6 History:During the 1980s, the hackers and crimes were beginning to emerge. CERT was created to overcome network security issues. In the 1990s, Internet became public and the security concerns increased tremendously.
7 Types: Physical security Perimeter protection Five types of network security can aid in securenetworking.Physical securityPerimeter protectionUser training and educationWireless encryption protocol (WEP)MAC address filtering
8 Working: We need multiple layers of security Network security is accomplished through hardware and software.Network security components:Anti-virus and anti-spywareFirewallIntrusion prevention systemsVirtual Private Networks
10 Network security technology : Different mechanisms to deal with these attacks.Cryptographic systems:plaintext is converted in to cipher text.Secret Key Cryptography (SKC)
11 Public Key Cryptography (PKC): Hash Function:Hash functionPlain text Cipher text
12 Firewall: A typical border control mechanism. Metaphor for network security.Designed to prevent unauthorized access to or from a private network.
13 Firewall Types:Packet Filtering FirewallState Full FirewallApplication Aware Firewall etc..Network-based IDs (NIDS):The sensor are located at the choke in networkIt monitored, it captures all the network traffic and analyze each packets for malicious traffic.
14 Secure Socket Layer (SSL): It is a good level of security between a web browser and a website.There is a tunnel between them.Clients present a certificate to the server to prove their identity.
15 WIRELESS NETWORK SECURITY prevention of unauthorized access using wireless networks.Security Policies:Wireless Intrusion Prevention System(WIPS)Wireless Intrusion Detection System (WIDS)Implementation:Three components: sensor, server, and console.
16 It is a short program aiming at securing communication over a network. SECURITY PROTOCOLS:It is a short program aiming at securing communication over a network.Example:Transport layer security (TLS)PPP / Point-to-Point ProtocolInternet Protocols security (IPSec)
17 IMPLEMENTATION:Network Security Services (NSS) comprises a set of librariesIt develops security-enabled client and server applications.Some are:Mozilla client products, including Firefox etcGoogle ChromeSun server products
18 CURRENT DEVELOPMENTS: Hardware DevelopmentsBiometric systems -secure workstation logonsSmart cards -undeniable proof of a user’s identity.Software DevelopmentsCurrent research develops security software using neural networks.Objective- use neural networks for the facial recognition software.
19 FUTURE TREND:The network security will be able to function as an immune system. The same set of security technology that is being used today with some minor adjustments.
20 Security tremendously Tweaks” CONCLUSION:The network security field evolve more rapidly to deal with the threats further in the future.“As threats tweaks,Security tremendously Tweaks”