Network and network security

30
network & network security 1 Ruchi Gupta-144 NRO0312935

description

 

Transcript of Network and network security

Page 1: Network and network security

Ruchi Gupta-144 NRO0312935

network & network security

1

Page 2: Network and network security

Ruchi Gupta-144 NRO0312935 2

CONTENTIntroductionWhat is Network?Components of a NetworkBenefits of a NetworkTypes of NetworkNetwork TopologiesWhat is Network Security?Types of Network SecurityCommon Network Security

problemsWhy do we need security?Levels of SecurityThreats to Network

Security

Techniques of Network Security

Precautions to be takenConclusion

Page 3: Network and network security

Ruchi Gupta-144 NRO0312935 3

Introduction:-With the development of network

technologies and applications, network attacks are greatly increasing both in number and severity. With the ever-

increasing number and complexity of attacks, vigilant approaches to security

in both large and small enterprises are a must.

Page 4: Network and network security

Ruchi Gupta-144 NRO0312935 4

What is Network?

A computer network consists of a collection of computers, printers

and other equipment that is connected together so that they

can communicate with each other.

Page 5: Network and network security

Ruchi Gupta-144 NRO0312935 5

Computer networks have opened up an entire frontier in the world of computing called the client/server model

Page 6: Network and network security

Ruchi Gupta-144 NRO0312935 6

Components of a Network:-

A minimum of at least 2 computers Cables that connect the computers to each other, although wireless communication is becoming more common A network interface device on each computer (this is called a network interface card or NIC) A ‘Switch’ used to switch the data from one point to another. Hubsare outdated and are little used for new installations. Network operating system software Structured Cabling

Page 7: Network and network security

Ruchi Gupta-144 NRO0312935 7

BENEFITS OF A NETWORK:-Information sharing: Authorized users can use

other computers on the network to access and share information and data. This could include special group projects, databases, etc.

Hardware sharing: One device connected to a network, such as a printer or scanner, can be shared by many users.

Software sharing: Instead of purchasing and installing a software program on each computer, it can be installed on the server. All of the users can then access the program from a single location.

Collaborative environment: Users can work together on group projects by combining the power and capabilities of diverse equipment.

Page 8: Network and network security

Ruchi Gupta-144 NRO0312935 8

TYPES OF NETWORKS:-

Local Area Network (LAN) – a network that spans a small area such as a building or an office.

Wide Area Network (WAN) – a network that spans a wide geographical area; there are several types of WANS

Metropolitan Area Networks (MAN) –MAN connect multiple geographically nearby LANs to one another (over an area of up to a few dozen kilometers) at high speeds.

Page 9: Network and network security

Ruchi Gupta-144 NRO0312935 9

NETWORK TOPOLOGIES:-

Network Topology (or layout) – refers to the way computers and peripherals are configured to form networks• Bus topology – all computers are

linked by a single line of cable• Star topology – multiple computers

and peripheral devices are linked to a central computer, called a host• Ring topology – each computer or

workstation is connected to two other computers, with the entire network forming a circle• Hybrid topology – combine network

layout types to meet their needs

Page 10: Network and network security

Ruchi Gupta-144 NRO0312935 10

What is Network Security?Network security involves all activities

that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of

operations.

Page 11: Network and network security

Ruchi Gupta-144 NRO0312935 11

Physical

• To protect physical assets like CD, hard disk etc

Logical

• To protect logical assets like data, programs etc

Types of Network Security:-

Page 12: Network and network security

Ruchi Gupta-144 NRO0312935 12

Common Network Security Problems:-●Data Modification●Identity spoofing ●Network eavesdropping●Man in the Middle attacks●Denial of Service attacks●Application layer attacks

