SlideShare a Scribd company logo
1
ASPECTS OF NETWORK
SECURITY
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan
Aspects of Network Security:
1. Privacy
Privacy means both the sender and the
receiver expects confidentiality. The
transmitted message should be sent only
to the intended receiver while the
message should be opaque for other
users. Only the sender and receiver should
be able to understand the transmitted
message as eavesdroppers can intercept
the message. Therefore, there is a
requirement to encrypt the message so
that the message cannot be intercepted.
This aspect of confidentiality is commonly
used to achieve secure communication.
2. Message Integrity
• Data integrity means that the data must
arrive at the receiver exactly as it was sent.
There transmission, either maliciously or
accident, in a transit. As there are more and
more monetary exchanges over the internet,
data integrity is more crucial. The data
integrity must be preserved i.e there must be
no changes in the data content during secure
communication.
3. End-point authentication
• Authentication means that the receiver is
sure of the senders identity, i.e.no imposter
has sent the message .
Non-Repudiation
Non-Repudiation means that the receiver must
be able to prove that the received message has
come from a specific sender. The sender must
not deny sending a message that he or she
send. The burden of proving the identity
comes on the receiver. For example, if a
customer sends a request to transfer the
money from one account to another account,
then the bank must have a proof that the
customer has requested for the transaction.
Network Security Controls
It consists of three different
controls:
1.Physical
2.Technical
3.Administrative.
Physical Network Security
Physical security controls are designed to prevent
unauthorized personnel from gaining physical access
to network components such as routers, cabling
cupboards and so on. It protects from acquiring the
control over the confidentiality of the network.
Controlled access, such as locks, biometric
authentication and other devices, is essential in any
organization.
Physical Network Security
Physical security controls are designed to prevent
unauthorized personnel from gaining physical access to
network components such as routers, cabling cupboards and
so on. It protects from acquiring the control over the
confidentiality of the network .
Controlled access, such as locks, biometric authentication
and other devices, is essential in any organization.
Technical Network Security
Technical security controls protect data that
is stored on the network or which is in transit
across, into or out of the network. Protection
is twofold; it needs to protect data and
systems from unauthorized personnel, and it
also needs to protect against malicious
activities from employees.
Administrative Network Security
This level of network security protects user
behaviour like how the permission has been
granted and how the authorization process
takes place. This also ensures the level of
sophistication the network might need for
protecting it through all the attacks. This
level also suggests necessary amendments
that have to be done over the infrastructure.
To protect a system, we must take
Security Measures at 4 levels
LEVEL 1 : Physical :
The site or sites containing the computer systems
must be physically secured against entry by
intruders. Both the machine rooms and the
terminals or workstations that have access to the
machines must be secured.
LEVEL 2 :Human
Authorizing users must be done carefully to
assure that only appropriate users have access to
the system. Even authorized users, however, may
be "encouraged" to let others use their access (in
exchange for a bribe, for example).
Phishing
Dumpster
Diving
LEVEL 3: Operating System
The system must protect itself from accidental or
purposeful security breaches. A runaway process
could constitute an accidental denial-of-service
attack. A query to a service could reveal passwords.
A stack overflow could allow the launching of an
unauthorized process. The list of possible breaches is
almost endless.
LEVEL 4: Network
Much computer data in modern systems travels over
private leased lines, shared lines like the Internet,
wireless connections, or dial-up lines. Intercepting
these data could be just as harmful as breaking into a
computer; and interruption of communications could
constitute a remote denial-of-service attack.
ASSIGNMENT
Q1. Which is the most important aspects of
security?
Q2. What are the core components of security?
Ad

More Related Content

What's hot (20)

System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
SHUBHA CHATURVEDI
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
Intruders
IntrudersIntruders
Intruders
ALOK KUMAR
 
Hacking
HackingHacking
Hacking
LutfulM
 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
jp tj
 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
Ankit Gupta
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
 
