Presentation
on
NETWORK SECURITY
By Syed Azam , BCA Group “c”
Semester IV , Year 2nd, Roll No. 1501018183
Integral University , Lucknow
sayyedazam246@gmail.com
NETWORK SECURITY
1. INTRODUCTION:- Network security is protection
of the access to files and directories in a computer
network against hacking, misuse and unauthorized
changes to the system.
TYPES OF NETWORKS
• Local Area Network is a computer network that spans a
relatively small area. Most often, a LAN is confined to a single
room, building or group of buildings,
INTERCONNECTED NETWORKS
• Internetworking is the practice of connecting a
computer network with other networks through the use of
gateways that provide a common method of routing
information packets between the networks
HETEROGENEOUS NETWORKS
• A Heterogeneous Network is a network connecting
computers and other devices with different
operating systems and/or protocols.
CAMPUS AREA NETWORK (CAN)
• Campus Area Network (CAN) is a computer network.
It is made up of two or more Local Area Networks
(LANs) within a limited area.
METROPOLITAN AREA NETWORK
(MAN)
• Metropolitan Area Network (MAN) is the
interconnection of networks in a city. Generally,
Metropolitan Area Network (MAN) is not owned by a
single organization.
WIDE AREA NOTWORK (WAN)
• Wide Area Network (WAN) covers a wide geographical area
which includes multiple computers or Local Area Networks
(LANs).
REMOTE ACCESS
• Remote access is the ability to get access to a
computer or a network from a remote distance.
Why do we need security?
• Protect vital information while still allowing
access to those who need it
– Trade secrets, medical records, etc.
• Provide authentication and access control for
resources
– Ex: AFS
Who is Vulnerable?
• Financial institutions and banks
• Internet service providers
• Pharmaceutical companies
• Government and defense agencies
• Multinational corporations
• ANYONE ON THE NETWORK
WHAT ARE THE THREATS?
• Natural disaster
• Computer Viruses
• Hacker Attack
• The biggest problem with the hacker threat is
that hacking is fun!
AREAS OF SECURITY WEAKNESS
• Well-known (and easily guessed) passwords
• Poorly implemented logon settings
• Disks and electronic mail that carry viruses
WHO ARE THE HACKERS?
• Common People
• Computer Expert
• Professional for Hacking
THE INTERNAL THREAT
• Recent online survey by Network World magazine
revealed that most security experts and readers felt
that internal employees were the biggest threat to
their information systems
METHODS OF ATTACKS
A denial-of-service (DoS) is any type of attack where the
attackers (hackers) attempt to prevent legitimate users
from accessing the service.
TCP Attacks
 A TCP sequence prediction attack is an attempt to predict the sequence number
used to identify the packets in a TCP connection, which can be used to counterfeit
packets. The attacker hopes to correctly guess the sequence number to be used by
the sending host
Packet Sniffing Attacks
 Packet sniffing, a network attack strategy, captures network traffic at the
Ethernet frame level. After capture, this data can be analysed and
sensitive information can be retrieved.
Back Door Attacks
• Attacker gaining access to a network and
insert a program or utility that creates an
entrance for an attacker.
Password Guessing Attacks
• Password Guessing Attacks - This occur when an account is
attacked repeatedly. This is accomplished by sending possible
passwords to an account in a systematic manner.
 Brute-Force Attack
 Dictionary Attack
COUNTER MEASURES
DEFINING SECURITY
Identification and authentication
Access control
Accountability and auditing
Data exchange
SECURITY COSTS
• Consider how much your organization can afford to
spend on security.
• There are also direct costs, such as equipment costs,
as well as administrative expenses.
PROTECTIVE MEASURES
• Create security policies, plans, and job positions as
appropriate.
• Set up a security-response team, experts who
handle security problems
FAULT TOLERANCE AND REDUNDANT
SYSTEMS
• Fault-tolerant systems are designed to withstand
hardware failures.
• A fault-tolerant feature called disk mirroring writes
data to two disks at the same time.
BACKUPS
Backups are essential. You already know that.
• If your systems are stolen, destroyed by fire, or
corrupted by hackers, you'll need to go back to the
last uncorrupted backup.
ENCRYPTION
• You can use cryptographic techniques to protect files
stored on disks and backups from prying eyes, or to
conceal data transmissions and electronic mail.
Firewalls
• Basic problem – many network applications and
protocols have security problems that are fixed over
time.
• Administrators limit access to end hosts by using a
firewall
• Firewall is kept up-to-date by administrators
VIRUS PROTECTION
Viruses are a real threat to your network
They are easily contracted form unknown disks or by
downloading files form online services, bulletin boards,
and the Internet.
Antivirus Software
Detecting and Cleaning up a virus infection
Improve Security
SOCIAL PROBLEM
People can be just as dangerous as unprotected
computer systems
– People can be lied to, manipulated, bribed,
threatened, harmed, tortured, etc. to give up
valuable information
CONCLUSION
• Conclude my seminar saying that as hackers and
many algorithms are there to break passwords and
much valuable information, which leads to a great
loss .
