03-03-2011, 12:18 PM
[attachment=9438]
NETWORK SECURITY
INTRODUCTION TO NETWORK SECURITY
• Concept of Computer Networks
• Importance of Network Security
• Technologies associated with network security
NETWORK SECURITY TOOLS
• Audit/test/assessment tools
Network Reconnaissance & Network Mapping:
Passive Vulnerability Assessment:
Active Penetration Testing & Gaining Access
• Defence/detection tools
Firewalls (network & personal)
Antivirus
Honeypots
THREATS TO NETWORK SECURITY
• Computer and network security address three requirements:
confidentiality
integrity
Availability
• Attacks on Network Security
Passive attack
Active attack
METHODS OF NETWORK SECURITY
Encryption Methods
Private key encryption - symmetric cryptography
Public Key encryption - Asymmetric Encryption
Extensible Authentication Protocol
Authentication and Access Control Measures
APPLICATION OF NETWORK SECURITY
Digital Certificates
Smart Cards
Kerberos
FIREWALL
• A firewall is simply a group of components that collectively form a barrier between two networks.
• Types:
Application Gateways
Packet Filtering
Hybrid Systems
ADVANTAGES OF NETWORK SECURITY
• Simplified Implementation and Maintenance.
• Extended Reach.
• Increased Worker Mobility.
• Reduced Total Cost of Ownership and Operation.
CONCLUSION
• Evolution of Network security
• Vision
• Technologies implemented in Network security
NETWORK SECURITY
INTRODUCTION TO NETWORK SECURITY
• Concept of Computer Networks
• Importance of Network Security
• Technologies associated with network security
NETWORK SECURITY TOOLS
• Audit/test/assessment tools
Network Reconnaissance & Network Mapping:
Passive Vulnerability Assessment:
Active Penetration Testing & Gaining Access
• Defence/detection tools
Firewalls (network & personal)
Antivirus
Honeypots
THREATS TO NETWORK SECURITY
• Computer and network security address three requirements:
confidentiality
integrity
Availability
• Attacks on Network Security
Passive attack
Active attack
METHODS OF NETWORK SECURITY
Encryption Methods
Private key encryption - symmetric cryptography
Public Key encryption - Asymmetric Encryption
Extensible Authentication Protocol
Authentication and Access Control Measures
APPLICATION OF NETWORK SECURITY
Digital Certificates
Smart Cards
Kerberos
FIREWALL
• A firewall is simply a group of components that collectively form a barrier between two networks.
• Types:
Application Gateways
Packet Filtering
Hybrid Systems
ADVANTAGES OF NETWORK SECURITY
• Simplified Implementation and Maintenance.
• Extended Reach.
• Increased Worker Mobility.
• Reduced Total Cost of Ownership and Operation.
CONCLUSION
• Evolution of Network security
• Vision
• Technologies implemented in Network security