Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Network Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

NETWORK SECURITY

Presented by,
S. RASITHA
P. SWEATHA
III year ECE
INTRODUCTION:
 Network security
consists of the
provisions and policies
adopted by a network
administrator to
prevent and monitor
unauthorized access,
misuse, modification,
or denial of a computer
network and network-
accessible resources.
NETWORK SECURITY CONCEPTS
Network security starts with
authenticating, commonly
with a username and a
password. i.e. the password—
this is sometimes termed one-
factor authentication.
• two-factor authentication,
something the user 'has' is
also used (e.g. a security
token or 'dongle', an ATM
card, or a mobile phone)
• *three-factor authentication,
something the user 'is' is also
used (e.g. a fingerprint or
retinal scan).
TYPES OF NETWORK SECURITY

 Wi - Fi Protected
Access (WPA)
 Wired Equivalent
Privacy (WEP)
 802.1X authentication

 MAC Address

 Authentication
SECURITY MANAGEMENT
 Security management for
networks is different for all
kinds of situations. A home or
small office may only require
basic security while large
businesses may require high-
maintenance and advanced
software and hardware to
prevent malicious attacks from
hacking and spamming.
TYPES OF ATTACKS
Passive Network
 wiretapping
 Port scanner

 Idle scan

Active
 Smurf attack
 Buffer overflow
 Heap overflow
HOW DOES NETWORK SECURITY WORK?
 Network security is accomplished through hardware
and software. The software must be constantly
updated and managed to protect you from emerging
threats.
 A network security system usually consists of many
components. Ideally, all components work together,
which minimizes maintenance and improves security.
 Network security components often include:
 Anti-virus and anti-spyware
 Firewall, to block unauthorized access to your
network
 Intrusion prevention systems (IPS), to identify fast-
spreading threats, such as zero-day or zero-hour
attacks
 Virtual Private Networks (VPNs), to provide secure
remote access
WHAT ARE THE BUSINESS BENEFITS OF
NETWORK SECURITY?
 With network security in place, your
company will experience many business
benefits. Your company is protected against
business disruption, which helps keep
employees productive. Network security
helps your company meet mandatory
regulatory compliance. Because network
security helps protect your customers' data, it
reduces the risk of legal action from data
theft.
 Ultimately, network security helps protect a
business's reputation, which is one of its most
important assets.
WHAT IS NETWORK SECURITY AND HOW
DOES IT PROTECT YOU?
 Many network security threats today are spread
over the Internet. The most common include:
 Viruses, worms, and Trojan horses

 Spyware and adware

 Zero-day attacks, also called zero-hour attacks

 Hacker attacks

 Denial of service attacks

 Data interception and theft

 Identity theft
NETWORK SECURITY TOOLS
 Network Based
Firewalls
 Host Based Firewalls

 Network Based IDS's

 Host Based IDS's


CONCLUSION

I conclude my presentation
sayings that as hackers and
many algorithms are there to
break passwords and mush
valuable information will be
loss so, network security is
very important for us.
THANK YOU
THANK YOU

You might also like