Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Network Security
Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work.
Network Security System
A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.
Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.
Network security diagram
Development and Introduction
Predictions of Impact
Predictions of use in FUTURE
Security Information Systems
Social and Ethical Issues
Social and Ethical
THANKS FOR YOUR ATTENTION!
Recent interest in Network security was fueled by the crime committed by Kevin Mitnick in the late 1970s. Kevin Mitnick committed the largest computer related crime in U.S. history.
The losses were eighty million dollars in U.S. intellectual property and source code from a variety of companies. Since then, information security came into the spotlight. Public networks are being relied upon to deliver financial and personal information. Due to the evolution of information that is made available through the internet, information security is also required to evolve. Due to Kevin Mitnick’s offense, companies are emphasizing security for the intellectual property. Internet has been a driving force for data security improvement. Internet protocols in the past were not developed to secure themselves. Within the TCP/IP communication stack, security protocols are not implemented. This leaves the internet open to attacks.
Modern developments in the internet architecture have made communication more secure.
What is going to drive Network security is the
set of applications more than anything else. The
future will possibly be that the security is similar to
an immune system. The immune system fights off
attacks and builds itself to fight tougher enemies.
Similarly, the network security will be able to
function as an immune system.
The trend towards biometrics could have taken
place a while ago, but it seems that it isn’t being
actively pursued. Many security developments that
are taking place are within the same set of security
technology that is being used today with some
minor adjustments. The network security field may have to evolve more rapidly to deal with the threats further in the future.
What are the
of Network Security?
With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers' data, it reduces the risk of legal action from data theft.
Ultimately, network security helps protect a business's reputation, which is one of its most important assets.
Internet threats will continue to be a major issue in
the global world as long as information is
accessible and transferred across the Internet.
Different defense and detection mechanisms were
developed to deal with these attacks.
- Cryptography is a useful and widely used tool in security engineering today. It involved the use of codes and ciphers to transform information into unintelligible data.
- A firewall is a typical border control mechanism or perimeter defense. The purpose of a firewall is to block traffic from the outside, but it could also be used to block traffic from the inside. A firewall is the front line defense mechanism against
intruders. It is a system designed to prevent
unauthorized access to or from a private network.
Firewalls can be implemented in both hardware
and software, or a combination of both.
Security Information Systems
Intrusion Detection Systems-
An Intrusion Detection System (IDS) is an additional protection measure that helps ward off computer
intrusions. IDS systems can be software and
hardware devices used to detect an attack. IDS
products are used to monitor connection in
determining whether attacks are been launched.
Some IDS systems just monitor and alert of an
attack, whereas others try to block the attack.
Intrusion prevention systems (IPS)-
to identify fast-spreading threats, such as zero-day or zero-hour attacks
Virtual Private Networks (VPN)-
to provide secure remote access
Anti‐Malware Software and scanners-
Viruses, worms and Trojan horses are all examples
of malicious software, or Malware for short. Special
so‐called anti‐Malware tools are used to detect
them and cure an infected system.
Secure Socket Layer (SSL)-
The Secure Socket Layer (SSL) is a suite of protocols that is a standard way to achieve a good level of security between a web browser and a website. SSL is designed to create a secure channel, or tunnel between a web browser and the web server, so that any information exchanged is protected within the secured tunnel. SSL provides authentication of clients to server through the use of certificates. Clients present a certificate to the server to prove their identity.
Many network security threats today are spread over the Internet. The most common include:
STRUCTURED AND UNSTRUCTURED
attacks made by unskilled hackers. Individuals behind these attacks use hacking tools available on the Internet and are often not aware of the environment they are attacking. These threats should not be neglected because they can expose precious information to malicious users.
attacks made by individuals who possess advanced computing skills. Such hackers are experts in exploiting system vulnerabilities. By gaining enough information about a company’s network, these individuals can create custom hacking tools to breach network security. Most structured attacks are done by individuals with good programming skills and a good understanding of operating systems, networking and so on.
Hardware developments are not developing rapidly. BIOMETRIC SYSTEMS, SMART CARDS and BROADBAND ROUTERS are the only new hardware technologies that are widely impacting security.
The most obvious use of
for network security is for secure workstation logons for a workstation connected to a network. The cost of hardware devices is one thing that may lead to the widespread use of voice biometric security identification, especially among companies and organizations on a low budget. Hardware device such as computer mice with built in thumbprint readers would be the next step up. These devices would be more expensive to implement on several computers, as each machine would require its own hardware device.
