Presented By: Anurag Roll No:-1703233 Topic: Network Security
Presented By: Anurag Roll No:-1703233 Topic: Network Security
Presented By: Anurag Roll No:-1703233 Topic: Network Security
• Malware
• Viruses
• Trojan Horse
• Worms
5 Ways to Protect our Network Security:
Install a firewall
Confidentiality
Only those who are supposed to access the data can access it.
Integrity
You are who you say you are. While there can be various forms of
identification used, authentication is usually through a PIN like
your debit card uses or the login on your email account.
Accounting
Protect data
As discussed, network security keeps a check on unauthorized access.
Prevents cyber attack
Most of the attack on the network comes from internet.
Levels of access
The security software gives different levels of access to different user.
Centrally controlled
Unlike the desktop security software, the network security software is
controlled by a central user called network administrator.
Disadvantages of Network Security
Costly set up
The set up of a network security system can be a bit expensive. Purchasing the
software, installing it etc. can become costly especially for smaller networks.
Time consuming
The software installed on some networks is difficult to work with. It needs
authentication using two passwords to ensure double security which has to be
entered every time you edit a document.
Requires skilled staff
To manage large networks is not an easy task. It requires highly skilled technicians
who can handle any security issue that arises.
Careless Admin
When the best software is installed and everything required is done, it is natural
for the admin to be careless at times.
Applications and Example of Network
Security.
E-mail Security
Nowadays, e-mail has become very widely used network application. Through e-mail,
sending a message directly from the sender’s machine to the recipient’s machine.
• Confidentiality
• Authentication
• Integrity
• Proof of submission
• Proof of delivery
Examples of Network Security
Firewalls
One of the most basic and easily implemented methods of network security is the
firewall. A firewall can be either software based, such is what is provided with Windows,
or hardware based, such as a router. The basic idea behind a firewall is to allow
authorized access to a computer while blocking unauthorized access. This is
accomplished by configuring access conditions based on user defined rules, IP
addresses, and port accessibility
Definition - What does Internet Protocol
Security (IPsec) mean?
Internet protocol security (IPsec) is a set of protocols that provides security for Internet
Protocol. It can use cryptography to provide security. IPsec can be used for the setting up
of virtual private networks (VPNs) in a secure manner.
Cryptography
In a narrow sense
Mangling information into apparent unintelligibility
Allowing a secret method of un-mangling
In a broader sense
Mathematical techniques related to information security
About secure communication in the presence of adversaries
Cryptanalysis
The study of methods for obtaining the meaning of encrypted
information without accessing the secret information
Cryptology
Cryptography + cryptanalysis
What is Encryption / Decryption
Encryption –
◦ The process of converting plain text into an
unintelligible format (cipher text) is called
Encryption.
Decryption –
◦ The process of converting cipher text into a plain
text is called Decryption.
What are the Types of Cryptography
Symmetric Key
Cryptography (Secret Key
Cryptography)
◦ Same Key is used by both parties
Advantages
1. Simpler and Faster
Disadvantages
1. Less Secured
What are the Types of Cryptography
Asymmetric Key
Cryptography (Public Key
Cryptography)
◦ 2 different keys are used
◦ Users get the Key from an
Certificate Authority
Advantages
1. More Secured
2. Authentication
Disadvantages
1. Relatively Complex
IPV4 vs IPV6
DIfference
IPV6
2Traffic Class (8-bits): These 8 bits are divided into two parts. The most significant 6 bits are used for
Type of Service to let the Router Known what services should be provided to this packet. The least
significant 2 bits are used for Explicit Congestion Notification (ECN).
3Flow Label (20-bits): This label is used to maintain the sequential flow of the packets belonging to a
communication. The source labels the sequence to help the router identify that a particular packet
belongs to a specific flow of information. This field helps avoid re-ordering of data packets. It is
designed for streaming/real-time media.
4.Payload Length (16-bits): This field is used to tell the routers how much information a
particular packet contains in its payload. Payload is composed of Extension Headers and
Upper Layer data. With 16 bits, up to 65535 bytes can be indicated; but if the Extension
Headers contain Hop-by-Hop Extension Header, then the payload may exceed 65535
bytes and this field is set to 0.
5Next Header (8-bits): This field is used to indicate either the type of Extension Header, or if
the Extension Header is not present then it indicates the Upper Layer PDU. The values for
the type of Upper Layer PDU are same as IPv4’s.
6Hop Limit (8-bits): This field is used to stop packet to loop in the network infinitely. This is
same as TTL in IPv4. The value of Hop Limit field is decremented by 1 as it passes a link
(router/hop). When the field reaches 0 the packet is discarded.
7 Source Address (128-bits): This field indicates the address of originator of the packet.
8Destination Address (128-bits): This field provides the address of intended recipient of the
packet.