SlideShare une entreprise Scribd logo
1  sur  20
Networking & Security
Made By:
Ashish Sharma
NEC
Topics
Networks
Network Devices
Network Security
Internet Security
Application Security
Types Of Networks
•
LAN: Local Area Network
For Small Business
•
MAN: Metropolitan area network
For Cities or Campus
•
WAN: Wide Area Network
Regional or National Networks
Devices Used By Networks
•
Bridges (Old type of Switches)
•
Switches (For LAN basically connect Systems)
•
Routers (For inter- network communication)
Interfaces for these Devices
Console Interface
GUI Interface
Network Certifications
Key Players in Network Certifications:
•
Cisco (CCNA, CCNP)
•
Juniper (JNCIA, JNCIE,JNCIP, JNCIS)
•
Microsoft ( MCSE, MCSA)
Classification Of Cisco Exams
•
Routing and Switching Certification Exams
•
Data Center Certification Exams
•
Return to Top
•
Design Certification Exams
•
Security Certification Exams
•
Storage Networking Certification Exams
•
Voice Certification Exams
•
Wireless Certification Exams
Cisco Exams
•
CCENT Cisco Certified Entry Networking Technician
(ICND1) : Connecting Devices (1Exam)
•
CCNA Cisco Certified Network Associate (ICND1+
ICND2) :Routing and Switching (1Exam)
•
CCNP Cisco Certified Network Professional
To plan, implement, verify and troubleshoot networks
(3Exams)
•
CCIE Cisco Certified Internetwork Expert
More Complex Network (9Exams)
Juniper Exams
•
JNCIA - Juniper Networks Certified Internet
Associate (10 exams)
•
JNCIP - Juniper Networks Certified Internet
Professional (8 exams)
•
JNCIE - Juniper Networks Certified Internet Expert
(6 exams)
•
JNCIS - Juniper Networks Certified Internet
Specialist (13 exams)
Network Operating System
•
A networking operating system (NOS), also
referred to as the Dialoguer, is the software
that runs on a server and enables the server to
manage data, users, groups, security,
applications, and other networking functions.
•
Cisco: Cisco IOS (Internetwork Operating
System) (C/C++)
•
Juniper: JUNOS (C/C++)
Types Of Security
•
Internet Security (In between Client and
Server)
•
Network Security (Inside the Network)
•
Application Security( Application SDLC)
Internet Security
•
Network Layer Security: By Cryptography on TCP/IP including
SSL & TLS.
•
IPsec Protocol: Including Authentication Header &
Encapsulating Security payload.
•
Security Token: Online Sites Providing 6-digit code changing
randomly in 30-60 Sec.
•
Electronic Mail security (Email): Using PGP (Pretty Good
Privacy) for encrypting.
•
Message Authentication Code: Encrypting message by using
Code.
•Firewalls: Screening Network Traffic
Types of Firewalls
•Packet Filters: Processing Data Packet by Packet
•Circuit-Level Gateways: Operates at network level
•Application-Level Gateways: Operates at application level.
•
Malicious Software & Antivirus
•
Malware: User is tricked to download a
software
•
Virus: Code to steal data
•
Trojan Horse: Pretends as secure but
malicious (Keygen)
•
Spyware: Monitor Activites
Application Security
•
Measures taken throughout application life-
cycle to prevent flaws in Security Policies.
Includes
•
Input Validation
•
Authentication
•
Authorization
•
Configuration Mgmt.
•
Exception Management
•
Logging
Network Security
It consists of the provisions and policies adopted
by a network administrator to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network.
Key Things:
Policies, Administrator, monitor, network,misuse,
modification
Security Management
•
Firewall
•
Antivirus
•
Wireless: WEP/WPA/WPA2
•
MAC Adress Filtering
•
Assign Static IP Address
•
Password changing on regular basis
•
Awareness program
•
Network Analyzer
Attacks To Be Prevented
•
DoS Attack
•
Spoofing
•
Man in the Middle
•
SQL Injection
Thanks
Any Queries?

Contenu connexe

Tendances

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lectureMartyn Price
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesSam Bowne
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaSean Roberts
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 

Tendances (20)

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
802 11 3
802 11 3802 11 3
802 11 3
 
Linux routing and firewall for beginners
Linux   routing and firewall for beginnersLinux   routing and firewall for beginners
Linux routing and firewall for beginners
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Spec00539
Spec00539Spec00539
Spec00539
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by Akanda
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Distributed sensor network
Distributed sensor networkDistributed sensor network
Distributed sensor network
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wifi security
Wifi securityWifi security
Wifi security
 

En vedette

מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםZachi Berger, Ph.D. MBA
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh AminBhavesh Amin
 
الوحدة الرابعة
الوحدة الرابعةالوحدة الرابعة
الوحدة الرابعةSaif Eddin
 
Marketings Role in a Organization
Marketings Role in a OrganizationMarketings Role in a Organization
Marketings Role in a OrganizationEric Hughett, MBA
 
الوحدة الخامسة
الوحدة الخامسةالوحدة الخامسة
الوحدة الخامسةSaif Eddin
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعةSaif Eddin
 
الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)Saif Eddin
 
الوحدة الخامسة (1)
الوحدة الخامسة (1)الوحدة الخامسة (1)
الوحدة الخامسة (1)Saif Eddin
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر dr yetkin bayer
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرةSaif Eddin
 
TRAFFIC SIMULATOR
TRAFFIC SIMULATORTRAFFIC SIMULATOR
TRAFFIC SIMULATORsoft-point
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...soft-point
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEsoft-point
 

