Security in Networking

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
C8- Securing Information Systems
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Securing Interconnect Networks By: Bryan Roberts.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Network Security Basics: Malware and Attacks
(A CORPORATE NETWORK APPROACH)
CONNECTING TO THE INTERNET
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Introduction to Networking
Firewalls.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
IS4550 Security Policies and Implementation
Network Security: IP Spoofing and Firewall
Message Digest Cryptographic checksum One-way function Relevance
Computer Security.
Computer Security.
INFORMATION SYSTEMS SECURITY and CONTROL
Firewalls Jiang Long Spring 2002.
Lecture 3: Secure Network Architecture
Faculty of Science IT Department By Raz Dara MA.
Security.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Security in Networking Done by: Zeyana Saif Ahmed ALkindi ID #: 11212451

Outline Definition of Network Security The source of Network Security violation Techniques used in securing Network

Network Security Vs. Computer Security Network security is concerned with who connects to and what goes across a network connecting systems. Network security is making sure that your network of computers is secure Computer security is making sure that one single computer is secure

Why do we need security? Protect vital information while still allowing access to those who need it, like medical records Provide authentication and access control for resources Guarantee availability of resources

Goals of Network Security Prevention: prevent attackers from violating security policy Detection: detect attackers’ violation of security policy Response: Sop attack, assess and repair damages Continue to function correctly even if attack succeeds.

Security Attributes Identification Authentication Access Control (Authorization)  Integrity Availability Confidentiality Accountability

Threat Threat is a violation of network security requirements. In other words, threat is an occurrence that can affect a system or an organization as a whole.

Vulnerability Vulnerability is a weaknesses in the network that can be exploited by a threat. Lack of user awareness, users copy and share infected software, fail to detect signs of virus activity and do not understand proper security techniques. Absence of security controls, personal computers generally lack software and hardware security mechanisms that help to prevent and detect unauthorized users. Ineffective use of existing security controls, using easily guessed passwords, failing to use access control, granting users more access to recourses than is necessary. Unauthorized use, unauthorized users can break into systems.

Source of Security violation Employees: The largest category of security violations consists of those with the easiest access to computers namely employees Hackers & Crackers : Hackers are people who gain unauthorized access to computer system for the fun and challenge of it. Crackers are people who do the same thing but for malicious purposes like stealing technical information or introduce a destructive computer program into the system.

Common Security Attack Malicious programs: called malware, which is short for malicious software. There are especially designed to damage or disrupt the security system. The three common types of malware are viruses, worms, and Trojan horses

Common Security Attack Denial of Service: make a network service unusable, usually by overloading the server or network Ex: SMURF

TCP hijacking TCP hijacking is a method of attacking over a web user.

Packet Sniffing When someone wants to send a packet to some else They put the bits on the wire with the destination MAC address … And other hosts are listening on the wire to detect for collisions … It couldn’t get any easier to figure out what data is being transmitted over the network!

Network Authentication Methods In a network environment, the security settings control how users and computers authenticate to the network. Authentication is the first line of defense against attack or intrusion into network systems The various network authentication methods are: Strong passwords Kerberos Extensible Authentication Protocol (EAP)

Strong Passwords A strong Password is a password that meet complexity requirements that are set by a system administrator and documented in a password policy by specifying: Authentication based on user name/password combination called as authentication by assertion

Kerberos Kerberos is an internet standard authentication protocol that links a user name and password to an authority that can certify that the user is valid and also verify the user’s ability to access recourses

A Kerberos process A Kerberos client uses a Kerberos authentication process to establish a secure connection with a service

Extensible Authentication Protocol (EAP) Extensible Authentication Protocol (EAP) is an authentication protocol that enables systems to use hardware based-identifiers such as, fingerprint scanners or smart card readers, for authentication.

Firewall A firewall is a software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic.

Network Address Translation Network Address Translation is a form of Internet security that conceals (hide) internal addressing schemes from the public internet. NAT is implemented as : Software such as ICS in windows systems Hardware such as cable modems and DSL routers

The NAT process The NAT process translates internal and external addresses based on port numbers following the steps: Step1: Client Request Step2: Source Address Conversation Step3: Data return Step4: Internal Source identification Step5: Data deliver

DMZs))Demilitarized Zones DMZ is a small section of a private network that is located between two firewalls and made available for public access.

Proxy servers Proxy servers are often used to provide security for internet applications. A Proxy servers acts as an intermediary between a PC and the internet, separating an enterprise network from an outside network.

Conclusion Shortly, Network interconnects computers and communication devices within buildings. The data which is transmitted through the Network should be secured. The security administrators should be aware of possible misuse and take responsibility for safeguarding the Networks resources under their control.

Thank You !