SlideShare une entreprise Scribd logo
1  sur  20
Networking & Security
Made By:
Ashish Sharma
NEC
Topics
Networks
Network Devices
Network Security
Internet Security
Application Security
Types Of Networks
•
LAN: Local Area Network
For Small Business
•
MAN: Metropolitan area network
For Cities or Campus
•
WAN: Wide Area Network
Regional or National Networks
Devices Used By Networks
•
Bridges (Old type of Switches)
•
Switches (For LAN basically connect Systems)
•
Routers (For inter- network communication)
Interfaces for these Devices
Console Interface
GUI Interface
Network Certifications
Key Players in Network Certifications:
•
Cisco (CCNA, CCNP)
•
Juniper (JNCIA, JNCIE,JNCIP, JNCIS)
•
Microsoft ( MCSE, MCSA)
Classification Of Cisco Exams
•
Routing and Switching Certification Exams
•
Data Center Certification Exams
•
Return to Top
•
Design Certification Exams
•
Security Certification Exams
•
Storage Networking Certification Exams
•
Voice Certification Exams
•
Wireless Certification Exams
Cisco Exams
•
CCENT Cisco Certified Entry Networking Technician
(ICND1) : Connecting Devices (1Exam)
•
CCNA Cisco Certified Network Associate (ICND1+
ICND2) :Routing and Switching (1Exam)
•
CCNP Cisco Certified Network Professional
To plan, implement, verify and troubleshoot networks
(3Exams)
•
CCIE Cisco Certified Internetwork Expert
More Complex Network (9Exams)
Juniper Exams
•
JNCIA - Juniper Networks Certified Internet
Associate (10 exams)
•
JNCIP - Juniper Networks Certified Internet
Professional (8 exams)
•
JNCIE - Juniper Networks Certified Internet Expert
(6 exams)
•
JNCIS - Juniper Networks Certified Internet
Specialist (13 exams)
Network Operating System
•
A networking operating system (NOS), also
referred to as the Dialoguer, is the software
that runs on a server and enables the server to
manage data, users, groups, security,
applications, and other networking functions.
•
Cisco: Cisco IOS (Internetwork Operating
System) (C/C++)
•
Juniper: JUNOS (C/C++)
Types Of Security
•
Internet Security (In between Client and
Server)
•
Network Security (Inside the Network)
•
Application Security( Application SDLC)
Internet Security
•
Network Layer Security: By Cryptography on TCP/IP including
SSL & TLS.
•
IPsec Protocol: Including Authentication Header &
Encapsulating Security payload.
•
Security Token: Online Sites Providing 6-digit code changing
randomly in 30-60 Sec.
•
Electronic Mail security (Email): Using PGP (Pretty Good
Privacy) for encrypting.
•
Message Authentication Code: Encrypting message by using
Code.
•Firewalls: Screening Network Traffic
Types of Firewalls
•Packet Filters: Processing Data Packet by Packet
•Circuit-Level Gateways: Operates at network level
•Application-Level Gateways: Operates at application level.
•
Malicious Software & Antivirus
•
Malware: User is tricked to download a
software
•
Virus: Code to steal data
•
Trojan Horse: Pretends as secure but
malicious (Keygen)
•
Spyware: Monitor Activites
Application Security
•
Measures taken throughout application life-
cycle to prevent flaws in Security Policies.
Includes
•
Input Validation
•
Authentication
•
Authorization
•
Configuration Mgmt.
•
Exception Management
•
Logging
Network Security
It consists of the provisions and policies adopted
by a network administrator to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network.
Key Things:
Policies, Administrator, monitor, network,misuse,
modification
Security Management
•
Firewall
•
Antivirus
•
Wireless: WEP/WPA/WPA2
•
MAC Adress Filtering
•
Assign Static IP Address
•
Password changing on regular basis
•
Awareness program
•
Network Analyzer
Attacks To Be Prevented
•
DoS Attack
•
Spoofing
•
Man in the Middle
•
SQL Injection
Thanks
Any Queries?

Contenu connexe

Tendances

802 11 3
802 11 3802 11 3
802 11 3
rphelps
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
mark scott
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

Tendances (20)

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
802 11 3
802 11 3802 11 3
802 11 3
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Spec00539
Spec00539Spec00539
Spec00539
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by Akanda
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wifi security
Wifi securityWifi security
Wifi security
 

En vedette

מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגיים
Zachi Berger, Ph.D. MBA
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh Amin
Bhavesh Amin
 
الوحدة الرابعة
الوحدة الرابعةالوحدة الرابعة
الوحدة الرابعة
Saif Eddin
 
Marketings Role in a Organization
Marketings Role in a OrganizationMarketings Role in a Organization
Marketings Role in a Organization
Eric Hughett, MBA
 
الوحدة الخامسة
الوحدة الخامسةالوحدة الخامسة
الوحدة الخامسة
Saif Eddin
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعة
Saif Eddin
 
الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)
Saif Eddin
 
الوحدة الخامسة (1)
الوحدة الخامسة (1)الوحدة الخامسة (1)
الوحدة الخامسة (1)
Saif Eddin
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرة
Saif Eddin
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...
soft-point
 

En vedette (20)

מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגיים
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh Amin
 
