Network
Network
Interconnection of
two or more
computers that are
connected with one
another for purpose
of communicating
data electronically.
2
NETWORK SECURITY-The Present Day Need…
Security Violation
Computer or network
security violates
when there occurs an
illegal access by any
party .
3
NETWORK SECURITY-The Present Day Need…
Why Security?
Privacy or
confidentiality
Data integrity
Authentication and
Non-repudiation
5
NETWORK SECURITY-The Present Day Need…
Security Goals
Security Goals
Data integrity is a
service which addresses Privacy
unauthorized alteration Data integrity
of data. Data Authentication
manipulation includes Non-repudiation
such things as insertion,
deletion & substitution.
7
NETWORK SECURITY-The Present Day Need…
Security Goals
Privacy
Data integrity
Authentication
Non-repudiation
8
NETWORK SECURITY-The Present Day Need…
Security Goals
Non-repudiation is a Privacy
service which prevents
Data integrity
an entity from denying
previous commitments Authentication
or actions. Non-repudiation
9
NETWORK SECURITY-The Present Day Need…
Types Of Security
11
TYPES OF SECURITY THREATS
• DENIAL OF SERVICE.
• EAVESDROPPING
• UNAUTHORIZED ACCESS
• CONFIDENTIALITY BREACHES
• PACKET REPLAY
• PACKET MODIFICATION
12
Security attacks
13
Security Attacks
And Techniques
TECHNIQUES
•ATTACKS
Cryptography
• Viruses & Worms
Firewalls
Password attack
14
VIRUSES & WORMS
A virus consists of a set of instructions that
attaches itself to other computer programs.
Usually virus will spread before it will do
anything that may alert the user to its
presence.
Eg::: C-Brain, Macmag , Com Exe
A worm attaches itself to e-mail msg & infects
a comp. when you open the e-mail or
attachment
Eg::: Navidad worm, lifestages and I love you
15
NETWORK SECURITY-The Present Day Need…
Trojan horse attack
16
NETWORK SECURITY-The Present Day Need…
Logic bombs
17
NETWORK SECURITY-The Present Day Need…
Password Attack
Password Policy
21
Network Firewall (contd..)
A firewall filters the traffic flowing between an
internal private network (trusted) and an
external public network (untrusted) in order to
protect the internal network. It is interesting
to note that a firewall not only protects the
internal network from attacks from the
outside , but it also filters what data can leave
the network as well.
22
Network security tools
• Antivirus software packages
• Secure network infrastructure
• Virtual private network
• Identity services
• Encryption
FACT: None of these tools alone will be
sufficient to protect a network, but when they
are layered together, they can be highly
effective in keeping a network safe from
attacks and other threats to security
23
NETWORK SECURITY-The Present Day Need…
Precautions
User Education
Do not open mail from unknown originators.
When opening the file, first open it in a plain
text editor such as Notepad to be sure it is
really a text file.
Update Software Security Patches .
Don’t hide the extensions of files.
Approved Software.
24
NETWORK SECURITY-The Present Day Need…
CONCLUSION
Computer security is almost a statistical game.
It can reduce but not eliminate the chance that
we may be penetrated by an intruder or virus.
It is considered that an operating system
without a network interface can be completely
secure, but even this cannot be guaranteed.
We can opt the methods to reduce , since it is
impossible to eliminate all security violations as
crackers always appear to be one step ahead of
security experts!
Prevention is better than cure.
25
THANKS
26
27
???????Any Queries???????
28