SlideShare a Scribd company logo
Network Security
By Gaurav Dalvi
Final Yr BTech
Roll no:A43
Reg
no:2011BCS501
Why Security?
 The Internet was initially designed for

connectivity.
 Fundamental aspects of information must be
protected.
 We can’t keep ourselves isolated from the
Internet.
Internet Evolution

•Different Ways to handle security as the Internet
Evolves.
Type Of Security
 Computer Security

generic name for the collection of tools designed
to protect data and to thwart hackers
 Network Security
measures to protect the data during the
transmission.
 Internet Security
measure to protect the data during the
transmission over a collection of interconnected
networks.
Goals of Information Security
Attacks on Different Layers
Security on Different Layers
IP
 IP is a network layer protocol.
 This is a layer that allows the hosts to actually

“talk ” to each other.
 IP has a number of very important features which
make it an extremely robust and flexible protocol.
Attacks on IP
 Attacks exploits the fact that IP does not perform

a robust mechanism for authentication, which is
proving that the packet came from where it claims
it did.
 This means that the host authentication must be
provided by higher layers.
 Eg: IP Spoofing, IP Session hijacking.
TCP Attacks
 Exploits TCP 3-way handshake.
 Attacker sends a series of SYN packets without

replying with the ACK packet.
 Finite queue size for incomplete connections.
TCP Attacks
DNS Cache Poisoning
Common Type of Attacks
 Ping sweeps and port scans – reconnaissance.
 Sniffing – capture packet as they travel through





the network.
Man in the Middle Attack – intercept messages
that are intended for a valid device.
Spoofing – set up a fake device and trick others
to send messages to it.
Hijacking – take control of a session.
Denial of Service (DoS) and Distributed DoS
(DDoS).
Trusted Network
 Standard defensive-oriented technologies.

- Firewall – first line of defense.
- Intrusion Detection.
 Built trust on the top of the TCP/IP infrastructure.
- Strong Authentication.
- Two factor authentication.
- something you have + something you
know.
- Public key Infrastructure.(PKI)
Firewall
 A choke point of control and monitoring.
 Interconnects networks with differing trust.
 Imposes restrictions on network services.
 only authorized traffic is allowed.

 Auditing and controlling access.
 can implement alarms for abnormal behavior.

 Itself immune to penetration.
 Provides perimeter defence.
Intrusion Detection System
An intrusion detection system (IDS) is a device
or software application that monitors network or
system activities for malicious activities or policy
violations and produces reports to a management
station. Some systems may attempt to stop an
intrusion attempt but this is neither required nor
expected of a monitoring system.
 Host IDS.
 Network IDS.
Access Control
 Access Control – ability to permit or deny the use

of an object by a subject.
 It provides 3 essential services (known as AAA):
- Authentication.(who can login)
- Authorization.(what authorized user can do)
- Accountability.(identifies what a user did)
Cryptography
 Has evolved into a complex science in the field of

information security.
 Encryption – process of transforming plaintext to
ciphertext using a cryptographic key.
 Symmetric key cryptography.
- DES, 3DES, AES, etc.
 Asymmetric key cryptography.
- RSA, Diffie-Hellman, etc.
Cryptography
Public key Infrastructure
 Combines public key cryptography and digital

signatures to ensure confidentiality, integrity,
authentication, non-repudiation and access
control.
 Digital Certificate – basic element of PKI; secure
credential that identifies the owner.
 Basic Components:- Certificate Authority.
- Registry Authority.
- Repository.
- Archives.
Different Layers of Encryption
IPSec
 Provides Layer 3 Security.
 Tunnel or Transport mode.

- Tunnel mode(entire IP packet is encrypted)
- Transport mode (IPSec header is inserted into
the packet)
 Combine different components:
- Security associations, Authentication headers
(AH), Encapsulating security payload (ESP),
Internet Key Exchange (IKE).
Security Management
 Loss Prevention.

Loss prevention focuses on what your critical assets
are and how you are going to protect them.
 Security risk management.
Management of security risks applies the principles of
risk management to the management of security
threats.
 Risk options.
 Risk avoidance.
 Risk reduction.
 Risk spreading.
 Risk transfer.
 Risk acceptance.
Whois Database
 Public network Management Database.
 Tracks network Resources.

