Sie sind auf Seite 1von 25

NETWORK

SECURITY
CREATED BY:-

DEBOPRIO SARKAR
SOUMITRA GHOSH

SUBHOJIT PAUL

PROLOY BISWAS

DEBMALYA CHATARJEE
INTRODUCTION

A network is a group of computers (or a group of smaller networks) that are


connected to each other by various means, so that they may communicate with
each other. The internet is the largest network in the world. security is the
process of securing information data from unauthorized access, use,
modification, tempering, or disclosure. ... The theft of personal identity, credit
card information, and other important data using hacked user names and
passwords have become common these days.
HISTORY

 Internet security has been an issue since the Internet rose to an


international phenomenon.
 By 1996, the Internet already connected 13 million computers, so
early security protocols were required.
 These protocols required computer information to be confidential,
available, and have integrity.
 Because the Internet made information available to everyone,
people needed network security to make their information
confidential
WHAT IS NETWORK SECURITY?

Network security is any activity designed to protect the


usability and integrity of your network and data. It includes
both hardware and software technologies. Effective network
security manages access to the network. It targets a variety
of threats and stops them from entering or spreading on your
network.
BASIC NETWORK SECURITY

 When connecting a matching to a network, we


need to make sure no one will easily break in to it.
 Even if you don't think anyone will try to break into
your machines - chances are that someone might
try.
 Crackers often run network scan utilities that
check a large range of IP addresses, and
automatically try to find machines running servers
with security holes.
 To protect against that, one could simply disable
any unnecessary network service they are
running.
Need for Network Security

 In the past, hackers were highly skilled programmers who


understood the details of computer communications and how to
exploit vulnerabilities. Today almost anyone can become a hacker
by downloading tools from the Internet.
 These complicated attack tools and generally open networks have
generated an increased need for network security and dynamic
security policies.
 The easiest way to protect a network from an outside attack is to
close it off completely from the outside world.
 A closed network provides connectivity only to trusted known
parties and sites; a closed network does not allow a connection to
public networks.
SECURITY THREATS
the biggest network threats :-

• Viruses and Worms


• Trojan Horses
• SPAM
• Phishing
• Packet Sniffers
• Maliciously Coded Websites
• Password Attacks
• Hardware Loss and Residual Data Fragments
• Shared Computers
• Zombie Computers and Botnets
TYPES OF NETWORK SECURITY

VPN
Web Security
Wireless Security
Firewalls
Email Security
Application Security
Network Access Control
Mobile Device Security
Antivirus And Antimalware Software
 VPN :- A virtual private network, or VPN, is an encrypted connection
over the Internet from a device to a network. The encrypted
connection helps ensure that sensitive data is safely transmitted.
It prevents unauthorized people from eavesdropping on the
traffic and allows the user to conduct work remotely. VPN
technology is widely used in corporate environments.
 WEB SECURITY:- A web security solution will control your staff’s
web use, block web-based threats, and deny
access to malicious websites. It will protect your
web gateway on site or in the cloud. "Web
security" also refers to the steps you take to
protect your own website.
 WIRELESS SECURITY :-
Wireless networks are not as secure as wired ones. Without stringent
security measures, installing a wireless LAN can be like putting
Ethernet ports everywhere, including the parking lot. To prevent an
exploit from taking hold, you need products specifically designed to
protect a wireless network.
Firewalls put up a barrier between your trusted
Firewall :- internal network and untrusted outside networks,
such as the Internet. They use a set of defined rules to
allow or block traffic. A firewall can be hardware,
software, or both.

Internet DMZ
Web server, email server,
Firewall

Firewall
web proxy, etc

Intranet
 EMAIL SECURITY :- Email security refers to the collective measures
used to secure the access and content of an
email account or service. It allows an individual or
organization to protect the overall access to one
or more email addresses/accounts.
Application Security :-
Any software you use to run your business needs to be protected, whether
your IT staff builds it or whether you buy it. Unfortunately, any application may
contain holes, or vulnerabilities, that attackers can use to infiltrate your
network. Application security encompasses the hardware, software, and
processes you use to close those holes.
Network Access Control :-
Not every user should have access to your network. To keep
out potential attackers, you need to recognize each user and
each device. Then you can enforce your security policies. You
can block noncompliant endpoint devices or give them only
limited access. This process is network access control (NAC)
 MOBILE DEVICE SECURITY :-
Cybercriminals are increasingly targeting mobile devices and apps. Within the
next 3 years, 90 percent of IT organizations may support corporate applications
on personal mobile devices. Of course, you need to control which devices can
access your network. You will also need to configure their connections to keep
network traffic private.
Antivirus And Antimalware Software :-
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware,
and spyware. Sometimes malware will infect a network but lie dormant for days or even
weeks. The best antimalware Programs not only scan for malware upon entry, but also
continuously track files afterward to find anomalies, remove malware, and fix damage.
AUTHENTICATION

One-factor authentication – this is


“something a user knows.” The most
recognized type of one-factor
authentication method is the
password.

Two-factor authentication – in
addition to the first factor, the second
factor is “something a user has.”
Three-factor authentication – in
addition to the previous two factors,
the third factor is “something a user
is.”
NETWORK ATTACKS METHODS

 Eavesdropping – Interception of communications by an


unauthorized party
 Data Modification – Data altering, reading from unauthorized
party
 Identity Spoofing (IP Address Spoofing) – IP address to be falsely
assumed— identity spoofing and the attacker can modify,
reroute, or delete your data
 Password-Based Attacks – By gaining your access rights to a
computer and network resources are determined by who you
are, that is, your user name and your password.
CYBERSECURITY
• Cybersecurity is the practice of protecting systems, networks, and programs
from digital attacks. These cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting money from users; or
interrupting normal business processes.
ENCRYPTION
• In computing, encryption is the method by which plaintext or any other type of data is converted from a
readable form to an encoded version that can only be decoded by another entity if they have access to
a decryption key. Encryption is one of the most important methods for providing data security,
especially for end-to-end protection of data transmitted across networks.
ADVANTAGE

Advantages Of Network Security


- Network Security helps in protecting personal data of clients existing on network.
- Network Security facilitates protection of information that is shared between
computers on the network.
- Hacking attempts or virus / spyware attacks from the internet will not be able to harm
physical computers. External possible attacks are prevented.
- Network Security provides different levels of access. If there are various computers
attached to a network, there may be some computers that may have greater access to
information than others.
- Private networks can be provided protection from external attacks by closing them off
from internet. Network Security makes them safe from virus attacks, etc.
DISADVANTAGE

 Computer networks are typically a shared


resource used by many applications representing
different interests.
 The Internet is particularly widely shared, being
used by competing businesses, mutually
antagonistic governments, and opportunistic
criminals.
CONCLUSION

• That is why network security is an important field that is


increasingly gaining attention as the Internet usage increases.
• The security threats and Internet protocols were analyzed to
determine the necessary security technology.
• However, the current development in network security is not
very impressive and significant.
Thank You

Das könnte Ihnen auch gefallen