Ruchi Gupta-144 NRO0312935
network & network security
1
Ruchi Gupta-144 NRO0312935 2
CONTENTIntroductionWhat is Network?Components of a NetworkBenefits of a NetworkTypes of NetworkNetwork TopologiesWhat is Network Security?Types of Network SecurityCommon Network Security
problemsWhy do we need security?Levels of SecurityThreats to Network
Security
Techniques of Network Security
Precautions to be takenConclusion
Ruchi Gupta-144 NRO0312935 3
Introduction:-With the development of network
technologies and applications, network attacks are greatly increasing both in number and severity. With the ever-
increasing number and complexity of attacks, vigilant approaches to security
in both large and small enterprises are a must.
Ruchi Gupta-144 NRO0312935 4
What is Network?
A computer network consists of a collection of computers, printers
and other equipment that is connected together so that they
can communicate with each other.
Ruchi Gupta-144 NRO0312935 5
Computer networks have opened up an entire frontier in the world of computing called the client/server model
Ruchi Gupta-144 NRO0312935 6
Components of a Network:-
A minimum of at least 2 computers Cables that connect the computers to each other, although wireless communication is becoming more common A network interface device on each computer (this is called a network interface card or NIC) A ‘Switch’ used to switch the data from one point to another. Hubsare outdated and are little used for new installations. Network operating system software Structured Cabling
Ruchi Gupta-144 NRO0312935 7
BENEFITS OF A NETWORK:-Information sharing: Authorized users can use
other computers on the network to access and share information and data. This could include special group projects, databases, etc.
Hardware sharing: One device connected to a network, such as a printer or scanner, can be shared by many users.
Software sharing: Instead of purchasing and installing a software program on each computer, it can be installed on the server. All of the users can then access the program from a single location.
Collaborative environment: Users can work together on group projects by combining the power and capabilities of diverse equipment.
Ruchi Gupta-144 NRO0312935 8
TYPES OF NETWORKS:-
Local Area Network (LAN) – a network that spans a small area such as a building or an office.
Wide Area Network (WAN) – a network that spans a wide geographical area; there are several types of WANS
Metropolitan Area Networks (MAN) –MAN connect multiple geographically nearby LANs to one another (over an area of up to a few dozen kilometers) at high speeds.
Ruchi Gupta-144 NRO0312935 9
NETWORK TOPOLOGIES:-
Network Topology (or layout) – refers to the way computers and peripherals are configured to form networks• Bus topology – all computers are
linked by a single line of cable• Star topology – multiple computers
and peripheral devices are linked to a central computer, called a host• Ring topology – each computer or
workstation is connected to two other computers, with the entire network forming a circle• Hybrid topology – combine network
layout types to meet their needs
Ruchi Gupta-144 NRO0312935 10
What is Network Security?Network security involves all activities
that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of
operations.
Ruchi Gupta-144 NRO0312935 11
Physical
• To protect physical assets like CD, hard disk etc
Logical
• To protect logical assets like data, programs etc
Types of Network Security:-
Ruchi Gupta-144 NRO0312935 12
Common Network Security Problems:-●Data Modification●Identity spoofing ●Network eavesdropping●Man in the Middle attacks●Denial of Service attacks●Application layer attacks
Ruchi Gupta-144 NRO0312935 13
Why do we need security?Protect vital information while still
allowing access to those who need itProvide authentication and access
control for resourcesGuarantee availability of resources
Ruchi Gupta-144 NRO0312935 14
Levels of Security:-Identify the asset which require securityValue the assets and accordingly analyze for level
of securityIdentify various threats to individual assetsIdentify the probability of threat occurrenceIdentify the amount of losses or exposure in case
of security breachPlan for appropriate controls to avoid threats or
security breachOutline report on level of security
Ruchi Gupta-144 NRO0312935 15
Threats to Network Security:-
Fire
Water
Energy Variations like voltage fluctuations
Pollution like dust
Structural damages
Intrusion
Viruses and worms
Hacking of Data
Ruchi Gupta-144 NRO0312935 16
Controls to overcome threats:-
Preventive Controls: using antivirus, fire-
extinguishers, etc
Detective Controls: Checking files,
executing regularly the antivirus
programs, etc
Corrective Controls: having a recovery plan
etc
Ruchi Gupta-144 NRO0312935 17
Techniques
of Network
Security:-
Intrusion Detection System
Firewall
Data EncryptionIdentity
Services
Secure Network
infrastructure
Ruchi Gupta-144 NRO0312935 18
Techniques of Network Security:-Intrusion Detection SystemFirewallData EncryptionSecure network infrastructureIdentity services
Ruchi Gupta-144 NRO0312935 19
Intrusion Detection System(IDS):-
An intrusion detection system (IDS) is a device or software application that monitors
network or system activities for malicious activities or policy violations and produces
reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor
expected of a monitoring system.
Ruchi Gupta-144 NRO0312935 20
IDSNetwork Based Systems
Host Based Systems
Network Node Systems
Types of IDS:-
Ruchi Gupta-144 NRO0312935 21
Intrusion Detection System(IDS)
Ruchi Gupta-144 NRO0312935 22
Firewall:-A firewall can either be software-
based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network
traffic by analyzing the data packets and determining whether it should
be allowed through or not, based on a predetermined rule set.
Ruchi Gupta-144 NRO0312935 23
Types of firewall:
-
Network level
firewall
Application level
Firewall
Ruchi Gupta-144 NRO0312935 24
FIREWALL
Ruchi Gupta-144 NRO0312935 25
Data Encryption:-Encryption uses a mathematical
algorithm to scramble readable text that cannot be read unless the reader has the key to "unlock," or convert, the information back to its readable form. This means that your sensitive data cannot be accessed without you
providing a password.
Ruchi Gupta-144 NRO0312935 26
DATA ENCRYPTION
Ruchi Gupta-144 NRO0312935 27
Secure network infrastructure:-
Switches and routers have hardware and software features that support secure
connectivity, perimeter security, intrusion protection, identity services,
and security management.Dedicated network security hardware and
software-Tools such as firewalls and intrusion detection systems provide
protection for all areas of the network and enable secure connections.
Ruchi Gupta-144 NRO0312935 28
Identity services:-These services help to identify users and control their activities and transactions
on the network. Services include passwords, digital certificates, and
digital authentication keys.
Ruchi Gupta-144 NRO0312935 29
Precautions to be taken :-Hope you have backupsDon't put data where it doesn't need to
beAvoid systems with single points
of failure Stay current with relevant operating
system patches Have someone on staff be familiar with
security practices
Ruchi Gupta-144 NRO0312935 30
Conclusion:-With the increased number of threats to networks
such as worms, viruses and clever hackers, security can no longer be viewed as an option, even within “private” networks.
Today, the amount of time spent repairing a network due to just a single worm or virus attack can easily be greater than the upfront time to more adequately secure an enterprise.
Fortunately, there are many options in systems and software to increase the security of the network while reducing the overhead of managing such systems.