SlideShare a Scribd company logo
NETWORK
SECURITY
Present By:-
Name :- AFAQUE JAYA
Branch :- C.S.E.
Semester :- 5th sem
Roll No :- CSE/12/15
CONTENT• What is NETWORK SECURITY &
why it is important?
• Types of Attacker
• Types of Network Attack?
• Top 10 Cyber Attack Country
• Penalty for Cyber Attack.
• How to be safe and Secure?
What is NETWORK SECURITY?
• Network security is the security provided to a network
from unauthorized access and risk. It is the duty of
Network administrators to adopt preventing measures
to protect their network from Security threats.
• Types of Network Security devices :-
1. Active Devices
2. Passive Devices
3. Preventative Devices e.t.c.
Types of Hacker
White Hat
Grey Hat
Black hat
Types of Attack : -
• HACKING
• ATTRITION :- Method used to Damaged Network and
systems. It include –
1: Distributed Denial Of Attacks(DDOA)
2: Resource Depletion Attacks.
• MALWARE
• TROZON HORSE
• WORM
• SPAM
• PHISHING
• BOTNET
• PACKET SNIFFER
Virus and worm
• A Virus is a “program or piece of code that is loaded
onto your computer without your knowledge and runs
against your wishes .
• Viruses can cause a huge amount of damage to
computers.
• An example of a virus would be if you opened an email
and a malicious piece of code was downloaded onto
your computer causing your computer to freeze.
• Solution: Install a security suite, such as Kaspersky
Total Protection, that protects the computer against
threats such as viruses and worms.
Trozon Horse
• A Trojan Horse is “a program in which malicious or
harmful code is contained inside apparently harmless
programming or data in such a way that it can get
control and do its chosen form of damage, such as
ruining the file allocation table on your hard disk.
• In a network if a Trojan Horse is installed on a
computer and tampers with the file allocation table it
could cause a massive amount of damage to all
computers of that network.
• Solution: Security suites, such as Norton Internet
Security, will prevent you from downloading Trojan
Horses.
SPAM
• SPAM is “flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
.I believe that SPAM wouldn’t be the biggest risk to a
network because even though it may get annoying and
plentiful it still doesn’t destroy any physical elements
of the network.
• Solution: SPAM filters are an effective way to stop
SPAM, these filters come with most of the e-mail
providers online. Also you can buy a variety of SPAM
filters that work effectively.
Phishing
• Phishing is “an e-mail fraud method in which the
perpetrator sends out legitimate-looking emails in an
attempt to gather personal and financial information
from recipients.
• In my opinion phishing is one of the worst security
threats over a network because a lot of people that use
computers linked up to a network are amateurs and
would be very vulnerable to giving out information that
could cause situations such as theft of money or
identity theft.
• Solution: Similar to SPAM use Phishing filters to filter
out this unwanted mail and to prevent threat.
Packet Sniffer
• “A packet sniffer is a device or program that allows
eavesdropping on traffic travelling between networked
computers. The packet sniffer will capture data that is
addressed to other machines, saving it for later
analysis.
• In a network a packet sniffer can filter out personal
information and this can lead to areas such as identity
theft so this is a major security threat to a network.
• Solution: “When strong encryption is used, all packets
are unreadable to any but the destination address,
making packet sniffers useless.So one solution is to
obtain strong encryption.
Zombie Computer & Botnet
• “A zombie computer, or “drone” is a computer
that has been secretly compromised by
hacking tools which allow a third party to
control the computer and its resources
remotely.
• A hacker could hack into a computer and
control the computer and obtain data.
• Solution: Antivirus software can help prevent
zombie computers.
Zombie Computer & Botnet
• A botnet “is a number of Internet computers that,
although their owners are unaware of it, have
been set up to forward transmissions (including
spam or viruses) to other computers on the
internet.
• This is a major security threat on a network
because the network, unknown to anyone, could
be acting as a hub that forwards malicious files
etc to other computers.
• Solution: Network Intrusion Prevention (NIP)
systems can help prevent botnets.
Protecting Critical
Information Infrastructure
Critical information infrastructure is the
backbone of a country’s national and economic
security. It includes power plants, highways,
bridges, chemical plants, networks, as well as
the buildings where millions of people work
every day. These can be secured with stringent
collaboration plans and disciplined
implementations.
FIREWALL
Types of FIREWALL
• PACKET FILTERRING FIREWALL
• APPLICATION/PROXY FIREWALL
• HYBRID FIREWALL
NETWORK SECURITY
PASSWORD DISCOVERY TABLE
List of Blocked Website In INDIA : -
While Opening BLOCKED Page
NETWORK SECURITY
Way to Hide IP : -
NETWORK SECURITY
WANACRY Attack
Punishments For Cyber Crime :-
The World (05) Biggest
Cyber Crime
0
5
10
15
20
25
30
AMERICA CHINA BRAZIL INDIA GERMANY
2017
2017
How to be safe and secure
• Keep updated
• Keep a paid anti-virus and keep it up to date
• Don’t go to unknown link
• Keep your fire wall on
• Quantum computing
NETWORK SECURITYT SOFTWARE
• Malwarebytes
• Kaspersky endpoint security
• SolarWinds RMM
• Norton Security
• Splunk
• Black Duck hub
CONCLUSION
• Network Security is a very broad field and
being a Network Security manager is not an
easy job.
• There are still threats such as password
attacks that have no prevention.
• Many of the threats set out to get personal
information.
References
• https://www.csoonline.com/category/hacking
/
• https://www.youtube.com/watch?v=Y3fYULVI
ZR0
• Latest update about any type of ransomeware
or vulnaribility http://www.cert-in.org.in/

