOJIT PAUL
PROLOY BISWAS
DEBMALYA CHATARJEE
INTRODUCTION
A network is a group of computers (or a group of smaller networks) that are
connected to each other by various means, so that they may communicate with
each other. The internet is the largest network in the world. security is the
process of securing information data from unauthorized access, use,
modification, tempering, or disclosure. ... The theft of personal identity, credit
card information, and other important data using hacked user names and
passwords have become common these days.
HISTORY
Internet security has been an issue since the Internet rose to an
international phenomenon.
By 1996, the Internet already connected 13 million computers, so
early security protocols were required.
These protocols required computer information to be confidential,
available, and have integrity.
Because the Internet made information available to everyone,
people needed network security to make their information
confidential
WHAT IS NETWORK SECURITY?
Network security is any activity designed to protect the
usability and integrity of your network and data. It includes
both hardware and software technologies. Effective network
security manages access to the network. It targets a variety
of threats and stops them from entering or spreading on your
network.
BASIC NETWORK SECURITY
When connecting a matching to a network, we
need to make sure no one will easily break in to it.
Even if you don't think anyone will try to break into
your machines - chances are that someone might
try.
Crackers often run network scan utilities that
check a large range of IP addresses, and
automatically try to find machines running servers
with security holes.
To protect against that, one could simply disable
any unnecessary network service they are
running.
Need for Network Security
In the past, hackers were highly skilled programmers who
understood the details of computer communications and how to
exploit vulnerabilities. Today almost anyone can become a hacker
by downloading tools from the Internet.
These complicated attack tools and generally open networks have
generated an increased need for network security and dynamic
security policies.
The easiest way to protect a network from an outside attack is to
close it off completely from the outside world.
A closed network provides connectivity only to trusted known
parties and sites; a closed network does not allow a connection to
public networks.
SECURITY THREATS
the biggest network threats :-
• Viruses and Worms
• Trojan Horses
• SPAM
• Phishing
• Packet Sniffers
• Maliciously Coded Websites
• Password Attacks
• Hardware Loss and Residual Data Fragments
• Shared Computers
• Zombie Computers and Botnets
TYPES OF NETWORK SECURITY
VPN
Web Security
Wireless Security
Firewalls
Email Security
Application Security
Network Access Control
Mobile Device Security
Antivirus And Antimalware Software
VPN :- A virtual private network, or VPN, is an encrypted connection
over the Internet from a device to a network. The encrypted
connection helps ensure that sensitive data is safely transmitted.
It prevents unauthorized people from eavesdropping on the
traffic and allows the user to conduct work remotely. VPN
technology is widely used in corporate environments.
WEB SECURITY:- A web security solution will control your staff’s
web use, block web-based threats, and deny
access to malicious websites. It will protect your
web gateway on site or in the cloud. "Web
security" also refers to the steps you take to
protect your own website.
WIRELESS SECURITY :-
Wireless networks are not as secure as wired ones. Without stringent
security measures, installing a wireless LAN can be like putting
Ethernet ports everywhere, including the parking lot. To prevent an
exploit from taking hold, you need products specifically designed to
protect a wireless network.
Firewalls put up a barrier between your trusted
Firewall :- internal network and untrusted outside networks,
such as the Internet. They use a set of defined rules to
allow or block traffic. A firewall can be hardware,
software, or both.
Internet DMZ
Web server, email server,
Firewall
Firewall
web proxy, etc
Intranet
EMAIL SECURITY :- Email security refers to the collective measures
used to secure the access and content of an
email account or service. It allows an individual or
organization to protect the overall access to one
or more email addresses/accounts.
Application Security :-
Any software you use to run your business needs to be protected, whether
your IT staff builds it or whether you buy it. Unfortunately, any application may
contain holes, or vulnerabilities, that attackers can use to infiltrate your
network. Application security encompasses the hardware, software, and
processes you use to close those holes.
Network Access Control :-
Not every user should have access to your network. To keep
out potential attackers, you need to recognize each user and
each device. Then you can enforce your security policies. You
can block noncompliant endpoint devices or give them only
limited access. This process is network access control (NAC)
MOBILE DEVICE SECURITY :-
Cybercriminals are increasingly targeting mobile devices and apps. Within the
next 3 years, 90 percent of IT organizations may support corporate applications
on personal mobile devices. Of course, you need to control which devices can
access your network. You will also need to configure their connections to keep
network traffic private.
Antivirus And Antimalware Software :-
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware,
and spyware. Sometimes malware will infect a network but lie dormant for days or even
weeks. The best antimalware Programs not only scan for malware upon entry, but also
continuously track files afterward to find anomalies, remove malware, and fix damage.
AUTHENTICATION
One-factor authentication – this is
“something a user knows.” The most
recognized type of one-factor
authentication method is the
password.
Two-factor authentication – in
addition to the first factor, the second
factor is “something a user has.”
Three-factor authentication – in
addition to the previous two factors,
the third factor is “something a user
is.”
NETWORK ATTACKS METHODS
Eavesdropping – Interception of communications by an
unauthorized party
Data Modification – Data altering, reading from unauthorized
party
Identity Spoofing (IP Address Spoofing) – IP address to be falsely
assumed— identity spoofing and the attacker can modify,
reroute, or delete your data
Password-Based Attacks – By gaining your access rights to a
computer and network resources are determined by who you
are, that is, your user name and your password.
CYBERSECURITY
• Cybersecurity is the practice of protecting systems, networks, and programs
from digital attacks. These cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting money from users; or
interrupting normal business processes.
ENCRYPTION
• In computing, encryption is the method by which plaintext or any other type of data is converted from a
readable form to an encoded version that can only be decoded by another entity if they have access to
a decryption key. Encryption is one of the most important methods for providing data security,
especially for end-to-end protection of data transmitted across networks.
ADVANTAGE
Advantages Of Network Security
- Network Security helps in protecting personal data of clients existing on network.
- Network Security facilitates protection of information that is shared between
computers on the network.
- Hacking attempts or virus / spyware attacks from the internet will not be able to harm
physical computers. External possible attacks are prevented.
- Network Security provides different levels of access. If there are various computers
attached to a network, there may be some computers that may have greater access to
information than others.
- Private networks can be provided protection from external attacks by closing them off
from internet. Network Security makes them safe from virus attacks, etc.
DISADVANTAGE
Computer networks are typically a shared
resource used by many applications representing
different interests.
The Internet is particularly widely shared, being
used by competing businesses, mutually
antagonistic governments, and opportunistic
criminals.
CONCLUSION
• That is why network security is an important field that is
increasingly gaining attention as the Internet usage increases.
• The security threats and Internet protocols were analyzed to
determine the necessary security technology.
• However, the current development in network security is not
very impressive and significant.
Thank You