Eminar On Omputer Etwork Security
Eminar On Omputer Etwork Security
Eminar On Omputer Etwork Security
SECURITY
SUBMITTED BY:
SWADHINA PATEL
SIC NO-180719018
CONTENT:
•What is a network
•Introduction
•What is Network Security
•History
•Need for Network Security
• types
•Authentication
•Network attacks methods
•Advantages
•Disadvantages
•Network security architecture
•conclusion
WHAT IS A NETWORK?
Computer network is a collection of computers also
nodes which are connected to each other using some
protocols.
Protocols are set of rules that define how the
communication is going to happen
INTRODUCTION:
Information security is the process of securing
information data from unauthorized access , use,
modification, tempering.
Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
However ,as more and more people become
“wired", an increasing number of people need to
understand the basics of security in a networked
world.
WHAT IS NETWORK SECURITY
Network security is any action an origination
takes to prevent malicious use or accidental
damage to the network’s private data, its users,
or their devices.
The goal of network security is to keep the
network running and safe for all users.
Network security helps in protecting personal
data of clients existing on network.
Network security provides different levels of
access. If there are various computers attached to
a network, there may be some computers that
HISTORY
Internet security has been an issue since the
internet rose to an international phenomenon.
By 1996,the internet already connected 13
million computers, so early security protocols
were required.
These protocols required computer information
to be confidential, available, and have integrity.
Because the internet made information available
to everyone, people needed network security to
make their information
NEED FOR NETWORK SECURITY
In the past ,hackers were highly skilled
programmers who understand the details of
computer communication and how to exploit
vulnerabilities . today almost anyone can become
a hacker by downloading tools from the internet.
These complicated attack tools and generally
open networks have generated an increased need
for network security and dynamic security
policies.
TYPES:
1. Wi-Fi Protected Access(WPA)
WPA encrypts information, and checks to make
sure that the network security key has not been
modified.
WAP also authenticated users to help ensure
that only authorized people can access the
network.
WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
TYPES…
2. Wired Equivalent Privacy(WEP)
WEP is an older network security method that is
still available to support older devices, but it is
no longer recommended.
When you enable WEP, you set up a network
security key.
This key encrypts the information that one
computer send to another computer across your
network. However , WEP security is relatively
easy to crack.
AUTHENTICATION
One-factor authentication-this is “something a
user knows.”The most recognized type of one-
factor authentication method is the password.
Advantages Disadvantages
protectspersonal data of shared resource used by
clients existing on many applications
network representing different
protection of interests.
information that is network conversation or
shared between a distributed application
computers on the may be compromised by
network. an adversary.
provides different levels mutually antagonistic
of access. opportunistic criminals.
NETWORK SECURITY ARCHITECTURE