0% found this document useful (0 votes)
124 views

Eminar On Omputer Etwork Security

This document summarizes a seminar on computer network security. It begins by defining a computer network and introducing the concept of network security. It then discusses the history and need for network security. The document outlines different types of network security including WPA and WEP. It also covers authentication methods, types of security attacks, and the advantages and disadvantages of network security. Finally, it discusses network security architecture and concludes by emphasizing the importance of network security as internet usage increases.

Uploaded by

Subhasmita Patel
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views

Eminar On Omputer Etwork Security

This document summarizes a seminar on computer network security. It begins by defining a computer network and introducing the concept of network security. It then discusses the history and need for network security. The document outlines different types of network security including WPA and WEP. It also covers authentication methods, types of security attacks, and the advantages and disadvantages of network security. Finally, it discusses network security architecture and concludes by emphasizing the importance of network security as internet usage increases.

Uploaded by

Subhasmita Patel
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

SEMINAR ON COMPUTER NETWORK

SECURITY

SUBMITTED BY:
SWADHINA PATEL
SIC NO-180719018
CONTENT:
•What is a network
•Introduction
•What is Network Security
•History
•Need for Network Security
• types
•Authentication
•Network attacks methods
•Advantages
•Disadvantages
•Network security architecture
•conclusion
WHAT IS A NETWORK?
 Computer network is a collection of computers also
nodes which are connected to each other using some
protocols.
 Protocols are set of rules that define how the
communication is going to happen
INTRODUCTION:
 Information security is the process of securing
information data from unauthorized access , use,
modification, tempering.
 Network security is a complicated subject,
historically only tackled by well-trained and
experienced experts.
 However ,as more and more people become
“wired", an increasing number of people need to
understand the basics of security in a networked
world.
WHAT IS NETWORK SECURITY
 Network security is any action an origination
takes to prevent malicious use or accidental
damage to the network’s private data, its users,
or their devices.
 The goal of network security is to keep the
network running and safe for all users.
 Network security helps in protecting personal
data of clients existing on network.
 Network security provides different levels of
access. If there are various computers attached to
a network, there may be some computers that
HISTORY
 Internet security has been an issue since the
internet rose to an international phenomenon.
 By 1996,the internet already connected 13
million computers, so early security protocols
were required.
 These protocols required computer information
to be confidential, available, and have integrity.
 Because the internet made information available
to everyone, people needed network security to
make their information
NEED FOR NETWORK SECURITY
 In the past ,hackers were highly skilled
programmers who understand the details of
computer communication and how to exploit
vulnerabilities . today almost anyone can become
a hacker by downloading tools from the internet.
 These complicated attack tools and generally
open networks have generated an increased need
for network security and dynamic security
policies.
TYPES:
1. Wi-Fi Protected Access(WPA)
 WPA encrypts information, and checks to make
sure that the network security key has not been
modified.
 WAP also authenticated users to help ensure
that only authorized people can access the
network.
 WPA is designed to work with all wireless
network adapters, but it might not work with
older routers or access points.
TYPES…
2. Wired Equivalent Privacy(WEP)
 WEP is an older network security method that is
still available to support older devices, but it is
no longer recommended.
 When you enable WEP, you set up a network
security key.
 This key encrypts the information that one
computer send to another computer across your
network. However , WEP security is relatively
easy to crack.
AUTHENTICATION
 One-factor authentication-this is “something a
user knows.”The most recognized type of one-
factor authentication method is the password.

 Two-factor authentication- in addition to the first


factor , the second factor is "something a user
has.”
SECURITY ATTACKS
 Interruption: this is an attack on availability
 Interception: this is an attack on confidentiality

 Modification: this is an attack on integrity

 Fabrication: this is an attack on authenticity


CLASSIFY SECURITY ATTACKS AS
 Passive attacks-
Eavesdropping on, or monitoring of, transmission
to:
-obtain message contents, or
-monitor traffic flows
 Active attacks-
Modification of data stream to:
-masquerade of one entity as some other :man-in-
the-middle
-reply previous messages
-modify messages in transit
-denial of service
ADVANTAGES/DISADVANTAGES

Advantages Disadvantages
 protectspersonal data of  shared resource used by
clients existing on many applications
network representing different
 protection of interests.
information that is  network conversation or
shared between a distributed application
computers on the may be compromised by
network. an adversary.
 provides different levels  mutually antagonistic
of access. opportunistic criminals.
NETWORK SECURITY ARCHITECTURE

 What & why


-an organization's network infrastructure evolves over
many years.
-although this evolution is in direct response to the
changing business needs, in many cases security has
been an afterthought.
-even implemented the most advanced security
technologies of the day won’t help if the underlying
security architecture is flawed.
HOW?
o Systematic approach to the evolution of the current
state ensures a detailed review of the current
architecture, technology & security policy of the
organization ,management practices and planned
changes.
Some of the aspects that will be examined are:
 Review latest threat Risk Analysis report.

 Analysis of current IT network, information flow


according to business requirements and points of
access to information.
CONCLUSION
 network security is an important field that is
increasingly gaining attention as the internet
usage increases.
 The security threats and internet protocols were
analyzed to determine the necessary security
technology,
 However, the current development in network
security is not very impressive and significant.
THANK YOU
Q/A

You might also like