Presented By: Anurag Roll No:-1703233 Topic: Network Security
Presented By: Anurag Roll No:-1703233 Topic: Network Security
• Malware
• Viruses
• Trojan Horse
• Worms
5
Install a firewall
Only those who are supposed to access the data can access it.
Integrity
You are who you say you are. While there can be various forms of
identification used, authentication is usually through a PIN like
your debit card uses or the login on your email account.
Accounting
Protect data
As discussed, network security keeps a check on unauthorized access.
Prevents cyber attack
Most of the attack on the network comes from internet.
Levels of access
The security software gives different levels of access to different user.
Centrally controlled
Unlike the desktop security software, the network security software is controlled by
a central user called network administrator.
Costly set up
The set up of a network security system can be a bit expensive. Purchasing the software,
installing it etc. can become costly especially for smaller networks.
Time consuming
The software installed on some networks is difficult to work with. It needs authentication
using two passwords to ensure double security which has to be entered every time you
edit a document.
Requires skilled staff
To manage large networks is not an easy task. It requires highly skilled technicians who
can handle any security issue that arises.
Careless Admin
When the best software is installed and everything required is done, it is natural for the
admin to be careless at times.
Applications and Example of
Network Security.
E-mail Security
Nowadays, e-mail has become very widely used network application. Through e-mail,
sending a message directly from the sender’s machine to the recipient’s machine.
• Confidentiality
• Authentication
• Integrity
• Proof of submission
• Proof of delivery
Examples of Network Security
Firewalls
One of the most basic and easily implemented methods of network security is the firewall.
A firewall can be either software based, such is what is provided with Windows, or
hardware based, such as a router. The basic idea behind a firewall is to allow authorized
access to a computer while blocking unauthorized access. This is accomplished by
configuring access conditions based on user defined rules, IP addresses, and port
accessibility
Definition - What does Internet Protocol Security
(IPsec) mean?
Encryption –
◦ The process of converting plain text into an
unintelligible format (cipher text) is called
Encryption.
Decryption –
◦ The process of converting cipher text into a plain
text is called Decryption.
What are the Types of Cryptography
• 2 Traffic Class (8-bits): These 8 bits are divided into two parts. The most significant 6 bits are used for
Type of Service to let the Router Known what services should be provided to this packet. The least significant 2
bits are used for Explicit Congestion Notification (ECN).
• 3 Flow Label (20-bits): This label is used to maintain the sequential flow of the packets belonging to a
communication. The source labels the sequence to help the router identify that a particular packet belongs to a
specific flow of information. This field helps avoid re-ordering of data packets. It is designed for streaming/real-
time media.
• 4.Payload Length (16-bits): This field is used to tell the routers how much information a particular
packet contains in its payload. Payload is composed of Extension Headers and Upper Layer data.
With 16 bits, up to 65535 bytes can be indicated; but if the Extension Headers contain Hop-by-Hop
Extension Header, then the payload may exceed 65535 bytes and this field is set to 0.
• 5 Next Header (8-bits): This field is used to indicate either the type of Extension Header, or if
the Extension Header is not present then it indicates the Upper Layer PDU. The values for the type
of Upper Layer PDU are same as IPv4’s.
• 6 Hop Limit (8-bits): This field is used to stop packet to loop in the network infinitely. This is
same as TTL in IPv4. The value of Hop Limit field is decremented by 1 as it passes a link
(router/hop). When the field reaches 0 the packet is discarded.
• 7 Source Address (128-bits): This field indicates the address of originator of the packet.
• 8 Destination Address (128-bits): This field provides the address of intended recipient of the
packet.