الوحدة الرابعة
الوحدة الرابعةالوحدة الرابعة
الوحدة الرابعة
 
DATA EXCHANGE
DATA EXCHANGEDATA EXCHANGE
DATA EXCHANGE
 
Marketings Role in a Organization
Marketings Role in a OrganizationMarketings Role in a Organization
Marketings Role in a Organization
 
Keidan Presentation 2016 + video
Keidan Presentation 2016 + videoKeidan Presentation 2016 + video
Keidan Presentation 2016 + video
 
DATA CLUSTER
 DATA CLUSTER DATA CLUSTER
DATA CLUSTER
 
NRI Services
NRI Services NRI Services
NRI Services
 
الوحدة الخامسة
الوحدة الخامسةالوحدة الخامسة
الوحدة الخامسة
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعة
 
الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)
 
الوحدة الخامسة (1)
الوحدة الخامسة (1)الوحدة الخامسة (1)
الوحدة الخامسة (1)
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرة
 
TRAFFIC SIMULATOR
TRAFFIC SIMULATORTRAFFIC SIMULATOR
TRAFFIC SIMULATOR
 
Q-PROCESSING
Q-PROCESSINGQ-PROCESSING
Q-PROCESSING
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...
 
Canvas Miami
Canvas MiamiCanvas Miami
Canvas Miami
 
Kumar_Resume - LinkedIn
Kumar_Resume - LinkedInKumar_Resume - LinkedIn
Kumar_Resume - LinkedIn
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGE
 

Similaire à Networking & security

Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
Lancope, Inc.
 

Similaire à Networking & security (20)

Nguyen Sen
Nguyen SenNguyen Sen
Nguyen Sen
 
Chinmay Padhye
Chinmay PadhyeChinmay Padhye
Chinmay Padhye
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
Network Security
Network SecurityNetwork Security
Network Security
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Chapter08
Chapter08Chapter08
Chapter08
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
 

Networking & security

  • 1. Networking & Security Made By: Ashish Sharma NEC
  • 3. Types Of Networks • LAN: Local Area Network For Small Business • MAN: Metropolitan area network For Cities or Campus • WAN: Wide Area Network Regional or National Networks
  • 4. Devices Used By Networks • Bridges (Old type of Switches) • Switches (For LAN basically connect Systems) • Routers (For inter- network communication)
  • 5. Interfaces for these Devices Console Interface
  • 7. Network Certifications Key Players in Network Certifications: • Cisco (CCNA, CCNP) • Juniper (JNCIA, JNCIE,JNCIP, JNCIS) • Microsoft ( MCSE, MCSA)
  • 8. Classification Of Cisco Exams • Routing and Switching Certification Exams • Data Center Certification Exams • Return to Top • Design Certification Exams • Security Certification Exams • Storage Networking Certification Exams • Voice Certification Exams • Wireless Certification Exams
  • 9. Cisco Exams • CCENT Cisco Certified Entry Networking Technician (ICND1) : Connecting Devices (1Exam) • CCNA Cisco Certified Network Associate (ICND1+ ICND2) :Routing and Switching (1Exam) • CCNP Cisco Certified Network Professional To plan, implement, verify and troubleshoot networks (3Exams) • CCIE Cisco Certified Internetwork Expert More Complex Network (9Exams)
  • 10. Juniper Exams • JNCIA - Juniper Networks Certified Internet Associate (10 exams) • JNCIP - Juniper Networks Certified Internet Professional (8 exams) • JNCIE - Juniper Networks Certified Internet Expert (6 exams) • JNCIS - Juniper Networks Certified Internet Specialist (13 exams)
  • 11. Network Operating System • A networking operating system (NOS), also referred to as the Dialoguer, is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. • Cisco: Cisco IOS (Internetwork Operating System) (C/C++) • Juniper: JUNOS (C/C++)
  • 12. Types Of Security • Internet Security (In between Client and Server) • Network Security (Inside the Network) • Application Security( Application SDLC)
  • 13. Internet Security • Network Layer Security: By Cryptography on TCP/IP including SSL & TLS. • IPsec Protocol: Including Authentication Header & Encapsulating Security payload. • Security Token: Online Sites Providing 6-digit code changing randomly in 30-60 Sec. • Electronic Mail security (Email): Using PGP (Pretty Good Privacy) for encrypting. • Message Authentication Code: Encrypting message by using Code.
  • 14. •Firewalls: Screening Network Traffic Types of Firewalls •Packet Filters: Processing Data Packet by Packet •Circuit-Level Gateways: Operates at network level •Application-Level Gateways: Operates at application level.
  • 15. • Malicious Software & Antivirus • Malware: User is tricked to download a software • Virus: Code to steal data • Trojan Horse: Pretends as secure but malicious (Keygen) • Spyware: Monitor Activites
  • 16. Application Security • Measures taken throughout application life- cycle to prevent flaws in Security Policies. Includes • Input Validation • Authentication • Authorization • Configuration Mgmt. • Exception Management • Logging
  • 17. Network Security It consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network. Key Things: Policies, Administrator, monitor, network,misuse, modification
  • 18. Security Management • Firewall • Antivirus • Wireless: WEP/WPA/WPA2 • MAC Adress Filtering • Assign Static IP Address • Password changing on regular basis • Awareness program • Network Analyzer
  • 19. Attacks To Be Prevented • DoS Attack • Spoofing • Man in the Middle • SQL Injection