More Related Content

PPTX
Network security
PPTX
Network security
PPTX
Network security
PPTX
Network Security
PPTX
Network security
PPTX
Network Security
PDF
What is Network Security?
PPTX
Network Security and Firewall
Network security
Network security
Network security
Network Security
Network security
Network Security
What is Network Security?
Network Security and Firewall

What's hot (20)

PPTX
Network security
PPTX
Network Security
PPTX
Network security
PPTX
Intrusion detection
 
PPTX
Steganography
PPT
Network Security
PPT
Keyloggers and Spywares
PPT
Cyber Crime and Security
PDF
Network Security Fundamentals
PPTX
What is network security and Types
PDF
Email Forensics
PPTX
Computer security
PPTX
Security threats and safety measures
PPTX
Network Security ppt
PDF
Cyber Forensics Module 2
PDF
Malicious software
PPTX
Network security
PPTX
Social engineering
PPT
Perimeter security solutions
PPT
Internet Security
Network security
Network Security
Network security
Intrusion detection
 
Steganography
Network Security
Keyloggers and Spywares
Cyber Crime and Security
Network Security Fundamentals
What is network security and Types
Email Forensics
Computer security
Security threats and safety measures
Network Security ppt
Cyber Forensics Module 2
Malicious software
Network security
Social engineering
Perimeter security solutions
Internet Security
Ad

Similar to NETWORK SECURITY (20)

PPTX
Network security threats and solutions
PPTX
Marwan alsuwaidi
PPTX
3Nov Challanges to Inernal Security.pptx
PPTX
Computer Security Presentation
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPT
Security
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPT
Complete notes security
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPTX
CYBER SECURITY
PPT
Chapter1 intro network_security_sunorganised
PDF
Lecture 7---Security (1).pdf
PPTX
Brooks18
PPTX
CyberSecurityPPT presentation _V3_1.pptx
PPT
Dos and Dont to be followed to protect information and technology
DOCX
Chapter 10.0
PPTX
презентация1
PPTX
Cyber Crime And Security
PPTX
lecture-11-30052022-103626am.pptx
PDF
ppt pdf ajay.pdf
Network security threats and solutions
Marwan alsuwaidi
3Nov Challanges to Inernal Security.pptx
Computer Security Presentation
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Security
2014-09-03 Cybersecurity and Computer Crimes
Complete notes security
2014-09-03 Cybersecurity and Computer Crimes
CYBER SECURITY
Chapter1 intro network_security_sunorganised
Lecture 7---Security (1).pdf
Brooks18
CyberSecurityPPT presentation _V3_1.pptx
Dos and Dont to be followed to protect information and technology
Chapter 10.0
презентация1
Cyber Crime And Security
lecture-11-30052022-103626am.pptx
ppt pdf ajay.pdf
Ad

Recently uploaded (20)

PPTX
artificial intelligence overview of it and more
PPTX
Funds Management Learning Material for Beg
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Digital Literacy And Online Safety on internet
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Introduction to Information and Communication Technology
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
artificial intelligence overview of it and more
Funds Management Learning Material for Beg
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
RPKI Status Update, presented by Makito Lay at IDNOG 10
PptxGenJS_Demo_Chart_20250317130215833.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
INTERNET------BASICS-------UPDATED PPT PRESENTATION
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Digital Literacy And Online Safety on internet
Design_with_Watersergyerge45hrbgre4top (1).ppt
Module 1 - Cyber Law and Ethics 101.pptx
Paper PDF World Game (s) Great Redesign.pdf
SAP Ariba Sourcing PPT for learning material
Introuction about WHO-FIC in ICD-10.pptx
Introduction to Information and Communication Technology
Sims 4 Historia para lo sims 4 para jugar
Slides PPTX World Game (s) Eco Economic Epochs.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Testing WebRTC applications at scale.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx

