0% found this document useful (0 votes)
414 views14 pages

Understanding Network Security Essentials

Network security involves protecting a network and its resources against threats. It is handled by a network administrator and involves multiple layers of security through hardware and software components like firewalls, antivirus software, and encryption. Some key aspects of network security include access control, authentication, confidentiality, integrity, and non-repudiation. Common security tools and technologies used include cryptography, public key cryptography, firewalls, secure socket layer, security protocols, and network security services.

Uploaded by

madeti goutham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
414 views14 pages

Understanding Network Security Essentials

Network security involves protecting a network and its resources against threats. It is handled by a network administrator and involves multiple layers of security through hardware and software components like firewalls, antivirus software, and encryption. Some key aspects of network security include access control, authentication, confidentiality, integrity, and non-repudiation. Common security tools and technologies used include cryptography, public key cryptography, firewalls, secure socket layer, security protocols, and network security services.

Uploaded by

madeti goutham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Network security

This Photo by Unknown Author is licensed under CC BY


NETWORK SECURITY
NETWORK SECURITY
• A Network is a series of points or nodes • Define Security
interconnected by • Security is “Freedom from risk or danger.“
• communication paths. • The ability of a system to protect
• Interconnect with other networks and contain information and system
sub networks. • resources with respect to confidentiality and
integrity.
NETWORK SECURITY
• Any activities designed to protect your network
• Target- variety of threats and stops them from entering or spreading
• on your network.
• Handled by a network administrator.
OBJECTIVE

• Access • Authentication Confidentiality

• Integrity • • Non-repudiation
TYPES
• Five types of network security can aid in secure
• networking.
• Physical security
• Perimeter protection
• User training and education
• Wireless encryption protocol (WEP)
• MAC address filtering
WORKING
• We need multiple layers of security
• Network security is accomplished
• through hardware and software.
•Network security components:
• Anti-virus and anti-spyware
• Firewall
• Intrusion prevention systems
• Virtual Private Networks
SECURITY TOOLS
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual private network
• Identity services
• Encryption
• Security management
NETWORK SECURITY TECHNOLOGY :
• Different mechanisms to deal with these attacks.

• Cryptographic systems:
• plaintext is converted in to cipher text.
• Secret Key Cryptography (SKC)
• PUBLIC KEY CRYPTOGRAPHY
(PKC):
FIREWALL
• A typical border control mechanism.
• Metaphor for network security.
• Designed to prevent unauthorized access to or from a
• private network.
SECURE SOCKET LAYER (SSL)
• between a web browser and a
• It is a good level of security
• website.
• There is a tunnel between
• them.
• Clients present a certificate to
• the server to prove their
• identity.
SECURITY PROTOCOLS
• It is a short program aiming at securing
• communication over a network.
• Example:
• Transport layer security (TLS)
• PPP / Point-to-Point Protocol
• Internet Protocols security (IPSec)
IMPLEMENTATION
• Network Security Services (NSS) comprises a set of
• libraries
• It develops security-enabled client and server
• applications.

• Some are:
• Mozilla client products, including Firefox etc.
• Google Chrome
• Sun server products

This Photo  (https://www.jmmnews.com/the-dark-side-of-the-internet-of-things/)by Unknown Author is licensed under CC BY (http
NETWORK SECURITY
NETWORK
• A Network is a series of points or nodes 
interconnected by
• communication paths.
• Interconnect
NETWORK SECURITY
• Any activities designed to protect your network
• Target- variety of threats and stops them from entering
OBJECTIVE
• Access
• Authentication
• • Non-repudiation
Confidentiality
• Integrity
TYPES
• Five types of  network security can aid in secure
• networking.
• Physical security
• Perimeter protection
• User tra
WORKING
• We need multiple layers of security
• Network security is accomplished
• through hardware and software.
•Network se
SECURITY TOOLS
• Antivirus software packages
• Secure network infrastructure
• DNS hardware and software
• Virtual private ne
NETWORK SECURITY TECHNOLOGY :
• Different mechanisms to deal with these attacks.
•Cryptographic systems:
• plaintext is conve
• PUBLIC KEY CRYPTOGRAPHY 
(PKC):
FIREWALL
• A typical border control mechanism.
• Metaphor for network security.
• Designed to prevent unauthorized access to

You might also like