0% found this document useful (0 votes)
139 views14 pages

Network Security: by Unknown Author Is Licensed Under

Network security involves protecting a network and its resources against threats. It is handled by a network administrator and involves multiple layers of security through hardware and software components like firewalls, antivirus software, and encryption. Some key aspects of network security include access control, authentication, confidentiality, integrity, and non-repudiation. Common security tools and technologies used include cryptography, public key cryptography, firewalls, secure socket layer, security protocols, and network security services.

Uploaded by

madeti goutham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views14 pages

Network Security: by Unknown Author Is Licensed Under

Network security involves protecting a network and its resources against threats. It is handled by a network administrator and involves multiple layers of security through hardware and software components like firewalls, antivirus software, and encryption. Some key aspects of network security include access control, authentication, confidentiality, integrity, and non-repudiation. Common security tools and technologies used include cryptography, public key cryptography, firewalls, secure socket layer, security protocols, and network security services.

Uploaded by

madeti goutham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Network security

This Photo by Unknown Author is licensed under CC BY


NETWORK SECURITY
NETWORK SECURITY
• A Network is a series of points or nodes • Define Security
interconnected by • Security is “Freedom from risk or danger.“
• communication paths. • The ability of a system to protect
• Interconnect with other networks and contain information and system
sub networks. • resources with respect to confidentiality and
integrity.
NETWORK SECURITY
• Any activities designed to protect your network
• Target- variety of threats and stops them from entering or spreading
• on your network.
• Handled by a network administrator.
OBJECTIVE

• Access • Authentication Confidentiality

• Integrity • • Non-repudiation
TYPES
• Five types of network security can aid in secure
• networking.
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
WORKING
• We need multiple layers of security
• Network security is accomplished
• through hardware and software.
•Network security components:
• Anti-virus and anti-spyware
• Firewall
• Intrusion prevention systems
• Virtual Private Networks
SECURITY TOOLS
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual private network
• Identity services
• Encryption
• Security management
NETWORK SECURITY TECHNOLOGY :
• Different mechanisms to deal with these attacks.

• Cryptographic systems:
• plaintext is converted in to cipher text.
• Secret Key Cryptography (SKC)
• PUBLIC KEY CRYPTOGRAPHY
(PKC):
FIREWALL
• A typical border control mechanism.
• Metaphor for network security.
• Designed to prevent unauthorized access to or from a
• private network.
SECURE SOCKET LAYER (SSL)
• between a web browser and a
• It is a good level of security
• website.
• There is a tunnel between
• them.
• Clients present a certificate to
• the server to prove their
• identity.
SECURITY PROTOCOLS
• It is a short program aiming at securing
• communication over a network.
• Example:
• Transport layer security (TLS)
• PPP / Point-to-Point Protocol
• Internet Protocols security (IPSec)
IMPLEMENTATION
• Network Security Services (NSS) comprises a set of
• libraries
• It develops security-enabled client and server
• applications.

• Some are:
• Mozilla client products, including Firefox etc.
• Google Chrome
• Sun server products

You might also like