Osi Layer
Osi Layer
SECURITY ATTACKS
ACTIVE ATTACK
ACTIVE ATTACK
ACTIVE ATTACK
Communication will takes place
SECURITY SERVICES
SECURITY SERVICES
SECURITY MECHANISM
SECURITY MECHANISM
MODEL NETORK SECURITY
FOUR STEPS PROCESS
NETWORK ACCESS MODEL
MONITORING
THANK YOU