14-05-2014, 10:56 AM
SEMINAR ON NETWORK SECURITY
NETWORK SECURITY[.ppt (Size: 1.47 MB / Downloads: 11)
What is “Security”
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage, sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
Why do we need security?
Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for resources
Ex: AFS
Guarantee availability of resources
Ex: 5 9’s (99.999% reliability)
Identification
Something which uniquely identifies a user and is called UserID.
Sometime users can select their ID as long as it is given too another user.
UserID can be one or combination of the following:
User Name
User Student Number
User SSN
Firewalls
A firewall is like a castle with a drawbridge
Only one point of access into the network
This can be good or bad
Can be hardware or software
Ex. Some routers come with firewall functionality
ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls
Limitations of WLAN
SECURITY
Less secured due to wireless environment.
RANGE
The typical range of a common 802.11g network
with standard equipment is 10m approx..
SPEED
The speed on most wireless network is relatively slow as compared to wired network.
RELIABILITY
Like any radio frequency transmission, wireless networking are subject to a wide variety of interference.
Conclusions
Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable.
The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy.