INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.

Slides:



Advertisements
Similar presentations
Intermediate 2 Computing
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Lecturer: Fadwa Tlaelan
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 12 Network Security.
IS Network and Telecommunications Risks
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Networks IGCSE ICT Section 4.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Virtual Private Network
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
 a crime committed on a computer network, esp. the Internet.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
Module 11: Remote Access Fundamentals
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Malicious Software.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Computer Security By Duncan Hall.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing Interconnect Networks By: Bryan Roberts.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
Chapter 40 Internet Security.
Backdoor Attacks.
Security in Networking
Presentation transcript:

INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication and other applications.

WHAT IS WIRE-LESS NETWORK? Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections—without requiring network or peripheral cabling. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks

TYPES OF WIRE-LESS NETWORK. Wireless Personal Area Networks (WPAN) Wireless local area networks (WLAN) Wireless Wide Area Networks (WWAN)

WIRE-LESS NETWORK. EXAMPLE OF WWPN.

WIRE-LESS NETWORK. EXAMPLE OF WLAN.

WIRE-LESS NETWORK. EXAMPLE OF WWAN

WHY WE NEED SECURITY SYSTEM when an unauthorized user gains access to the network and consumes network resources. Malicious hackers, sometimes called crackers, are individuals who break into a system without authorization, usually for personal gain or to do harm.

WHY WE NEED SECURITY SYSTEM Malicious code involves viruses,Trojan horses, logic bombs, or other unwanted software that is designed to damage files or bring down a system.

Different types of threats to network: Application backdoors. Operating system bugs. bombs. Macros. Viruses. Spam. Trojan/key logger attacks.

Threats to network: Application backdoors: Some programs have special features that allow for backdoor or hidden access, that provides some level of access of data. Operating system bugs: some operating systems Have backdoors with insufficient security controls.

Threats to network: bombs : An bomb is usually a personal attack. Someone sends you the same hundreds or thousands of times until your system cannot accept any more messages. Macros: A script of commands that the application can run. Hackers have taken advantage of this to create their own macros that, depending on the application, can destroy your data or crash your computer.

Threats to network: VIRSUSES: Probably the most well-known threat is computer viruses.computer viruses A virus is a small program that can copy itself to other computers. SPAM: spam is the electronic equivalent of mail. TROJAN / KEY ATTACKS: Trojan is a tool which when installed in a system, can be misused for malicious purposes by the attacker.

Network security can be done by various methods. Virtual Private Network. Firewalls. Internet Protocol Security (IP Sec). AAA Server.

Virtual Private Network (VPN). A virtual private network ( VPN ) is a way to use a public telecommunication infrastructure. In Internet, to provide remote offices or individual users with secure access to their organization's network. The goal of a VPN is to provide the organization with the security, but at a much lower cost.

Virtual Private Network (VPN). BEFORE SEURITY.AFTER SECURITY.

INTERNET FIREWALLS. A firewall provides a strong barrier between your private network and the Internet. Set firewalls to restrict the number of open ports, what type of packets are passed and what are blocked.

INTERNET PROTOCOL SECURITY. (IP SEC) It provides enhanced security features such as better encryption algorithms and more comprehensive authentication. IP Sec can encrypt data between various devices, such as :  Firewall to server  Server to PC

AAA Server. AAA (authentication, authorization and accounting) When a request to establish a session comes in from a dial up client,the Request is proxies to the AAA server. AAA then checks the following :  Who you are (authentication)  What you are allowed to do (authorization)  What you actually do (accounting)

CONCLUSION: There is no gain saying the fact that SECURITY plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers.