CLICK HERE TO DOWNLOAD PPT ON Network Security
Network Security Presentation Transcript
1.Network Security
2.What is Security?
Why do we need Security?
What is vulnerability?
Who is vulnerable?
What is a Network?
Common Security attacks involves and countermeasures
Why do we need Security?
What is vulnerability?
Who is vulnerable?
What is a Network?
Common Security attacks involves and countermeasures
3.What is “SECURITY”
Dictionary.com says:
Freedom from risk or danger; safety.
Freedom from doubt, anxiety, or fear; confidence.
Something that gives or assures safety, as:
A group or department of private guards: Call building security if a visitor acts suspicious.
Measures adopted by a government to prevent espionage, sabotage, or attack.
Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
Dictionary.com says:
Freedom from risk or danger; safety.
Freedom from doubt, anxiety, or fear; confidence.
Something that gives or assures safety, as:
A group or department of private guards: Call building security if a visitor acts suspicious.
Measures adopted by a government to prevent espionage, sabotage, or attack.
Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
4. SECURITY
Security is the protection of information,
Systems and services against disasters, mistakes and manipulation so that the likelihood and impact of security incidents is minimized.
This includes contingency plans for what to do when attackers strike, keeping up with the latest CERT advisories, hiring network security consultants to find insecurities in your network, etc.
Security is the protection of information,
Systems and services against disasters, mistakes and manipulation so that the likelihood and impact of security incidents is minimized.
This includes contingency plans for what to do when attackers strike, keeping up with the latest CERT advisories, hiring network security consultants to find insecurities in your network, etc.
5.Why we need “Security”
Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for resources
Ex: AFS
Guarantee availability of resources
Ex: 5 9’s (99.999% reliability)
6.Essential Terminologies
System: A system is any of the following:
Computer systems
(e.g. mainframe, minicomputer.
Network Systems
(e.g. LAN)
Network domain, Host,Networy nodes ,routers, switches and firewalls.
Network and/or computer applications on each computer system.
7.Threat: An action or event that might compromise security. A threat is a potential violation of security.
Target: An IT system, product or component that is identified/subjected to require security evaluation.
Attack: An assault on the system security that is derived from an intelligent threat. An attack is any action that violates security
Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for resources
Ex: AFS
Guarantee availability of resources
Ex: 5 9’s (99.999% reliability)
6.Essential Terminologies
System: A system is any of the following:
Computer systems
(e.g. mainframe, minicomputer.
Network Systems
(e.g. LAN)
Network domain, Host,Networy nodes ,routers, switches and firewalls.
Network and/or computer applications on each computer system.
7.Threat: An action or event that might compromise security. A threat is a potential violation of security.
Target: An IT system, product or component that is identified/subjected to require security evaluation.
Attack: An assault on the system security that is derived from an intelligent threat. An attack is any action that violates security
8.What is vulnerability?
Existence of a weakness, design or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
Do u Know?
Vulnerabilities could be exploited directly by an attacker or indirectly through automated attacks such as DDOS attacks or by computer viruses.
Existence of a weakness, design or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
Do u Know?
Vulnerabilities could be exploited directly by an attacker or indirectly through automated attacks such as DDOS attacks or by computer viruses.
9.Who is Vulnerable?
10.What is a “Network”?
A Network is a connection of interconnected nodes which are connected with various Systems.
Node: A node is connection oriented point through which various components of the system are connected in one slot.
A Network is a connection of interconnected nodes which are connected with various Systems.
Node: A node is connection oriented point through which various components of the system are connected in one slot.
11.Types of attack possible on one Network
12.Types of Attack and their countermeasures
13.Finding a way into the network
Firewalls
Exploiting software bugs, buffer overflows
Intrusion Detection Systems
Denial of Service
Ingress filtering, IDS
TCP hijacking
IPsec
Packet sniffing
Encryption (SSH, SSL, HTTPS)
Social problems
Education
Firewalls
Exploiting software bugs, buffer overflows
Intrusion Detection Systems
Denial of Service
Ingress filtering, IDS
TCP hijacking
IPsec
Packet sniffing
Encryption (SSH, SSL, HTTPS)
Social problems
Education
14.Conclusions
The Internet works only because we implicitly trust one another
It is very easy to exploit this trust
The same holds true for software
It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
The Internet works only because we implicitly trust one another
It is very easy to exploit this trust
The same holds true for software
It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
0 comments