Professional Documents
Culture Documents
is NETWORK security? Why do we need security? Hacker Vs Cracker Main Objectives & Threats Common security attacks and countermeasures
What
Conclusions
The area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.
Security is one of the most critical aspects of any network. A computer network is only as strong as its weakest link. Computer security has become more important than ever.
The security community distinguishes between a hacker, someone who (nonmaliciously) programs,manages or uses computing systems, and a cracker, someone who attempts access to computing systems for malicious purposes.
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
LEGITIMATE
USE
INFORMATION
LEAKAGE
INTEGRITY
VIOLATION
DENIAL
OF SERVICE USE
ILLEGITIMATE
FIREWALLS
INTRUSION
DETECTION
SYSTEM
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. It filters all traffic between protected network and a less trustworthy network.
FILTER The system examines each packet entering or leaving the network and accepts or rejects it based on user defined rules. PROXY SERVER It intercepts all messages entering and leaving the network.
PACKET
intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports.
An Ex.
Monitoring
users and system activity. Recognizing known attack patterns in system activity. Identifying abnormal activity through statistical analysis. Installing and operating traps to record information about intruders.
CONCLUSIONS
&
LEARNING EXPERIENCES
http://www.robertgraham.com/pubs/networ
THANK YOU