• Hence network security provides the remedy by
many ways.
THANK YOUBy Syed Azam, BCA

Network security (syed azam)

  • 1.
    Presentation on NETWORK SECURITY By SyedAzam , BCA Group “c” Semester IV , Year 2nd, Roll No. 1501018183 Integral University , Lucknow [email protected]
  • 2.
    NETWORK SECURITY 1. INTRODUCTION:-Network security is protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system.
  • 3.
    TYPES OF NETWORKS •Local Area Network is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings,
  • 4.
    INTERCONNECTED NETWORKS • Internetworkingis the practice of connecting a computer network with other networks through the use of gateways that provide a common method of routing information packets between the networks
  • 5.
    HETEROGENEOUS NETWORKS • AHeterogeneous Network is a network connecting computers and other devices with different operating systems and/or protocols.
  • 6.
    CAMPUS AREA NETWORK(CAN) • Campus Area Network (CAN) is a computer network. It is made up of two or more Local Area Networks (LANs) within a limited area.
  • 7.
    METROPOLITAN AREA NETWORK (MAN) •Metropolitan Area Network (MAN) is the interconnection of networks in a city. Generally, Metropolitan Area Network (MAN) is not owned by a single organization.
  • 8.
    WIDE AREA NOTWORK(WAN) • Wide Area Network (WAN) covers a wide geographical area which includes multiple computers or Local Area Networks (LANs).
  • 9.
    REMOTE ACCESS • Remoteaccess is the ability to get access to a computer or a network from a remote distance.
  • 10.
    Why do weneed security? • Protect vital information while still allowing access to those who need it – Trade secrets, medical records, etc. • Provide authentication and access control for resources – Ex: AFS
  • 11.
    Who is Vulnerable? •Financial institutions and banks • Internet service providers • Pharmaceutical companies • Government and defense agencies • Multinational corporations • ANYONE ON THE NETWORK
  • 12.
    WHAT ARE THETHREATS? • Natural disaster • Computer Viruses • Hacker Attack • The biggest problem with the hacker threat is that hacking is fun!
  • 13.
    AREAS OF SECURITYWEAKNESS • Well-known (and easily guessed) passwords • Poorly implemented logon settings • Disks and electronic mail that carry viruses
  • 14.
    WHO ARE THEHACKERS? • Common People • Computer Expert • Professional for Hacking
  • 15.
    THE INTERNAL THREAT •Recent online survey by Network World magazine revealed that most security experts and readers felt that internal employees were the biggest threat to their information systems
  • 16.
    METHODS OF ATTACKS Adenial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service.
  • 17.
    TCP Attacks  ATCP sequence prediction attack is an attempt to predict the sequence number used to identify the packets in a TCP connection, which can be used to counterfeit packets. The attacker hopes to correctly guess the sequence number to be used by the sending host
  • 18.
    Packet Sniffing Attacks Packet sniffing, a network attack strategy, captures network traffic at the Ethernet frame level. After capture, this data can be analysed and sensitive information can be retrieved.
  • 19.
    Back Door Attacks •Attacker gaining access to a network and insert a program or utility that creates an entrance for an attacker.
  • 20.
    Password Guessing Attacks •Password Guessing Attacks - This occur when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner.  Brute-Force Attack  Dictionary Attack
  • 21.
    COUNTER MEASURES DEFINING SECURITY Identificationand authentication Access control Accountability and auditing Data exchange
  • 22.
    SECURITY COSTS • Considerhow much your organization can afford to spend on security. • There are also direct costs, such as equipment costs, as well as administrative expenses.
  • 23.
    PROTECTIVE MEASURES • Createsecurity policies, plans, and job positions as appropriate. • Set up a security-response team, experts who handle security problems
  • 24.
    FAULT TOLERANCE ANDREDUNDANT SYSTEMS • Fault-tolerant systems are designed to withstand hardware failures. • A fault-tolerant feature called disk mirroring writes data to two disks at the same time.
  • 25.
    BACKUPS Backups are essential.You already know that. • If your systems are stolen, destroyed by fire, or corrupted by hackers, you'll need to go back to the last uncorrupted backup.
  • 26.
    ENCRYPTION • You canuse cryptographic techniques to protect files stored on disks and backups from prying eyes, or to conceal data transmissions and electronic mail.
  • 27.
    Firewalls • Basic problem– many network applications and protocols have security problems that are fixed over time. • Administrators limit access to end hosts by using a firewall • Firewall is kept up-to-date by administrators
  • 28.
    VIRUS PROTECTION Viruses area real threat to your network They are easily contracted form unknown disks or by downloading files form online services, bulletin boards, and the Internet. Antivirus Software Detecting and Cleaning up a virus infection Improve Security
  • 29.
    SOCIAL PROBLEM People canbe just as dangerous as unprotected computer systems – People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information
  • 30.
    CONCLUSION • Conclude myseminar saying that as hackers and many algorithms are there to break passwords and much valuable information, which leads to a great loss . • Hence network security provides the remedy by many ways. THANK YOUBy Syed Azam, BCA