SlideShare a Scribd company logo
“Network Security &
Information Security
Maintenance”
Independent Study (CS450)
Under the guidance of:
Smitesh.D.Patravali
By,
KeerthanKumar Shetty
2SD10CS403
CSE 8 ‘B’ SDMCET
June 10,2013
Department of Computer Science &Department of Computer Science &
EngineeringEngineering
1
Contents
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering
2
Introduction :Network Security
O Definition :
Network security consists of the provisions
and policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and
network-accessible resources.
O Need for Network Security :
• Protect vital information while still allowing
access to those who need it
Ex-Trade secrets, Business records, etc.
• Provide authentication and access control for
resources
June 10,2013
DepartmentDepartment of Computer Science & Engineeringof Computer Science & Engineering
3
Fundamental Security
Objectives
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 4
Security Attacks, Mechanism
& Services
O Security Attacks :
Any action that compromises the security of
information owned by an organization ,group
or an individual.
2 types of Security Attacks
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 5
Security Attacks,
Mechanism & Services
June 10,2013
Department of Computer Science & EngineeringDepartment of Computer Science & Engineering
6
Security Attacks,
Mechanism & Services
O Authentication
Peer-Entity
Data Origin
O Access Control
O Confidentiality
Connection Confidentiality
Connectionless Confidentiality
Selective Confidentiality
Traffic flow Confidentiality
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 7
Security services..Contd..
O Data Integrity
Connection integrity with recovery
Connection integrity without recovery
Connectionless integrity
Selective field Connection Integrity
Selective field Connectionless Integrity
O Non Repudiation
Non Repudiation, origin
Non Repudiation, Destination
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 8
Security Attacks, Mechanism &
ServicesO Security Mechanisms :
A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
June 10,2013
Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 9
Internetwork Security Model
O A message is to be transferred from one party to
another across some sort of Internet service.
O The two parties, who are the principals in this
transaction, must cooperate for the exchange to take
place.
O A logical information channel is established by
defining a route through the Internet from source to
destination and by the cooperative use of
communication protocols (e.g., TCP/IP) by the two
principals.
Network Security Model
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 10
This general model shows that there are four basic
tasks in designing a particular security service:
O1. Design an algorithm for performing the security-
related transformation. Thealgorithm should be such
that an opponent cannot defeat its purpose.
O2. Generate the secret information to be used with
the algorithm.
O3. Develop methods for the distribution and sharing of
the secret information.
O4. Specify a protocol to be used by the two principals
that makes use of the securityalgorithm and the secret
information to achieve a particular security service.
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 11
Internetwork Security Model
Internet Standards & RFC’s
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 12
Information Security
Maintenance
O Once an organization has improved the security posture of the
organization, the security group must turn its attention to the
maintenance of security readiness
O Information security must constantly monitor the threats,
assets, and vulnerabilities
O The team also reviews external information to stay on top of
the latest general and specific threats to its information
security
O It is more expensive to reengineer the information security
profile again and again
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 13
Security Management Models
Management models are frameworks that structure
the tasks of managing a particular set of activities or business
functions.
ISO Model
The ISO management model is a five-layer approach
that provides structure to the administration and
management of networks and systems
The core ISO model addresses management and
operation thorough five topics:
O Fault management
O Configuration and Change management
O Accounting management
O Performance management
O Security management
June 10,2013
Department of Computer Science & EngineeringDepartment of Computer Science & Engineering
14
ISO Model Contd….
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 15
The Maintenance Model
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 16
Conclusion
O Hence, we can conclude that the need for security in
communicating networks is mandatory & the
techniques provided to maintain information security
are more reliable & implementing the same can
serve our purpose in achieving higher security to our
Information & network.
June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 17
www.Wikepeadia.com.
Network Security Essentials ,Fourth Edition
by William Stallings.
Principles of Information Security by Michael
D Whitman.
June 10,2013Department of Computer Science & Engineering 18
References
Thank you!!!
June 10,2013Department of Computer Science & Engineering 19

More Related Content

PDF
Network security
PPTX
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
PDF
EU H2020 PRISMACLOUD Project Overview
PDF
Cloud Computing Security V1.2
PDF
4.report (cryptography & computer network)
PDF
Hans Bos
PDF
VPN security standards - Tareq Hanaysha
DOCX
Security+
Network security
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
EU H2020 PRISMACLOUD Project Overview
Cloud Computing Security V1.2
4.report (cryptography & computer network)
Hans Bos
VPN security standards - Tareq Hanaysha
Security+

What's hot (16)

