0% found this document useful (0 votes)
22 views28 pages

Network

Uploaded by

Gourav Gupta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views28 pages

Network

Uploaded by

Gourav Gupta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

1

NETWORK SECURITY-The Present Day Need…


Computer Network

Interconnection of
two or more
computers that are
connected with one
another for purpose
of communicating
data electronically.
2
NETWORK SECURITY-The Present Day Need…

Security Violation

Computer or network
security violates
when there occurs an
illegal access by any
party .

3
NETWORK SECURITY-The Present Day Need…

Why Security?

Computer security is required because most


organizations can be damaged by hostile
software or intruders. These include:
Damage or destruction of computer systems.
Damage or destruction of internal data.
Loss of sensitive information to unfriendly
parties.
Damage to the reputation of an organization.
4
NETWORK SECURITY-The Present Day Need…
Security Goals

Privacy or
confidentiality
Data integrity
Authentication and
Non-repudiation

5
NETWORK SECURITY-The Present Day Need…

Security Goals

It is a service used to keep


the content of information
secret from all, but those Privacy
authorized to have it. There Data integrity
are numerous approaches
Authentication
to providing confidentiality,
ranging from physical Non-repudiation
Protection by means of
mathematical algorithms
6
NETWORK SECURITY-The Present Day Need…

Security Goals

Data integrity is a
service which addresses Privacy
unauthorized alteration Data integrity
of data. Data Authentication
manipulation includes Non-repudiation
such things as insertion,
deletion & substitution.
7
NETWORK SECURITY-The Present Day Need…

Security Goals

Two parties entering into a communication


should identify each other.

Privacy
Data integrity
Authentication
Non-repudiation
8
NETWORK SECURITY-The Present Day Need…

Security Goals

Non-repudiation is a Privacy
service which prevents
Data integrity
an entity from denying
previous commitments Authentication
or actions. Non-repudiation

9
NETWORK SECURITY-The Present Day Need…
Types Of Security

Physical security::::: It Layered security :::::


means protection by It includes virus
tangible means. These protection,
include sensor devices protecting the most
that report unauthorized dangerous types of
removal of items, e-mail attachments
devices that can scan (the code red virus)
premises at night . from unrecognized
viruses and other
hostile software. 10
SECURITY THREATS
• A threat is a potential violation of security
• These are flaws in design, implementation,
and operation. It is a circumstance, event,
or condition with the potential to cause harm
to personnel and/or network resources in the
form of destruction, modification of data,
and/or fraud, waste, and abuse.

11
TYPES OF SECURITY THREATS

• DENIAL OF SERVICE.
• EAVESDROPPING
• UNAUTHORIZED ACCESS
• CONFIDENTIALITY BREACHES
• PACKET REPLAY
• PACKET MODIFICATION

12
Security attacks

An attack is any action that violates security


There are two types of attacks:
• ACTIVE ATTACK: It is an attack on a computer network
with the intent to insert
delete, modify data. It cannot be prevented
but detected and recovered.
• PASSIVE ATTACK: It is an attack on a computer
network with the intent to monitor network data
transmission to read messages or analyze traffic. Here
the emphasis is on prevention rather than detection.

13
Security Attacks
And Techniques

TECHNIQUES
•ATTACKS
Cryptography
• Viruses & Worms
Firewalls
Password attack

14
VIRUSES & WORMS
A virus consists of a set of instructions that
attaches itself to other computer programs.
Usually virus will spread before it will do
anything that may alert the user to its
presence.
Eg::: C-Brain, Macmag , Com Exe
A worm attaches itself to e-mail msg & infects
a comp. when you open the e-mail or
attachment
Eg::: Navidad worm, lifestages and I love you
15
NETWORK SECURITY-The Present Day Need…
Trojan horse attack

Trojan horse software


is software that
appears to have some
useful function, but
some hidden purpose
awaits inside.

16
NETWORK SECURITY-The Present Day Need…
Logic bombs

A logic bomb consists of hidden


instructions, often introduced
with the Trojan horse
technique, that stay dormant
until a specific event occurs, at
which time the instructions are
activated.

17
NETWORK SECURITY-The Present Day Need…

Password Attack

Passwords are a primary piece of information


that intruders will try to acquire in order to gain
unauthorized access to systems or networks .
Passwords should be chosen wisely and a
dictionary word should never be used.
The complexity requirements should include:::
-Lowercase
-Uppercase
-Numbers
-Special characters such as !@#$%^&*(){}[]
18
NETWORK SECURITY-The Present Day Need…

Password Policy

Logon passwords must be changed at least


every 90 days (30-60 days recommended).
Passwords must be at least 8 characters long
and use at least two numbers.
Passwords must be kept secret and not written
down.
Don't let programs save passwords.
Remember a sentence and go for options like
first letter of each word.
19
NETWORK SECURITY-The Present Day Need…
CRYPTOGRAPHY

Cryptography is the science of writing messages


that no one except the intended receiver
can read. “Cryptanalysis” is the science of reading
them anyway.
20
Network Firewall

The term firewall is used to refer to any


hardware or software that acts as a barrier
between connected networks. It can be a
router, gateway or special purpose computer
that monitors and controls the flow of data
between networks. A firewall functions as a
gatekeeper, monitoring and controlling what
information enters and leaves a network.

21
Network Firewall (contd..)
A firewall filters the traffic flowing between an
internal private network (trusted) and an
external public network (untrusted) in order to
protect the internal network. It is interesting
to note that a firewall not only protects the
internal network from attacks from the
outside , but it also filters what data can leave
the network as well.

22
Network security tools
• Antivirus software packages
• Secure network infrastructure
• Virtual private network
• Identity services
• Encryption
FACT: None of these tools alone will be
sufficient to protect a network, but when they
are layered together, they can be highly
effective in keeping a network safe from
attacks and other threats to security
23
NETWORK SECURITY-The Present Day Need…

Precautions
User Education
Do not open mail from unknown originators.
When opening the file, first open it in a plain
text editor such as Notepad to be sure it is
really a text file.
Update Software Security Patches .
Don’t hide the extensions of files.
Approved Software.

24
NETWORK SECURITY-The Present Day Need…
CONCLUSION
Computer security is almost a statistical game.
It can reduce but not eliminate the chance that
we may be penetrated by an intruder or virus.
It is considered that an operating system
without a network interface can be completely
secure, but even this cannot be guaranteed.
We can opt the methods to reduce , since it is
impossible to eliminate all security violations as
crackers always appear to be one step ahead of
security experts!
Prevention is better than cure.
25
THANKS

26
27
???????Any Queries???????

28

You might also like