SlideShare a Scribd company logo
Network Security: Attacks, Tools and Techniques
Author
Siddharth Ghansela
Dept. of Computer Science & Application
G B Pant Engineering College
Pauri Garhwal-246194,India
Prepare By Waqas Ahmad
Telecommunication And Networking (SUIT Peshawar)
Presented By: Abdullah Khan Reg No. Su-12-001-020.
Presented To: Mr. Adam Khan Program: BS CS .
Semester:6th .
◦
Abstract
Network security is main issue of this generation of computing
because many types of attacks are increasing day by day.
Establishing a network is not a big issue for network administrators
but protecting the entire network is a big issue. There are various
methods and tools are available today for destroying the existing
network. In this paper we mainly emphasize on the network
security also we present some major issues that can affect our
network.
What Is Network?
A group or system of interconnected
A network is two or more computers
A network is a collection of computers, servers, mainframes, network devices, peripherals, or
other devices connected to one another allowing for data to be shared and used
Computers: A group of interconnected (via cable and/or wireless) computers and peripherals
that is capable of sharing software and hardware resources between many users. The Internet is
a global network of networks. See also local area network and wide area network
What Is Network Security?
Network security is the process by which digital information are protected
Goals of security are to protect confidentiality, maintain integrity, and assure availability.
To secure the information and the entire network system, one specific methodology is required
which can be capable of providing the complete security solutions.
The security of network is a big issue for security administrators because network is growing day
by day.
BASIC TYPES OF ATTACKS
Here the Author are presenting some basic class of attacks which can be a cause for slow network
performance, uncontrolled traffic, viruses etc
A. Security Threats:
B. Virus Attack:
C. Unauthorized application installations:
D. Unauthorized Access
Define Each And Every Type Of Attack
A. Security Threats:
There are a number of security threats that can be the cause of a network
security attack. Main security threats are:
viruses
spywares
unauthorized access to the network resources and data
accidental deletion of the files and the uncontrolled internet access.
Define Each And Every Type Of Attack……
B. Virus Attack:
A computer virus is a small program or an executable code that when executed
and replicated, perform different unwanted and harmful functions for a computer and a network.
Viruses can destroy your hard disks and processors, consume memory at a very large scale and
destroy the overall performance of a computer or network
Define Each And Every Type Of Attack……
c) Unauthorized application installations:
Another virus and security attack prevention method is to install only the
authorized software applications to our network server and your all client computers. Nobody
should be allowed to install any kind of program which can cause security threats such as songs or
video programs, codec, gaming software or other web based applications.
Define Each And Every Type Of Attack……
D. Unauthorized Access:
Access to the network resources and data should be allowed only to the
authorized persons. Every shared folder and resources in your network should have been accessed
only by the authorized persons and should also be scanned and monitored regularly.
BASIC SECURITY TIPS
This basic Network Security useful security tips and methods to secure your network such as…
Installing a update antivirus program
Email scanning programs
Network monitoring tools
Internet access policy
CONCLUSION
There are a number of ways, which guarantee for the safety and security of
your network. Perform regular network security testing. Don’t provide more
or unwanted access to any network user. Must have an updated antivirus
program. Operating system should be regularly updated. If you have windows
based operating system you can update it from the Microsoft website. Keep
inventory of your network resources such as devices and software
applications. Turn off your computer when you are away and don’t leave
your computer unattended. Put a strong network and system administrator
password. Use a switched network, so that you can identify the problem very
quickly.
Ad

More Related Content

What's hot (20)

System security
System securitySystem security
System security
sommerville-videos
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Computer Security
Computer SecurityComputer Security
Computer Security
Klynveld Peat Marwick Goerdeler Global Services
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 

Viewers also liked (20)

Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
veeresh35
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network security
Network securityNetwork security
Network security
Gichelle Amon
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
rajakhurram
 
Network security attacks
Network security attacksNetwork security attacks
Network security attacks
Hoang Nguyen
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Jb ia
Jb   iaJb   ia
Jb ia
Deepal Samaraweera
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
Acend Corporate Learning
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
Emanuela Boroș
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
Prince Boonlia
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Ad

Similar to Network Security: Attacks, Tools and Techniques (20)

CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
PremSahebrajMistry
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
How to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docxHow to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docx
IT AMC Support Dubai - Techno Edge Systems LLC
 
mangement MEASURE OF CYBER SECURITY MANAGMNET
mangement MEASURE OF CYBER SECURITY MANAGMNETmangement MEASURE OF CYBER SECURITY MANAGMNET
mangement MEASURE OF CYBER SECURITY MANAGMNET
sachinpd1008
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
Network security
Network securityNetwork security
Network security
William hendric
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Provide Network System Administrationa.pptx
Provide Network System Administrationa.pptxProvide Network System Administrationa.pptx
Provide Network System Administrationa.pptx
nahomtilahun29
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
Up2Universe
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
Akttripathi
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
Manasa Deshaboina
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Cyber Security awareness of cyber security
Cyber Security awareness of cyber securityCyber Security awareness of cyber security
Cyber Security awareness of cyber security
BabaBoss5
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
KerimBozkanli
 
IoT Security
IoT SecurityIoT Security
IoT Security
Narudom Roongsiriwong, CISSP
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
mangement MEASURE OF CYBER SECURITY MANAGMNET
mangement MEASURE OF CYBER SECURITY MANAGMNETmangement MEASURE OF CYBER SECURITY MANAGMNET
mangement MEASURE OF CYBER SECURITY MANAGMNET
sachinpd1008
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Provide Network System Administrationa.pptx
Provide Network System Administrationa.pptxProvide Network System Administrationa.pptx
Provide Network System Administrationa.pptx
nahomtilahun29
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
Up2Universe
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
Akttripathi
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Cyber Security awareness of cyber security
Cyber Security awareness of cyber securityCyber Security awareness of cyber security
Cyber Security awareness of cyber security
BabaBoss5
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
KerimBozkanli
 
Ad

Recently uploaded (20)

Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 

Network Security: Attacks, Tools and Techniques

  • 1. Network Security: Attacks, Tools and Techniques Author Siddharth Ghansela Dept. of Computer Science & Application G B Pant Engineering College Pauri Garhwal-246194,India Prepare By Waqas Ahmad Telecommunication And Networking (SUIT Peshawar) Presented By: Abdullah Khan Reg No. Su-12-001-020. Presented To: Mr. Adam Khan Program: BS CS . Semester:6th . ◦
  • 2. Abstract Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.
  • 3. What Is Network? A group or system of interconnected A network is two or more computers A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another allowing for data to be shared and used Computers: A group of interconnected (via cable and/or wireless) computers and peripherals that is capable of sharing software and hardware resources between many users. The Internet is a global network of networks. See also local area network and wide area network
  • 4. What Is Network Security? Network security is the process by which digital information are protected Goals of security are to protect confidentiality, maintain integrity, and assure availability. To secure the information and the entire network system, one specific methodology is required which can be capable of providing the complete security solutions. The security of network is a big issue for security administrators because network is growing day by day.
  • 5. BASIC TYPES OF ATTACKS Here the Author are presenting some basic class of attacks which can be a cause for slow network performance, uncontrolled traffic, viruses etc A. Security Threats: B. Virus Attack: C. Unauthorized application installations: D. Unauthorized Access
  • 6. Define Each And Every Type Of Attack A. Security Threats: There are a number of security threats that can be the cause of a network security attack. Main security threats are: viruses spywares unauthorized access to the network resources and data accidental deletion of the files and the uncontrolled internet access.
  • 7. Define Each And Every Type Of Attack…… B. Virus Attack: A computer virus is a small program or an executable code that when executed and replicated, perform different unwanted and harmful functions for a computer and a network. Viruses can destroy your hard disks and processors, consume memory at a very large scale and destroy the overall performance of a computer or network
  • 8. Define Each And Every Type Of Attack…… c) Unauthorized application installations: Another virus and security attack prevention method is to install only the authorized software applications to our network server and your all client computers. Nobody should be allowed to install any kind of program which can cause security threats such as songs or video programs, codec, gaming software or other web based applications.
  • 9. Define Each And Every Type Of Attack…… D. Unauthorized Access: Access to the network resources and data should be allowed only to the authorized persons. Every shared folder and resources in your network should have been accessed only by the authorized persons and should also be scanned and monitored regularly.
  • 10. BASIC SECURITY TIPS This basic Network Security useful security tips and methods to secure your network such as… Installing a update antivirus program Email scanning programs Network monitoring tools Internet access policy
  • 11. CONCLUSION There are a number of ways, which guarantee for the safety and security of your network. Perform regular network security testing. Don’t provide more or unwanted access to any network user. Must have an updated antivirus program. Operating system should be regularly updated. If you have windows based operating system you can update it from the Microsoft website. Keep inventory of your network resources such as devices and software applications. Turn off your computer when you are away and don’t leave your computer unattended. Put a strong network and system administrator password. Use a switched network, so that you can identify the problem very quickly.