Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.

Similar presentations


Presentation on theme: "INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication."— Presentation transcript:

1

2 INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication and other applications.

3 WHAT IS WIRE-LESS NETWORK? Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections—without requiring network or peripheral cabling. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks

4 TYPES OF WIRE-LESS NETWORK. Wireless Personal Area Networks (WPAN) Wireless local area networks (WLAN) Wireless Wide Area Networks (WWAN)

5 WIRE-LESS NETWORK. EXAMPLE OF WWPN.

6 WIRE-LESS NETWORK. EXAMPLE OF WLAN.

7 WIRE-LESS NETWORK. EXAMPLE OF WWAN

8 WHY WE NEED SECURITY SYSTEM when an unauthorized user gains access to the network and consumes network resources. Malicious hackers, sometimes called crackers, are individuals who break into a system without authorization, usually for personal gain or to do harm.

9 WHY WE NEED SECURITY SYSTEM Malicious code involves viruses,Trojan horses, logic bombs, or other unwanted software that is designed to damage files or bring down a system.

10 Different types of threats to network: Application backdoors. Operating system bugs. E-mail bombs. Macros. Viruses. Spam. Trojan/key logger attacks.

11 Threats to network: Application backdoors: Some programs have special features that allow for backdoor or hidden access, that provides some level of access of data. Operating system bugs: some operating systems Have backdoors with insufficient security controls.

12 Threats to network: E-mail bombs : An e-mail bomb is usually a personal attack. Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages. Macros: A script of commands that the application can run. Hackers have taken advantage of this to create their own macros that, depending on the application, can destroy your data or crash your computer.

13 Threats to network: VIRSUSES: Probably the most well-known threat is computer viruses.computer viruses A virus is a small program that can copy itself to other computers. SPAM: spam is the electronic equivalent of mail. TROJAN / KEY ATTACKS: Trojan is a tool which when installed in a system, can be misused for malicious purposes by the attacker.

14 Network security can be done by various methods. Virtual Private Network. Firewalls. Internet Protocol Security (IP Sec). AAA Server.

15 Virtual Private Network (VPN). A virtual private network ( VPN ) is a way to use a public telecommunication infrastructure. In Internet, to provide remote offices or individual users with secure access to their organization's network. The goal of a VPN is to provide the organization with the security, but at a much lower cost.

16 Virtual Private Network (VPN). BEFORE SEURITY.AFTER SECURITY.

17 INTERNET FIREWALLS. A firewall provides a strong barrier between your private network and the Internet. Set firewalls to restrict the number of open ports, what type of packets are passed and what are blocked.

18 INTERNET PROTOCOL SECURITY. (IP SEC) It provides enhanced security features such as better encryption algorithms and more comprehensive authentication. IP Sec can encrypt data between various devices, such as :  Firewall to server  Server to PC

19 AAA Server. AAA (authentication, authorization and accounting) When a request to establish a session comes in from a dial up client,the Request is proxies to the AAA server. AAA then checks the following :  Who you are (authentication)  What you are allowed to do (authorization)  What you actually do (accounting)

20 CONCLUSION: There is no gain saying the fact that SECURITY plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers.

21


Download ppt "INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication."

Similar presentations


Ads by Google