You are on page 1of 20

Deepti Sharma Harshita Sinha Himanshu Yadav Saurabh Srivastava Shreya Sumit Agarwal

PGFB1113 PGFB1118 PGFB1119 PGFB1141 PGFB1144 PGFB1151

is NETWORK security? Why do we need security? Hacker Vs Cracker Main Objectives & Threats Common security attacks and countermeasures
What

Firewalls Intrusion Detection Systems

Conclusions

& Learning Experiences.

The area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.

Security is one of the most critical aspects of any network. A computer network is only as strong as its weakest link. Computer security has become more important than ever.

The security community distinguishes between a hacker, someone who (nonmaliciously) programs,manages or uses computing systems, and a cracker, someone who attempts access to computing systems for malicious purposes.

CONFIDENTIALITY

INTEGRITY

AVAILABILITY

LEGITIMATE

USE

INFORMATION

LEAKAGE

INTEGRITY

VIOLATION

DENIAL

OF SERVICE USE

ILLEGITIMATE

FIREWALLS

INTRUSION

DETECTION

SYSTEM

A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. It filters all traffic between protected network and a less trustworthy network.

FILTER The system examines each packet entering or leaving the network and accepts or rejects it based on user defined rules. PROXY SERVER It intercepts all messages entering and leaving the network.
PACKET

intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports.
An Ex.

Burglar and car alarms are forms of IDS

Monitoring

users and system activity. Recognizing known attack patterns in system activity. Identifying abnormal activity through statistical analysis. Installing and operating traps to record information about intruders.

CONCLUSIONS

&
LEARNING EXPERIENCES

http://www.robertgraham.com/pubs/networ

k-intrusion-detection.html http://online.securityfocus.com/infocus/152 7 http://www.snort.org/ http://www.cert.org/ http://www.nmap.org/ http://grc.com/dos/grcdos.htm http://lcam tuf.coredump.cx/newtcp/

THANK YOU

Do You have Any Questions

You might also like