Page 13: Network and network security

Ruchi Gupta-144 NRO0312935 13

Why do we need security?Protect vital information while still

allowing access to those who need itProvide authentication and access

control for resourcesGuarantee availability of resources

Page 14: Network and network security

Ruchi Gupta-144 NRO0312935 14

Levels of Security:-Identify the asset which require securityValue the assets and accordingly analyze for level

of securityIdentify various threats to individual assetsIdentify the probability of threat occurrenceIdentify the amount of losses or exposure in case

of security breachPlan for appropriate controls to avoid threats or

security breachOutline report on level of security

Page 15: Network and network security

Ruchi Gupta-144 NRO0312935 15

Threats to Network Security:-

Fire

Water

Energy Variations like voltage fluctuations

Pollution like dust

Structural damages

Intrusion

Viruses and worms

Hacking of Data

Page 16: Network and network security

Ruchi Gupta-144 NRO0312935 16

Controls to overcome threats:-

Preventive Controls: using antivirus, fire-

extinguishers, etc

Detective Controls: Checking files,

executing regularly the antivirus

programs, etc

Corrective Controls: having a recovery plan

etc

Page 17: Network and network security

Ruchi Gupta-144 NRO0312935 17

Techniques

of Network

Security:-

Intrusion Detection System

Firewall

Data EncryptionIdentity

Services

Secure Network

infrastructure

Page 18: Network and network security

Ruchi Gupta-144 NRO0312935 18

Techniques of Network Security:-Intrusion Detection SystemFirewallData EncryptionSecure network infrastructureIdentity services

Page 19: Network and network security

Ruchi Gupta-144 NRO0312935 19

Intrusion Detection System(IDS):-

An intrusion detection system (IDS) is a device or software application that monitors

network or system activities for malicious activities or policy violations and produces

reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor

expected of a monitoring system. 

Page 20: Network and network security

Ruchi Gupta-144 NRO0312935 20

IDSNetwork Based Systems

Host Based Systems

Network Node Systems

Types of IDS:-

Page 21: Network and network security

Ruchi Gupta-144 NRO0312935 21

Intrusion Detection System(IDS)

Page 22: Network and network security

Ruchi Gupta-144 NRO0312935 22

Firewall:-A firewall can either be software-

based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network

traffic by analyzing the data packets and determining whether it should

be allowed through or not, based on a predetermined rule set. 

Page 23: Network and network security

Ruchi Gupta-144 NRO0312935 23

Types of firewall:

-

Network level

firewall

Application level

Firewall

Page 24: Network and network security

Ruchi Gupta-144 NRO0312935 24

FIREWALL

Page 25: Network and network security

Ruchi Gupta-144 NRO0312935 25

Data Encryption:-Encryption uses a mathematical

algorithm to scramble readable text that cannot be read unless the reader has the key to "unlock," or convert, the information back to its readable form. This means that your sensitive data cannot be accessed without you

providing a password.

Page 26: Network and network security

Ruchi Gupta-144 NRO0312935 26

DATA ENCRYPTION

Page 27: Network and network security

Ruchi Gupta-144 NRO0312935 27

Secure network infrastructure:-

Switches and routers have hardware and software features that support secure

connectivity, perimeter security, intrusion protection, identity services,

and security management.Dedicated network security hardware and

software-Tools such as firewalls and intrusion detection systems provide

protection for all areas of the network and enable secure connections.

Page 28: Network and network security

Ruchi Gupta-144 NRO0312935 28

Identity services:-These services help to identify users and control their activities and transactions

on the network. Services include passwords, digital certificates, and

digital authentication keys.

Page 29: Network and network security

Ruchi Gupta-144 NRO0312935 29

Precautions to be taken :-Hope you have backupsDon't put data where it doesn't need to

beAvoid systems with single points

of failure Stay current with relevant operating

system patches Have someone on staff be familiar with

security practices 

Page 30: Network and network security

Ruchi Gupta-144 NRO0312935 30

Conclusion:-With the increased number of threats to networks

such as worms, viruses and clever hackers, security can no longer be viewed as an option, even within “private” networks.

Today, the amount of time spent repairing a network due to just a single worm or virus attack can easily be greater than the upfront time to more adequately secure an enterprise.

Fortunately, there are many options in systems and software to increase the security of the network while reducing the overhead of managing such systems.