20

Final ntwrk security

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Final ntwrk security
Page 2: Final ntwrk security

Deepti Sharma PGFB1113 Harshita Sinha PGFB1118 Himanshu Yadav PGFB1119 Saurabh Srivastava PGFB1141 Shreya PGFB1144 Sumit Agarwal PGFB1151

Page 3: Final ntwrk security

What is NETWORK security? Why do we need security? Hacker Vs Cracker Main Objectives & Threats Common security attacks and

countermeasuresFirewalls Intrusion Detection Systems

Conclusions & Learning Experiences.

Page 4: Final ntwrk security

The area of network security consists ofthe provisions and policies adopted by thenetwork administrator to prevent andmonitor unauthorized access, misuse,modification, or denial of the computernetwork and network-accessible resources.Network security involves the authorizationof access to data in a network, which iscontrolled by the network administrator.

Page 5: Final ntwrk security

Security is one of the most critical aspects of any network.

A computer network is only as strong as its weakest link.

Computer security has become more important than ever.

Page 6: Final ntwrk security

The security community distinguishes between a “hacker”, someone who (nonmaliciously) programs,manages or uses computing systems, and a “cracker”, someone who attempts access to computing systems for malicious purposes.

Page 7: Final ntwrk security
Page 8: Final ntwrk security

CONFIDENTIALITY

INTEGRITY

AVAILABILITY

LEGITIMATE USE

Page 9: Final ntwrk security

INFORMATION LEAKAGE

INTEGRITY VIOLATION

DENIAL OF SERVICE

ILLEGITIMATE USE

Page 10: Final ntwrk security

FIREWALLS

INTRUSION DETECTION SYSTEM

Page 11: Final ntwrk security
Page 12: Final ntwrk security

A firewall is a device or set of devicesdesigned to permit or deny networktransmissions based upon a set of rules and

isfrequently used to protect networks fromunauthorized access while permittinglegitimate communications to pass.

It filters all traffic between protected networkand a less trustworthy network.

l

Page 13: Final ntwrk security

PACKET FILTER The system examines each packet

entering or leaving the network and accepts or rejects it based on user defined rules.

PROXY SERVER It intercepts all messages entering

and leaving the network.

Page 14: Final ntwrk security
Page 15: Final ntwrk security

An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.

IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports.

Ex. Burglar and car alarms are forms of IDS

Page 16: Final ntwrk security

Monitoring users and system activity. Recognizing known attack patterns in

system activity. Identifying abnormal activity through

statistical analysis. Installing and operating traps to record

information about intruders.

Page 17: Final ntwrk security

CONCLUSIONS

&LEARNING

EXPERIENCES

Page 18: Final ntwrk security

http://www.robertgraham.com/pubs/network-intrusion-detection.html

http://online.securityfocus.com/infocus/1527

http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc .com/dos/grcdos.htm http://lcam tuf.coredump.cx/

newtcp/

Page 19: Final ntwrk security

THANK YOU

Page 20: Final ntwrk security

Do You have Any

Questions…