- IP addresses, ASN, reverse routing.
 Records administrative info.
- Contacts(person/role), authorization(maintainer)
 All members must register their resources in the
Whois database.
 Must keep records up to date at all times.
Seminar (network security)

More Related Content

PPTX
Network security
PDF
Network Security Presentation
PDF
Quantum Cryptography - Seminar report
PDF
National AIDS Control Programme
PPTX
Biogeochemical cycle
DOCX
Report on Network Security And Privacy
PPT
Virtualization in cloud computing ppt
PPSX
Introduction to mobile application
Network security
Network Security Presentation
Quantum Cryptography - Seminar report
National AIDS Control Programme
Biogeochemical cycle
Report on Network Security And Privacy
Virtualization in cloud computing ppt
Introduction to mobile application

What's hot (20)

PPTX
Wireless networks ppt
PPTX
Wifi Technology ppt
PPTX
wireless communication security PPT, presentation
PPTX
Security Mechanisms
PPTX
Intrusion detection
 
PPTX
home networking
PPTX
Network Security
PPTX
Wireless network security
PPTX
Firewall presentation
PPT
Wireless LAN security
PPTX
Authentication methods
PPTX
Data storage security in cloud computing
PPTX
Network security
PPTX
Transport layer security (tls)
PPTX
Wireless and mobile security
PPT
Bluetooth Slides
PPTX
Zigbee technology ppt
PPTX
Introduction to IoT Security
 
PPTX
Infrared technology
PPT
Firewall
Wireless networks ppt
Wifi Technology ppt
wireless communication security PPT, presentation
Security Mechanisms
Intrusion detection
 
home networking
Network Security
Wireless network security
Firewall presentation
Wireless LAN security
Authentication methods
Data storage security in cloud computing
Network security
Transport layer security (tls)
Wireless and mobile security
Bluetooth Slides
Zigbee technology ppt
Introduction to IoT Security
 
Infrared technology
Firewall
Ad

Viewers also liked (20)

PPT
Network security
PPT
Network Security
PPT
Network Security Threats and Solutions
PPT
NetworkSecurity.ppt
PPTX
Ppt of types of-network
PPS
Network ppt
PPT
TCP/IP Network ppt
PPT
Seminar on cloud computing by Prashant Gupta
PDF
Network Security Applications
PPTX
Wireless sensor network security
PPT
Networking ppt
PPT
The Internet Presentation
PPTX
ITSolutions|Currie Network Security Seminar
PPTX
Juniper SA Overview
PPTX
PDF
Security_in_Satellite_Systems_Lisi_2015
PPTX
seminar presentation
PPTX
Second Project PPT
PPTX
Alice in warningland: A Large Scale Study of Browser Security Warnings
Network security
Network Security
Network Security Threats and Solutions
NetworkSecurity.ppt
Ppt of types of-network
Network ppt
TCP/IP Network ppt
Seminar on cloud computing by Prashant Gupta
Network Security Applications
Wireless sensor network security
Networking ppt
The Internet Presentation
ITSolutions|Currie Network Security Seminar
Juniper SA Overview
Security_in_Satellite_Systems_Lisi_2015
seminar presentation
Second Project PPT
Alice in warningland: A Large Scale Study of Browser Security Warnings
Ad

Similar to Seminar (network security) (20)

DOC
Network security
PPTX
Network security
DOCX
Network security
PDF
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
PPT
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
DOCX
Network and web security
PPT
Ne Course Part Two
PPT
chapter 4.pptWOLAITA SODO UNIVERSITY SCHOOL OF INFORMATICS DEPARTMENT OF INFO...
PPTX
Network security by sandhya
PPTX
Lecture 07 networking
PPT
Day4
PPTX
Information Systems.pptx
PPTX
Network Security and Cryptography
PDF
Intrusion_Detection_By_loay_elbasyouni
PPT
Chapter 4.ppt
PPTX
PPT
New internet security
PPT
NewIinternet security
PPTX
Network Security & Ethical Hacking
Network security
Network security
Network security
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Network and web security
Ne Course Part Two
chapter 4.pptWOLAITA SODO UNIVERSITY SCHOOL OF INFORMATICS DEPARTMENT OF INFO...
Network security by sandhya
Lecture 07 networking
Day4
Information Systems.pptx
Network Security and Cryptography
Intrusion_Detection_By_loay_elbasyouni
Chapter 4.ppt
New internet security
NewIinternet security
Network Security & Ethical Hacking