The main use of
Biometric network security
will be to replace the current password system. Maintaining password security can be a major task for even a small organization. Passwords have to be changed every few months and people forget their password or lock themselves out of the system by incorrectly entering their password repeatedly. Very often people write their password down and keep it near their computer. This is of course completely undermines any effort at network security.
Biometrics can replace this security identification method. The use of biometric identification stops this problem and while it may be expensive to set up at first, these devices save on administration and user assistance
costs. Smart cards are usually a credit‐card‐sized digital electronic media. The card itself is designed to store encryption keys and other information used in authentication and other identification processes. The main idea behind smart cards is to provide undeniable proof of a user’s identity. Smart cards can be used for everything from logging in to the network to providing secure Web communications and secure e‐mail transactions.
It may seem that
are nothing more than a repository for storing passwords. Obviously, someone can easily steal a smart card from someone else. Fortunately, there are safety features built into smart cards to prevent someone from using a stolen card. Smart cards require anyone who is using them to enter a personal identification number (PIN) before they’ll be granted any level of access into the system.
The PIN is similar to the PIN used by ATM machines. When a user inserts the smart card into the card reader, the smart card prompts the user for a PIN. This PIN was assigned to the user by the
administrator at the time the administrator issued the card to the user. Because the PIN is short and purely numeric, the user should have no trouble remembering it and therefore would be unlikely to write the PIN down. But the interesting thing is what happens when the user inputs the PIN. The PIN is verified from inside the smart card. Because the PIN is never transmitted across the network, there’s absolutely no danger of it being intercepted. The main benefit, though, is that the PIN is useless without the smart card, and the smart card is useless without the PIN.
There are other security issues of the smart card. The
smart card is cost‐effective
but not as secure as the biometric identification devices.
to protect and secure a home network.
The software aspect of network security is very vast. It includes firewall software ( help prevent the spread of a virus in your network if one of the computers becomes infected), antivirus software (isolates and neutralizes malware), vpn, intrusion detection, and much more.
The improvement of the standard security
software still remains the same. When new viruses
emerge, the antivirus is updated to be able to
guard against those threats. This process is the
same for firewalls and intrusion detection systems (IPS
Many research papers that have been skimmed
were based on analyzing attack patterns in order to
create smarter security software.
VPN (virual private network)-
extends a private network across a public network
As the security hardware transitions to biometrics,
the software also needs to be able to use the
Current research is being performed on security software using neural networks. The objective of the research is to use neural networks for the facial recognition software.
Many small and complex devices can be connected
to the internet. Most of the current security algorithms are computational intensive and require
substantial processing power. This power,
however, is not available in small devices like
sensors. Therefore, there is a need for designing
light‐weight security algorithms. Research in this
area is currently being performed.
An Quick Introduction to Network Security
How do FIREWALLS work?
the rights to privacy of individuals on whom data is collected (Security measures need to take place- firewalls,etc)
Copyright and Plagiarism-
copyright and acknowledgment of source data when collecting information (stealing data and information without permission)
Security of data and information (being transferred)-
It is important that data and information is kept secure as it is easily edited or copied without any noticeable change to the original. Common techniques used to protect data and information in information systems are passwords, backup copies, physical barriers (locked doors), anti-virus software, firewalls protect from hackers), data encryption and audit trails (logs of all activity in the information system).
Security Software and Hardware is expensive but worth it as it protects your network and information
Easily accessible as Security Software and Hardware can be bought online or in stores
Privacy of an individual-
Cookies, Spamming, Email bombing, etc.
The security of stored data-
anti virus software, passwords, etc to rid of Trojans and viruses
Unauthorized retrieval of data-
Unauthorized analysis of data-
Erosion of privacy from linking databases for analysis-
Anti-Malware Software-to prevent, detect and remediate malicious programming
Security from the centralized processing of network computers (terminals)-
SSL (Secure Sockets Layer)-ensures that all data passed between the web server and browsers remain private and integral.
messaging (privacy and confidentiality), Internet banking (security of banking details), etc.
Access and control-
People who control information systems are able to control the data and information that flows through the system and who has access to such information (knowledge) – this gives them power.
Social and Ethical Issues
consists of three primary types of controls: administrative, physical, and technical. Administrative controls consist of security policies and supporting procedures used to control user behavior, including how your IT staff implements new technology.
Physical security controls include locks, fences and other devices used to delay the progress of someone attempting to gain physical access to network components.