NETWORK SECURITY

  • 1. NETWORK SECURITY Present By:- Name :- AFAQUE JAYA Branch :- C.S.E. Semester :- 5th sem Roll No :- CSE/12/15
  • 2. CONTENT• What is NETWORK SECURITY & why it is important? • Types of Attacker • Types of Network Attack? • Top 10 Cyber Attack Country • Penalty for Cyber Attack. • How to be safe and Secure?
  • 3. What is NETWORK SECURITY? • Network security is the security provided to a network from unauthorized access and risk. It is the duty of Network administrators to adopt preventing measures to protect their network from Security threats. • Types of Network Security devices :- 1. Active Devices 2. Passive Devices 3. Preventative Devices e.t.c.
  • 4. Types of Hacker White Hat Grey Hat Black hat
  • 5. Types of Attack : - • HACKING • ATTRITION :- Method used to Damaged Network and systems. It include – 1: Distributed Denial Of Attacks(DDOA) 2: Resource Depletion Attacks. • MALWARE • TROZON HORSE • WORM • SPAM • PHISHING • BOTNET • PACKET SNIFFER
  • 6. Virus and worm • A Virus is a “program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes . • Viruses can cause a huge amount of damage to computers. • An example of a virus would be if you opened an email and a malicious piece of code was downloaded onto your computer causing your computer to freeze. • Solution: Install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms.
  • 7. Trozon Horse • A Trojan Horse is “a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. • In a network if a Trojan Horse is installed on a computer and tampers with the file allocation table it could cause a massive amount of damage to all computers of that network. • Solution: Security suites, such as Norton Internet Security, will prevent you from downloading Trojan Horses.
  • 8. SPAM • SPAM is “flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. .I believe that SPAM wouldn’t be the biggest risk to a network because even though it may get annoying and plentiful it still doesn’t destroy any physical elements of the network. • Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of the e-mail providers online. Also you can buy a variety of SPAM filters that work effectively.
  • 9. Phishing • Phishing is “an e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. • In my opinion phishing is one of the worst security threats over a network because a lot of people that use computers linked up to a network are amateurs and would be very vulnerable to giving out information that could cause situations such as theft of money or identity theft. • Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent threat.
  • 10. Packet Sniffer • “A packet sniffer is a device or program that allows eavesdropping on traffic travelling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis. • In a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft so this is a major security threat to a network. • Solution: “When strong encryption is used, all packets are unreadable to any but the destination address, making packet sniffers useless.So one solution is to obtain strong encryption.
  • 11. Zombie Computer & Botnet • “A zombie computer, or “drone” is a computer that has been secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely. • A hacker could hack into a computer and control the computer and obtain data. • Solution: Antivirus software can help prevent zombie computers.
  • 12. Zombie Computer & Botnet • A botnet “is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the internet. • This is a major security threat on a network because the network, unknown to anyone, could be acting as a hub that forwards malicious files etc to other computers. • Solution: Network Intrusion Prevention (NIP) systems can help prevent botnets.
  • 13. Protecting Critical Information Infrastructure Critical information infrastructure is the backbone of a country’s national and economic security. It includes power plants, highways, bridges, chemical plants, networks, as well as the buildings where millions of people work every day. These can be secured with stringent collaboration plans and disciplined implementations.
  • 15. Types of FIREWALL • PACKET FILTERRING FIREWALL • APPLICATION/PROXY FIREWALL • HYBRID FIREWALL
  • 18. List of Blocked Website In INDIA : -
  • 21. Way to Hide IP : -
  • 25. The World (05) Biggest Cyber Crime 0 5 10 15 20 25 30 AMERICA CHINA BRAZIL INDIA GERMANY 2017 2017
  • 26. How to be safe and secure • Keep updated • Keep a paid anti-virus and keep it up to date • Don’t go to unknown link • Keep your fire wall on • Quantum computing
  • 27. NETWORK SECURITYT SOFTWARE • Malwarebytes • Kaspersky endpoint security • SolarWinds RMM • Norton Security • Splunk • Black Duck hub
  • 28. CONCLUSION • Network Security is a very broad field and being a Network Security manager is not an easy job. • There are still threats such as password attacks that have no prevention. • Many of the threats set out to get personal information.
  • 29. References • https://www.csoonline.com/category/hacking / • https://www.youtube.com/watch?v=Y3fYULVI ZR0 • Latest update about any type of ransomeware or vulnaribility http://www.cert-in.org.in/