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Classroom Observation Tools for Teachers
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Lesson notes of climatology university.
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Weekly quiz Compilation Jan -July 25.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
LDMMIA Reiki Yoga Finals Review Spring Summer
Classroom Observation Tools for Teachers
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Microbial diseases, their pathogenesis and prophylaxis
Yogi Goddess Pres Conference Studio Updates
History, Philosophy and sociology of education (1).pptx
Microbial disease of the cardiovascular and lymphatic systems
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
What if we spent less time fighting change, and more time building what’s rig...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Seminar (network security)

  • 1. Network Security By Gaurav Dalvi Final Yr BTech Roll no:A43 Reg no:2011BCS501
  • 2. Why Security?  The Internet was initially designed for connectivity.  Fundamental aspects of information must be protected.  We can’t keep ourselves isolated from the Internet.
  • 3. Internet Evolution •Different Ways to handle security as the Internet Evolves.
  • 4. Type Of Security  Computer Security generic name for the collection of tools designed to protect data and to thwart hackers  Network Security measures to protect the data during the transmission.  Internet Security measure to protect the data during the transmission over a collection of interconnected networks.
  • 8. IP  IP is a network layer protocol.  This is a layer that allows the hosts to actually “talk ” to each other.  IP has a number of very important features which make it an extremely robust and flexible protocol.
  • 9. Attacks on IP  Attacks exploits the fact that IP does not perform a robust mechanism for authentication, which is proving that the packet came from where it claims it did.  This means that the host authentication must be provided by higher layers.  Eg: IP Spoofing, IP Session hijacking.
  • 10. TCP Attacks  Exploits TCP 3-way handshake.  Attacker sends a series of SYN packets without replying with the ACK packet.  Finite queue size for incomplete connections.
  • 13. Common Type of Attacks  Ping sweeps and port scans – reconnaissance.  Sniffing – capture packet as they travel through     the network. Man in the Middle Attack – intercept messages that are intended for a valid device. Spoofing – set up a fake device and trick others to send messages to it. Hijacking – take control of a session. Denial of Service (DoS) and Distributed DoS (DDoS).
  • 14. Trusted Network  Standard defensive-oriented technologies. - Firewall – first line of defense. - Intrusion Detection.  Built trust on the top of the TCP/IP infrastructure. - Strong Authentication. - Two factor authentication. - something you have + something you know. - Public key Infrastructure.(PKI)
  • 15. Firewall  A choke point of control and monitoring.  Interconnects networks with differing trust.  Imposes restrictions on network services.  only authorized traffic is allowed.  Auditing and controlling access.  can implement alarms for abnormal behavior.  Itself immune to penetration.  Provides perimeter defence.
  • 16. Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.  Host IDS.  Network IDS.
  • 17. Access Control  Access Control – ability to permit or deny the use of an object by a subject.  It provides 3 essential services (known as AAA): - Authentication.(who can login) - Authorization.(what authorized user can do) - Accountability.(identifies what a user did)
  • 18. Cryptography  Has evolved into a complex science in the field of information security.  Encryption – process of transforming plaintext to ciphertext using a cryptographic key.  Symmetric key cryptography. - DES, 3DES, AES, etc.  Asymmetric key cryptography. - RSA, Diffie-Hellman, etc.
  • 20. Public key Infrastructure  Combines public key cryptography and digital signatures to ensure confidentiality, integrity, authentication, non-repudiation and access control.  Digital Certificate – basic element of PKI; secure credential that identifies the owner.  Basic Components:- Certificate Authority. - Registry Authority. - Repository. - Archives.
  • 21. Different Layers of Encryption
  • 22. IPSec  Provides Layer 3 Security.  Tunnel or Transport mode. - Tunnel mode(entire IP packet is encrypted) - Transport mode (IPSec header is inserted into the packet)  Combine different components: - Security associations, Authentication headers (AH), Encapsulating security payload (ESP), Internet Key Exchange (IKE).
  • 23. Security Management  Loss Prevention. Loss prevention focuses on what your critical assets are and how you are going to protect them.  Security risk management. Management of security risks applies the principles of risk management to the management of security threats.  Risk options.  Risk avoidance.  Risk reduction.  Risk spreading.  Risk transfer.  Risk acceptance.
  • 24. Whois Database  Public network Management Database.  Tracks network Resources. - IP addresses, ASN, reverse routing.  Records administrative info. - Contacts(person/role), authorization(maintainer)  All members must register their resources in the Whois database.  Must keep records up to date at all times.