Technical controls, the subject of this article, are devices, configurations, etc. used to protect data stored on or moving through your network.
The remaining controls apply to both connected devices and the network overall. No network is secure if attention isn't paid to hardening servers, desktops, laptops, etc. These controls and supporting activities fall into the following layers of a defense in depth security strategy:
separate your critical infrastructure or sensitive data from the general access areas of your network
Host anti-virus and intrusion prevention-
Every device connected to the network should be "hardened." Hardening includes installing and maintaining anti-malware software
User logins, System-to-system authentication, Control of network segment access, Restricting physical access to critical infrastructure
Secure configuration, or hardening, of devices is probably the best way to protect your data.
Monitoring, reporting and alerting-
under no circumstances should you assume that what is supposed to be happening is actually happening. Have a log management solution
Network security is not some monolithic solution you can simply unbox and turn on to protect your data and critical infrastructure. Rather, it is a collection of controls, supporting an overall strategy, that work together to mitigate risk.
Beal, V. (2015). What is Network Security? Webopedia. [online] Webopedia.com. Available at: http://www.webopedia.com/TERM/N/network_security.html [Accessed 9 Mar. 2015].
Cisco, (2015). What Is Network Security?. [online] Available at: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html?referring_site=smartnavRD [Accessed 9 Mar. 2015].
Curtin, M. (1997). Introduction to Network Security. [online] Interhack.net. Available at: http://www.interhack.net/pubs/network-security/ [Accessed 10 Mar. 2015].
Cyberoam.com, (2015). Network Security Appliances | Enterprise-class Network Security â€“ Cyberoam. [online] Available at: http://www.cyberoam.com/networksecurity.html [Accessed 12 Mar. 2015].
Daya, B. (2015). Network Security: History, Importance, and Future. [online] Available at: http://web.mit.edu/~bdaya/www/Network%20Security.pdf [Accessed 13 Mar. 2015].
Home.mcafee.com, (2015). Internet Security, AntiVirus, AntiSpam, AntiSpyware | Security Advice Center | McAfee. [online] Available at: http://home.mcafee.com/advicecenter/?id=ad_ost_hvsf [Accessed 11 Mar. 2015].
Olzak, T. (2010). How Does Network Security Work?. [online] Bright Hub. Available at: http://www.brighthub.com/computing/enterprise-security/articles/65221.aspx#imgn_0 [Accessed 15 Mar. 2015].
Onguardonline.gov, (2015). Computer Security | OnGuard Online. [online] Available at: https://www.onguardonline.gov/media/video-0081-computer-security [Accessed 16 Mar. 2015].
Orbit-computer-solutions.com, (2015). Network Security Explained. Types of network threats.. [online] Available at: http://orbit-computer-solutions.com/Network-Security.php [Accessed 14 Mar. 2015].
Palo Alto Networks, (2015). What is network security?. [online] Available at: https://www.paloaltonetworks.com/resources/learning-center/what-is-network-security.html [Accessed 10 Mar. 2015].
Popescu, D. and Popescu, D. (2013). Why Is Network Security Important?. [online] Network Wrangler - Tech Blog. Available at: http://www.poweradmin.com/blog/why-is-network-security-important/ [Accessed 13 Mar. 2015].
Sans.org, (2015). SANS Institute: Network Security Resources. [online] Available at: http://www.sans.org/network-security/ [Accessed 10 Mar. 2015].
Simmonds, A., Sandilands, P. and van Ekert, L. (2004). An Ontology for Network Security Attacks. Applied Computing, pp.317-323.
Strickland, J. (2015). Network Security Hardware - HowStuffWorks. [online] HowStuffWorks. Available at: http://electronics.howstuffworks.com/how-to-tech/how-to-secure-home-network1.htm [Accessed 9 Mar. 2015].
Tbngconsulting.com, (2013). Why is Network Security so important?. [online] Available at: http://www.tbngconsulting.com/blog/bid/295923/Why-is-Network-Security-so-important [Accessed 14 Mar. 2015].
us, D. (2015). Dell Security Solutions. [online] Dell. Available at: http://www.dell.com/learn/us/en/555/security [Accessed 13 Mar. 2015].
Www8.hp.com, (2015). Hardware Security Module, HSM | HPÂ® Australia. [online] Available at: http://www8.hp.com/au/en/software-solutions/hardware-security-module-hsm-atalla-nsp/ [Accessed 11 Mar. 2015].