Mobile security
Mobile securityMobile security
Mobile security
Eng Hasan Shamroukh CISCO Exams Author
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
network security
network securitynetwork security
network security
nandita0798
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
veeresh35
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
SHUBHA CHATURVEDI
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
jp tj
 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
Ankit Gupta
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 
network security
network securitynetwork security
network security
nandita0798
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 

Similar to Aspects of Network Security (20)

Computer Security Essentials.pptx
 Computer Security Essentials.pptx Computer Security Essentials.pptx
Computer Security Essentials.pptx
Guna Dhondwad
 
Wireless Communication and MobileCo5.pptx
Wireless Communication and MobileCo5.pptxWireless Communication and MobileCo5.pptx
Wireless Communication and MobileCo5.pptx
AbdurehmanDawud
 
CCS354-NETWORK SECURITY-network-security notes
CCS354-NETWORK SECURITY-network-security notesCCS354-NETWORK SECURITY-network-security notes
CCS354-NETWORK SECURITY-network-security notes
Kirubaburi R
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Unit 1 Network Fundamentals and Security .pptx
Unit 1 Network Fundamentals and Security .pptxUnit 1 Network Fundamentals and Security .pptx
Unit 1 Network Fundamentals and Security .pptx
Guna Dhondwad
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
 
security IDS
security IDSsecurity IDS
security IDS
Gregory Hanis
 
Unit 1-NETWORK Security.pptx............
Unit 1-NETWORK Security.pptx............Unit 1-NETWORK Security.pptx............
Unit 1-NETWORK Security.pptx............
r47381047
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
ShreyaChavan28
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi)
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
IJRAT
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Computer Security Essentials.pptx
 Computer Security Essentials.pptx Computer Security Essentials.pptx
Computer Security Essentials.pptx
Guna Dhondwad
 
Wireless Communication and MobileCo5.pptx
Wireless Communication and MobileCo5.pptxWireless Communication and MobileCo5.pptx
Wireless Communication and MobileCo5.pptx
AbdurehmanDawud
 
CCS354-NETWORK SECURITY-network-security notes
CCS354-NETWORK SECURITY-network-security notesCCS354-NETWORK SECURITY-network-security notes
CCS354-NETWORK SECURITY-network-security notes
Kirubaburi R
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Unit 1 Network Fundamentals and Security .pptx
Unit 1 Network Fundamentals and Security .pptxUnit 1 Network Fundamentals and Security .pptx
Unit 1 Network Fundamentals and Security .pptx
Guna Dhondwad
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
 
Unit 1-NETWORK Security.pptx............
Unit 1-NETWORK Security.pptx............Unit 1-NETWORK Security.pptx............
Unit 1-NETWORK Security.pptx............
r47381047
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
ShreyaChavan28
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
IJRAT
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Ad

More from SHUBHA CHATURVEDI (20)

Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
SHUBHA CHATURVEDI
 
Unix and its Components
Unix and its ComponentsUnix and its Components
Unix and its Components
SHUBHA CHATURVEDI
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
SHUBHA CHATURVEDI
 
Linux Features
Linux FeaturesLinux Features
Linux Features
SHUBHA CHATURVEDI
 
Architecture of Linux
 Architecture of Linux Architecture of Linux
Architecture of Linux
SHUBHA CHATURVEDI
 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
SHUBHA CHATURVEDI
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Stream Ciphers
Stream CiphersStream Ciphers
Stream Ciphers
SHUBHA CHATURVEDI
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
SHUBHA CHATURVEDI
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
SHUBHA CHATURVEDI
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
SHUBHA CHATURVEDI
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
SHUBHA CHATURVEDI
 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
SHUBHA CHATURVEDI
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
SHUBHA CHATURVEDI
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
SHUBHA CHATURVEDI
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
SHUBHA CHATURVEDI
 
Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
SHUBHA CHATURVEDI
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
SHUBHA CHATURVEDI
 
Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
SHUBHA CHATURVEDI
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Polygraphic Substitution Cipher - Part 2
Polygraphic Substitution Cipher  - Part 2Polygraphic Substitution Cipher  - Part 2
Polygraphic Substitution Cipher - Part 2
SHUBHA CHATURVEDI
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
SHUBHA CHATURVEDI
 
Homophonic Substitution Cipher
Homophonic Substitution CipherHomophonic Substitution Cipher
Homophonic Substitution Cipher
SHUBHA CHATURVEDI
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Classical encryption techniques
Classical encryption  techniquesClassical encryption  techniques
Classical encryption techniques
SHUBHA CHATURVEDI
 
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1CLASSICAL ENCRYPTION TECHNIQUE- PART 1
CLASSICAL ENCRYPTION TECHNIQUE- PART 1
SHUBHA CHATURVEDI
 
Ad

Recently uploaded (20)

Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 

Aspects of Network Security

  • 1. 1 ASPECTS OF NETWORK SECURITY Prof. Neeraj Bhargava Mrs. Shubha Chaturvedi Department of Computer Science, School of Engineering & System Sciences MDS University Ajmer, Rajasthan
  • 2. Aspects of Network Security:
  • 3. 1. Privacy Privacy means both the sender and the receiver expects confidentiality. The transmitted message should be sent only to the intended receiver while the message should be opaque for other users. Only the sender and receiver should be able to understand the transmitted message as eavesdroppers can intercept the message. Therefore, there is a requirement to encrypt the message so that the message cannot be intercepted. This aspect of confidentiality is commonly used to achieve secure communication.
  • 4. 2. Message Integrity • Data integrity means that the data must arrive at the receiver exactly as it was sent. There transmission, either maliciously or accident, in a transit. As there are more and more monetary exchanges over the internet, data integrity is more crucial. The data integrity must be preserved i.e there must be no changes in the data content during secure communication.
  • 5. 3. End-point authentication • Authentication means that the receiver is sure of the senders identity, i.e.no imposter has sent the message .
  • 6. Non-Repudiation Non-Repudiation means that the receiver must be able to prove that the received message has come from a specific sender. The sender must not deny sending a message that he or she send. The burden of proving the identity comes on the receiver. For example, if a customer sends a request to transfer the money from one account to another account, then the bank must have a proof that the customer has requested for the transaction.
  • 7. Network Security Controls It consists of three different controls: 1.Physical 2.Technical 3.Administrative.
  • 8. Physical Network Security Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. It protects from acquiring the control over the confidentiality of the network. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
  • 9. Physical Network Security Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. It protects from acquiring the control over the confidentiality of the network . Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
  • 10. Technical Network Security Technical security controls protect data that is stored on the network or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.
  • 11. Administrative Network Security This level of network security protects user behaviour like how the permission has been granted and how the authorization process takes place. This also ensures the level of sophistication the network might need for protecting it through all the attacks. This level also suggests necessary amendments that have to be done over the infrastructure.
  • 12. To protect a system, we must take Security Measures at 4 levels LEVEL 1 : Physical : The site or sites containing the computer systems must be physically secured against entry by intruders. Both the machine rooms and the terminals or workstations that have access to the machines must be secured.
  • 13. LEVEL 2 :Human Authorizing users must be done carefully to assure that only appropriate users have access to the system. Even authorized users, however, may be "encouraged" to let others use their access (in exchange for a bribe, for example). Phishing Dumpster Diving
  • 14. LEVEL 3: Operating System The system must protect itself from accidental or purposeful security breaches. A runaway process could constitute an accidental denial-of-service attack. A query to a service could reveal passwords. A stack overflow could allow the launching of an unauthorized process. The list of possible breaches is almost endless. LEVEL 4: Network Much computer data in modern systems travels over private leased lines, shared lines like the Internet, wireless connections, or dial-up lines. Intercepting these data could be just as harmful as breaking into a computer; and interruption of communications could constitute a remote denial-of-service attack.
  • 15. ASSIGNMENT Q1. Which is the most important aspects of security? Q2. What are the core components of security?