You are on page 1of 21

Network Security

and
Issues
LEARNING OUTCOMES:
At the end of the session, the students should be able to:
1. Define trust in terms of network resources.
2. Discuss how attacker use spoofing techniques
3. Define digital ID’s and state it functions
4. Understand how IP pocket works when it come in computer
security
Trust Defined
Password Security
Security Objective
Security Objective
Continue….
Continue….
IP Address Spoofing
IP Address Spoofing continue……..
IP Address Spoofing continue……..
Buffer overflow
Buffer overflow continue……
Digital ID
Digital ID continue……
Digital Certification
Digital Certification continue…..
Digital Certification continue…..
Digital Certification continue…..
Digital Certification continue…..
THANK YOU!!!

You might also like