Upload
shreya-sinha
View
424
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
Deepti Sharma PGFB1113 Harshita Sinha PGFB1118 Himanshu Yadav PGFB1119 Saurabh Srivastava PGFB1141 Shreya PGFB1144 Sumit Agarwal PGFB1151
What is NETWORK security? Why do we need security? Hacker Vs Cracker Main Objectives & Threats Common security attacks and
countermeasuresFirewalls Intrusion Detection Systems
Conclusions & Learning Experiences.
The area of network security consists ofthe provisions and policies adopted by thenetwork administrator to prevent andmonitor unauthorized access, misuse,modification, or denial of the computernetwork and network-accessible resources.Network security involves the authorizationof access to data in a network, which iscontrolled by the network administrator.
Security is one of the most critical aspects of any network.
A computer network is only as strong as its weakest link.
Computer security has become more important than ever.
The security community distinguishes between a “hacker”, someone who (nonmaliciously) programs,manages or uses computing systems, and a “cracker”, someone who attempts access to computing systems for malicious purposes.
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
LEGITIMATE USE
INFORMATION LEAKAGE
INTEGRITY VIOLATION
DENIAL OF SERVICE
ILLEGITIMATE USE
FIREWALLS
INTRUSION DETECTION SYSTEM
A firewall is a device or set of devicesdesigned to permit or deny networktransmissions based upon a set of rules and
isfrequently used to protect networks fromunauthorized access while permittinglegitimate communications to pass.
It filters all traffic between protected networkand a less trustworthy network.
l
PACKET FILTER The system examines each packet
entering or leaving the network and accepts or rejects it based on user defined rules.
PROXY SERVER It intercepts all messages entering
and leaving the network.
An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.
IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports.
Ex. Burglar and car alarms are forms of IDS
Monitoring users and system activity. Recognizing known attack patterns in
system activity. Identifying abnormal activity through
statistical analysis. Installing and operating traps to record
information about intruders.
CONCLUSIONS
&LEARNING
EXPERIENCES
http://www.robertgraham.com/pubs/network-intrusion-detection.html
http://online.securityfocus.com/infocus/1527
http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc .com/dos/grcdos.htm http://lcam tuf.coredump.cx/
newtcp/
THANK YOU
Do You have Any
Questions…