20
[email protected] ww.quontrasolutions.com Call us : (404)-900-99 QUONTRA SOLUTIONS http://www.quontrasolutions.com Call us : (404)-900-9988 Network Security

Network security by quontra solutions

Embed Size (px)

DESCRIPTION

Quontra Solutions instructor-led CCNA hands-on training and certification Assistance boot camp in United States. Packed with updated topics that have been added to the latest version of the CCNA exam, this updated course features expanded coverage of key topic areas plus new material on IP data networks, LAN switching technologies, IP addressing (IPv4/IPv6), IP routing technologies, IP services, network device security, troubleshooting, and WAN technologies. Call us to get your career a New Light… Please Visit us for the Demo Classes, we have regular batches and weekend batches. Other Courses we offered: DATABASE: SQL/PL-SQL MICROSOFT: ADO .NET, ASP .NET, C# .NET, MSBI, SharePoint, Vb .NET PROGRAMMING: Core Java, Advanced Java, J2EE, Hibernates, Strutus, Java Scripting, Perl Scripting, Shell Scripting, Springs, Ruby on Rails Mobile Apps: Android, IOS Training, Cloud Computing, Networking, Unix Admin, Linux, Sun Solaris, Testing Tools: Manual Testing, QTP, Selenium Selenium: SalesForce Developer, SalesForce Administrator BUSINESS ANALYST, HADOOP Quontra Solutions Email: [email protected] Call: US: +1 404-900-9988. UK: (20)3734 1498.

Citation preview

Page 1: Network security by quontra solutions

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

QUONTRA SOLUTIONS

http://www.quontrasolutions.com

Call us : (404)-900-9988

Network Security

Page 2: Network security by quontra solutions

Network Security

Security DevicesFirewallsNetwork Access SecurityUser AuthenticationDevice SecurityCommon Security Threats

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

Page 3: Network security by quontra solutions

Security DevicesExplain the function Of Hardware and

Software security devices.

Network Based Firewall Host Based FirewallIDS IPSVPN Concentrator

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

Page 4: Network security by quontra solutions

Host Based FirewallSoftware Based Protection on a

deviceSees all the TrafficDifficult to manage

large groups

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

Page 5: Network security by quontra solutions

Windows Firewall with Advanced [email protected]

www.quontrasolutions.com Call us : (404)-900-9988

Page 6: Network security by quontra solutions

Network Based FirewallFilters Traffic By Port NumberCan Encrypt traffic in/out of the network.Can proxy trafficMost firewalls can be Layer 3 devices

(routers).

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

Page 7: Network security by quontra solutions

Network Based FirewallAdvantages

Protects many devices at onceHigh-speed

DisadvantagesLimited Visibility into encrypted Information

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

Page 8: Network security by quontra solutions

IDS/IPSIntrusion Detection SystemIntrusion Prevention System

IntrusionsExploits against Operating Systems , applications

etc.Bufferoverflows and other vulnerabilities

Detection Vs PreventionDetection – Alarm or AlertPrevention – Stop it before it gets into the network.

www.quontrasolutions.com Call us : (404)-900-9988

Page 9: Network security by quontra solutions

IDS/IPSAdvantages

Watches all traffic through a network linkCan completely stop bad traffic

DisadvantagesLimited Visibility into encrypted DataYet Another device on the Network

www.quontrasolutions.com Call us : (404)-900-9988

Page 10: Network security by quontra solutions

VPN concentrator

www.quontrasolutions.com Call us : (404)-900-9988

Page 11: Network security by quontra solutions

Identify Common Security Threats and Mitigations

Security ThreatsDos ,viruses, worms ,attackers ,Man in

the middle attack ,Smurf ,Social engineering (phishing)

Mitigation TechniquesPolicies and Procedures ,user

training ,patch and updates

www.quontrasolutions.com Call us : (404)-900-9988

Page 12: Network security by quontra solutions

Denial Of ServiceAnything that prevents a device from providing

normal services

DoS /DDoS Denial Of Service /Distributed Denial of service

Smurf AttacksPing sents to a broadcast address were

duplicated to all IP addresses on the subnets by the routers We fixed that in 1999

www.quontrasolutions.com Call us : (404)-900-9988

Page 13: Network security by quontra solutions

Viruses and WormsViruses infect files and duplicate by

copying themselves with other documents

Worms don’t need any other files or programs in order to infect other devices

Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff

www.quontrasolutions.com Call us : (404)-900-9988

Page 14: Network security by quontra solutions

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.com Call us : (404)-900-9988

Page 15: Network security by quontra solutions

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.com Call us : (404)-900-9988

Page 16: Network security by quontra solutions

Social EngineeringMajor Threats

Electronically UndetectableSuspicious Telephone Call

Don’t give any information over the Telephone

Look out for unattended personsBadgesProcesses

www.quontrasolutions.com Call us : (404)-900-9988

Page 17: Network security by quontra solutions

Phishing Electronic Version Of Social Engineering

www.quontrasolutions.com Call us : (404)-900-9988

Page 18: Network security by quontra solutions

Mitigation Techniques

Policies and Procedures

User Training

Patches and Updates

www.quontrasolutions.com Call us : (404)-900-9988

Page 19: Network security by quontra solutions

SummaryDoS (Denial Of Service) or DDoS

(Distributed DoS) prevent a device from providing normal services.

Man in the Middle Attack method can hackers use to intercept encrypted communication between stations

Phishing is the electronic method of social engineering to gather personal information.

www.quontrasolutions.com Call us : (404)-900-9988

Page 20: Network security by quontra solutions

[email protected]

www.quontrasolutions.com Call us : (404)-900-9988

TO KNOW MORE IN-DEPTH KNOWLEDGE CONTACT US

Call : (404)-900-9988

 Email: [email protected]

http://www.quontrasolutions.com

QUONTRA SOLUTIONS