En vedette (20)

מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגיים
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh Amin
 
الوحدة الرابعة
الوحدة الرابعةالوحدة الرابعة
الوحدة الرابعة
 
DATA EXCHANGE
DATA EXCHANGEDATA EXCHANGE
DATA EXCHANGE
 
Marketings Role in a Organization
Marketings Role in a OrganizationMarketings Role in a Organization
Marketings Role in a Organization
 
Keidan Presentation 2016 + video
Keidan Presentation 2016 + videoKeidan Presentation 2016 + video
Keidan Presentation 2016 + video
 
DATA CLUSTER
 DATA CLUSTER DATA CLUSTER
DATA CLUSTER
 
NRI Services
NRI Services NRI Services
NRI Services
 
الوحدة الخامسة
الوحدة الخامسةالوحدة الخامسة
الوحدة الخامسة
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعة
 
الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)
 
الوحدة الخامسة (1)
الوحدة الخامسة (1)الوحدة الخامسة (1)
الوحدة الخامسة (1)
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرة
 
TRAFFIC SIMULATOR
TRAFFIC SIMULATORTRAFFIC SIMULATOR
TRAFFIC SIMULATOR
 
Q-PROCESSING
Q-PROCESSINGQ-PROCESSING
Q-PROCESSING
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...
 
Canvas Miami
Canvas MiamiCanvas Miami
Canvas Miami
 
Kumar_Resume - LinkedIn
Kumar_Resume - LinkedInKumar_Resume - LinkedIn
Kumar_Resume - LinkedIn
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGE
 

Similaire à Networking & security

Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityHecrocro
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyAdeel Ahmed
 

Similaire à Networking & security (20)

Nguyen Sen
Nguyen SenNguyen Sen
Nguyen Sen
 
Chinmay Padhye
Chinmay PadhyeChinmay Padhye
Chinmay Padhye
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
Network Security
Network SecurityNetwork Security
Network Security
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Chapter08
Chapter08Chapter08
Chapter08
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
 

Networking & security

  • 1. Networking & Security Made By: Ashish Sharma NEC
  • 3. Types Of Networks • LAN: Local Area Network For Small Business • MAN: Metropolitan area network For Cities or Campus • WAN: Wide Area Network Regional or National Networks
  • 4. Devices Used By Networks • Bridges (Old type of Switches) • Switches (For LAN basically connect Systems) • Routers (For inter- network communication)
  • 5. Interfaces for these Devices Console Interface
  • 7. Network Certifications Key Players in Network Certifications: • Cisco (CCNA, CCNP) • Juniper (JNCIA, JNCIE,JNCIP, JNCIS) • Microsoft ( MCSE, MCSA)
  • 8. Classification Of Cisco Exams • Routing and Switching Certification Exams • Data Center Certification Exams • Return to Top • Design Certification Exams • Security Certification Exams • Storage Networking Certification Exams • Voice Certification Exams • Wireless Certification Exams
  • 9. Cisco Exams • CCENT Cisco Certified Entry Networking Technician (ICND1) : Connecting Devices (1Exam) • CCNA Cisco Certified Network Associate (ICND1+ ICND2) :Routing and Switching (1Exam) • CCNP Cisco Certified Network Professional To plan, implement, verify and troubleshoot networks (3Exams) • CCIE Cisco Certified Internetwork Expert More Complex Network (9Exams)
  • 10. Juniper Exams • JNCIA - Juniper Networks Certified Internet Associate (10 exams) • JNCIP - Juniper Networks Certified Internet Professional (8 exams) • JNCIE - Juniper Networks Certified Internet Expert (6 exams) • JNCIS - Juniper Networks Certified Internet Specialist (13 exams)
  • 11. Network Operating System • A networking operating system (NOS), also referred to as the Dialoguer, is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. • Cisco: Cisco IOS (Internetwork Operating System) (C/C++) • Juniper: JUNOS (C/C++)
  • 12. Types Of Security • Internet Security (In between Client and Server) • Network Security (Inside the Network) • Application Security( Application SDLC)
  • 13. Internet Security • Network Layer Security: By Cryptography on TCP/IP including SSL & TLS. • IPsec Protocol: Including Authentication Header & Encapsulating Security payload. • Security Token: Online Sites Providing 6-digit code changing randomly in 30-60 Sec. • Electronic Mail security (Email): Using PGP (Pretty Good Privacy) for encrypting. • Message Authentication Code: Encrypting message by using Code.
  • 14. •Firewalls: Screening Network Traffic Types of Firewalls •Packet Filters: Processing Data Packet by Packet •Circuit-Level Gateways: Operates at network level •Application-Level Gateways: Operates at application level.
  • 15. • Malicious Software & Antivirus • Malware: User is tricked to download a software • Virus: Code to steal data • Trojan Horse: Pretends as secure but malicious (Keygen) • Spyware: Monitor Activites
  • 16. Application Security • Measures taken throughout application life- cycle to prevent flaws in Security Policies. Includes • Input Validation • Authentication • Authorization • Configuration Mgmt. • Exception Management • Logging
  • 17. Network Security It consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network. Key Things: Policies, Administrator, monitor, network,misuse, modification
  • 18. Security Management • Firewall • Antivirus • Wireless: WEP/WPA/WPA2 • MAC Adress Filtering • Assign Static IP Address • Password changing on regular basis • Awareness program • Network Analyzer
  • 19. Attacks To Be Prevented • DoS Attack • Spoofing • Man in the Middle • SQL Injection