Eminar On Omputer Etwork Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

SEMINAR ON COMPUTER NETWORK

SECURITY

SUBMITTED BY:
SWADHINA PATEL
SIC NO-180719018
CONTENT:
•What is a network
•Introduction
•What is Network Security
•History
•Need for Network Security
• types
•Authentication
•Network attacks methods
•Advantages
•Disadvantages
•Network security architecture
•conclusion
WHAT IS A NETWORK?
 Computer network is a collection of computers also
nodes which are connected to each other using some
protocols.
 Protocols are set of rules that define how the
communication is going to happen
INTRODUCTION:
 Information security is the process of securing
information data from unauthorized access , use,
modification, tempering.
 Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
 However ,as more and more people become
“wired", an increasing number of people need to
understand the basics of security in a networked
world.
WHAT IS NETWORK SECURITY
 Network security is any action an origination
takes to prevent malicious use or accidental
damage to the network’s private data, its users,
or their devices.
 The goal of network security is to keep the
network running and safe for all users.
 Network security helps in protecting personal
data of clients existing on network.
 Network security provides different levels of
access. If there are various computers attached to
a network, there may be some computers that
HISTORY
 Internet security has been an issue since the
internet rose to an international phenomenon.
 By 1996,the internet already connected 13
million computers, so early security protocols
were required.
 These protocols required computer information
to be confidential, available, and have integrity.
 Because the internet made information available
to everyone, people needed network security to
make their information
NEED FOR NETWORK SECURITY
 In the past ,hackers were highly skilled
programmers who understand the details of
computer communication and how to exploit
vulnerabilities . today almost anyone can become
a hacker by downloading tools from the internet.
 These complicated attack tools and generally
open networks have generated an increased need
for network security and dynamic security
policies.
TYPES:
1. Wi-Fi Protected Access(WPA)
 WPA encrypts information, and checks to make
sure that the network security key has not been
modified.
 WAP also authenticated users to help ensure
that only authorized people can access the
network.
 WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
TYPES…
2. Wired Equivalent Privacy(WEP)
 WEP is an older network security method that is
still available to support older devices, but it is
no longer recommended.
 When you enable WEP, you set up a network
security key.
 This key encrypts the information that one
computer send to another computer across your
network. However , WEP security is relatively
easy to crack.
AUTHENTICATION
 One-factor authentication-this is “something a
user knows.”The most recognized type of one-
factor authentication method is the password.

 Two-factor authentication- in addition to the first


factor , the second factor is "something a user
has.”
SECURITY ATTACKS
 Interruption: this is an attack on availability
 Interception: this is an attack on confidentiality

 Modification: this is an attack on integrity

 Fabrication: this is an attack on authenticity


CLASSIFY SECURITY ATTACKS AS
 Passive attacks-
Eavesdropping on, or monitoring of, transmission
to:
-obtain message contents, or
-monitor traffic flows
 Active attacks-
Modification of data stream to:
-masquerade of one entity as some other :man-in-
the-middle
-reply previous messages
-modify messages in transit
-denial of service
ADVANTAGES/DISADVANTAGES

Advantages Disadvantages
 protectspersonal data of  shared resource used by
clients existing on many applications
network representing different
 protection of interests.
information that is  network conversation or
shared between a distributed application
computers on the may be compromised by
network. an adversary.
 provides different levels  mutually antagonistic
of access. opportunistic criminals.
NETWORK SECURITY ARCHITECTURE

 What & why


-an organization's network infrastructure evolves over
many years.
-although this evolution is in direct response to the
changing business needs, in many cases security has
been an afterthought.
-even implemented the most advanced security
technologies of the day won’t help if the underlying
security architecture is flawed.
HOW?
o Systematic approach to the evolution of the current
state ensures a detailed review of the current
architecture, technology & security policy of the
organization ,management practices and planned
changes.
Some of the aspects that will be examined are:
 Review latest threat Risk Analysis report.

 Analysis of current IT network, information flow


according to business requirements and points of
access to information.
CONCLUSION
 network security is an important field that is
increasingly gaining attention as the internet
usage increases.
 The security threats and internet protocols were
analyzed to determine the necessary security
technology,
 However, the current development in network
security is not very impressive and significant.
THANK YOU
Q/A

You might also like