0% found this document useful (0 votes)
76 views13 pages

Computer and Network Security

Computer and network security consists of measures to monitor and prevent unauthorized access. It involves assigning user IDs and passwords, and aspects like privacy, message integrity, authentication, and non-repudiation. Privacy means encrypting messages so only the sender and receiver can understand. Message integrity ensures data arrives unchanged. Authentication verifies the sender's identity. Non-repudiation allows proving the sender's identity. Network security uses tools like firewalls, sandboxing, and intrusion prevention systems to control access and detect threats.

Uploaded by

Debmalya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views13 pages

Computer and Network Security

Computer and network security consists of measures to monitor and prevent unauthorized access. It involves assigning user IDs and passwords, and aspects like privacy, message integrity, authentication, and non-repudiation. Privacy means encrypting messages so only the sender and receiver can understand. Message integrity ensures data arrives unchanged. Authentication verifies the sender's identity. Non-repudiation allows proving the sender's identity. Network security uses tools like firewalls, sandboxing, and intrusion prevention systems to control access and detect threats.

Uploaded by

Debmalya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

COMPUTER AND NETWORK SECURITY

Prepared By,
Debmalya Singha
Class- VIIIC
Roll no – 9
INTRODUCTION
 Computer network security consists of measures taken by business or
some organizations to monitor and prevent unauthorized access from
the outside attackers.
 Different approaches to computer network security management have
different requirements depending on the size of the computer
network. For example, a home office requires basic network security
while large businesses require high maintenance to prevent the
network from malicious attacks.
 Network Administrator controls access to the data and software on the
network. A network administrator assigns the user ID and password to
the authorized person.
ASPECTS OF NETWORK SECURITY

Privacy

Aspects of
Non network Message
repudiation security integrity

Authentication
ASPECTS OF NETWORK SECURITY
Privacy:
Privacy means both the sender and the receiver expects
confidentiality.
The transmitted message should be sent only to the intended
receiver while the message should be opaque for other users.
Only the sender and receiver should be able to understand the
transmitted message as eavesdroppers can intercept the message.
Therefore, there is a requirement to encrypt the message so that the
message cannot be intercepted.
This aspect of confidentiality is commonly used to achieve secure
communication.
ASPECTS OF NETWORK SECURITY
Message Integrity :
 Data integrity means that the data must arrive at the
receiver exactly as it was sent.
 There must be no changes in the data content during

transmission, either maliciously or accident, in a transit .


End-point authentication :

Authentication means that the receiver is sure of the


senders identity, i.e., no imposter has sent the message.
ASPECTS OF NETWORK SECURITY
Non-Repudiation :

 Non-Repudiation means that the receiver must be able to prove


that the received message has come from a specific sender.
 The sender must not deny sending a message that he or she
send. The burden of proving the identity comes on the receiver.
 For example, if a customer sends a request to transfer the
money from one account to another account, then the bank
must have a proof that the customer has requested for the
transaction.
WHAT IS NETWORK SECURITY
 Network Security protects your network and data from breaches,
intrusions and other threats. This is a vast and overarching term that
describes hardware and software solutions as well as processes or
rules and configurations relating to network use, accessibility, and
overall threat protection.
 Network Security involves access control, virus and antivirus software,
application security, network analytics, types of network-related
security (endpoint, web, wireless), firewalls, VPN encryption and
more.
TYPES OF NETWORK SECURITY
Firewall:
 Firewall network Security protects your network and data from
breaches, intrusions and other threats. This is a vast and overarching
term that describes hardware and software solutions as well as
processes or rules and configurations relating to network use,
accessibility, and overall threat protection.

 Network Security involves access control, virus and antivirus


software, application security, network analytics, types of network-
related security (endpoint, web, wireless), firewalls, VPN encryption
and more.
TYPES OF NETWORK SECURITY
Sandboxing:
 Sandboxing is a cybersecurity practice where you run code or
open files in a safe, isolated environment on a host machine
that mimics end-user operating environments.
 Sandboxing observes the files or code as they are opened and
looks for malicious behavior to prevent threats from getting on
the network.
 Forexample malware in files such as PDF, Microsoft Word,
Excel and PowerPoint can be safely detected and blocked
before the files reach an unsuspecting end user.
TYPES OF NETWORK SECURITY
Intrusion Prevention Systems (IPS) :

 IPS can detect or prevent network security attacks such as brute force
attacks, Denial of Service (DoS) attacks and exploits of known
vulnerabilities.
A vulnerability is a weakness for instance in a software system and an
exploit is an attack that leverages that vulnerability to gain control of that
system.
 When an exploit is announced, there is often a window of opportunity for
attackers to exploit that vulnerability before the security patch is applied.
 An Intrusion Prevention System can be used in these cases to quickly
block these attacks.
TYPES OF NETWORK SECURITY
Email Security :

 E-mail security refers to any processes, products, and


services designed to protect your email accounts and email
content safe from external threats.
 Most email service providers have built-in email security
features designed to keep you secure, but these may not
be enough to stop cybercriminals from accessing your
information
ACCESS CONTROL
 
 Access control defines the people or groups and the
devices that have access to network applications and
systems thereby denying unsanctioned access, and
maybe threats.
 Integrations with Identity and Access Management (IAM)
products can strongly identify the user and Role-based
Access Control (RBAC) policies ensure the person and
device are authorized access to the asset.
Thank You..

You might also like