Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security in Networking

Similar presentations


Presentation on theme: "Security in Networking"— Presentation transcript:

1 Security in Networking
Done by: Zeyana Saif Ahmed ALkindi ID #:

2 Outline Definition of Network Security
The source of Network Security violation Techniques used in securing Network

3 Network Security Vs. Computer Security
Network security is concerned with who connects to and what goes across a network connecting systems. Network security is making sure that your network of computers is secure Computer security is making sure that one single computer is secure

4 Why do we need security? Protect vital information while still allowing access to those who need it, like medical records Provide authentication and access control for resources Guarantee availability of resources

5 Goals of Network Security
Prevention: prevent attackers from violating security policy Detection: detect attackers’ violation of security policy Response: Sop attack, assess and repair damages Continue to function correctly even if attack succeeds.

6 Security Attributes Identification Authentication
Access Control (Authorization)  Integrity Availability Confidentiality Accountability

7 Threat Threat is a violation of network security requirements. In other words, threat is an occurrence that can affect a system or an organization as a whole.

8 Vulnerability Vulnerability is a weaknesses in the network that can be exploited by a threat. Lack of user awareness, users copy and share infected software, fail to detect signs of virus activity and do not understand proper security techniques. Absence of security controls, personal computers generally lack software and hardware security mechanisms that help to prevent and detect unauthorized users. Ineffective use of existing security controls, using easily guessed passwords, failing to use access control, granting users more access to recourses than is necessary. Unauthorized use, unauthorized users can break into systems.

9 Source of Security violation
Employees: The largest category of security violations consists of those with the easiest access to computers namely employees Hackers & Crackers : Hackers are people who gain unauthorized access to computer system for the fun and challenge of it. Crackers are people who do the same thing but for malicious purposes like stealing technical information or introduce a destructive computer program into the system.

10 Common Security Attack
Malicious programs: called malware, which is short for malicious software. There are especially designed to damage or disrupt the security system. The three common types of malware are viruses, worms, and Trojan horses

11 Common Security Attack
Denial of Service: make a network service unusable, usually by overloading the server or network Ex: SMURF

12 TCP hijacking TCP hijacking is a method of attacking over a web user.

13 Packet Sniffing When someone wants to send a packet to some else
They put the bits on the wire with the destination MAC address … And other hosts are listening on the wire to detect for collisions … It couldn’t get any easier to figure out what data is being transmitted over the network!

14 Network Authentication Methods
In a network environment, the security settings control how users and computers authenticate to the network. Authentication is the first line of defense against attack or intrusion into network systems The various network authentication methods are: Strong passwords Kerberos Extensible Authentication Protocol (EAP)

15 Strong Passwords A strong Password is a password that meet complexity requirements that are set by a system administrator and documented in a password policy by specifying: Authentication based on user name/password combination called as authentication by assertion

16 Kerberos Kerberos is an internet standard authentication protocol that links a user name and password to an authority that can certify that the user is valid and also verify the user’s ability to access recourses

17 A Kerberos process A Kerberos client uses a Kerberos authentication process to establish a secure connection with a service

18 Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol (EAP) is an authentication protocol that enables systems to use hardware based-identifiers such as, fingerprint scanners or smart card readers, for authentication.

19 Firewall A firewall is a software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic.

20 Network Address Translation
Network Address Translation is a form of Internet security that conceals (hide) internal addressing schemes from the public internet. NAT is implemented as : Software such as ICS in windows systems Hardware such as cable modems and DSL routers

21 The NAT process The NAT process translates internal and external addresses based on port numbers following the steps: Step1: Client Request Step2: Source Address Conversation Step3: Data return Step4: Internal Source identification Step5: Data deliver

22 DMZs))Demilitarized Zones
DMZ is a small section of a private network that is located between two firewalls and made available for public access.

23 Proxy servers Proxy servers are often used to provide security for internet applications. A Proxy servers acts as an intermediary between a PC and the internet, separating an enterprise network from an outside network.

24 Conclusion Shortly, Network interconnects computers and communication devices within buildings. The data which is transmitted through the Network should be secured. The security administrators should be aware of possible misuse and take responsibility for safeguarding the Networks resources under their control.

25 Thank You !


Download ppt "Security in Networking"

Similar presentations


Ads by Google