PPTX
JDMDE Specialisation KaHo Sint-Lieven
PDF
Security_in_Satellite_Systems_Lisi_2015
PPTX
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
PPT
Information Security Challenges & Opportunities
PDF
Yves-Yoseph-resume
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PPTX
Computer security plan
DOCX
Ijwns
DOCX
Ijwns
PPTX
OSI Security Architecture
PPTX
Network Security Terminologies
PPTX
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
DOCX
International Journal of Wireless Networks Systems (IJWNS)
DOCX
Ijwns
DOCX
International Journal of Wireless Networks Systems (IJWNS)
JDMDE Specialisation KaHo Sint-Lieven
Security_in_Satellite_Systems_Lisi_2015
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Information Security Challenges & Opportunities
Yves-Yoseph-resume
International Journal of Wireless Networks Systems (IJWNS)
Computer security plan
Ijwns
Ijwns
OSI Security Architecture
Network Security Terminologies
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
International Journal of Wireless Networks Systems (IJWNS)
Ijwns
International Journal of Wireless Networks Systems (IJWNS)
Ad

Viewers also liked (20)

PPT
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
PPT
Information and Network Security
PPT
Information security as an ongoing effort
PPTX
Edi new
PPT
Privacy Issues of Cloud Computing in the Federal Sector
PPTX
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
PPTX
Recording formats and_editing_softwares
PPT
Multimedia applications
PDF
Fedramp developing-system-security-plan-slides
PPTX
Information & network security certifications
PPTX
Artificial intelligence original
PDF
Soft computing and artificial intelligence techniques for intrusion
PPTX
Network Security Offering by GSS America
PPTX
Data and Message Security
PPT
Wire Less
PDF
Advanced Computing Techonologies
PPTX
Introduction of cryptography and network security
ODP
Network security
PPTX
Seminar (network security)
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information and Network Security
Information security as an ongoing effort
Edi new
Privacy Issues of Cloud Computing in the Federal Sector
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
Recording formats and_editing_softwares
Multimedia applications
Fedramp developing-system-security-plan-slides
Information & network security certifications
Artificial intelligence original
Soft computing and artificial intelligence techniques for intrusion
Network Security Offering by GSS America
Data and Message Security
Wire Less
Advanced Computing Techonologies
Introduction of cryptography and network security
Network security
Seminar (network security)
Ad

Similar to Network security & information security maintainence modified (20)

PPT
Network Security 1st Lecture
PDF
Overview of SMB, NetBIOS and other network attacks
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPT
Chapter 1.ppt
PPT
computer architecture.ppt
PDF
Information Security Text And Cases 20 20 Gurpreet Dhillon
PPT
SecurityBasics.ppt a good thing by pakiza
PPT
Identifying and Using Network Hand Tools
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Network security (syed azam)
PDF
Network Security Research Paper
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
PPTX
Cryptography and network Security--MOD-1.pptx
PPTX
CS5300 class presentation on managing information systems
PDF
Network_Security1.pdf.pdf
PPT
Network and Information Security unit 1.ppt
PPTX
Network security # Lecture 1
PPT
Essentials Of Security
 
PPT
Information Security maintainance Security Engineering
PPT
The need for security
Network Security 1st Lecture
Overview of SMB, NetBIOS and other network attacks
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Chapter 1.ppt
computer architecture.ppt
Information Security Text And Cases 20 20 Gurpreet Dhillon
SecurityBasics.ppt a good thing by pakiza
Identifying and Using Network Hand Tools
Unit 1 Network Fundamentals and Security .pptx
Network security (syed azam)
Network Security Research Paper
(eBook PDF) Information Security: Principles and Practices 2nd Edition
Cryptography and network Security--MOD-1.pptx
CS5300 class presentation on managing information systems
Network_Security1.pdf.pdf
Network and Information Security unit 1.ppt
Network security # Lecture 1
Essentials Of Security
 
Information Security maintainance Security Engineering
The need for security

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
Unlocking AI with Model Context Protocol (MCP)
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx

Network security & information security maintainence modified

  • 1. “Network Security & Information Security Maintenance” Independent Study (CS450) Under the guidance of: Smitesh.D.Patravali By, KeerthanKumar Shetty 2SD10CS403 CSE 8 ‘B’ SDMCET June 10,2013 Department of Computer Science &Department of Computer Science & EngineeringEngineering 1
  • 2. Contents June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 2
  • 3. Introduction :Network Security O Definition : Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. O Need for Network Security : • Protect vital information while still allowing access to those who need it Ex-Trade secrets, Business records, etc. • Provide authentication and access control for resources June 10,2013 DepartmentDepartment of Computer Science & Engineeringof Computer Science & Engineering 3
  • 4. Fundamental Security Objectives June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 4
  • 5. Security Attacks, Mechanism & Services O Security Attacks : Any action that compromises the security of information owned by an organization ,group or an individual. 2 types of Security Attacks June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 5
  • 6. Security Attacks, Mechanism & Services June 10,2013 Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 6
  • 7. Security Attacks, Mechanism & Services O Authentication Peer-Entity Data Origin O Access Control O Confidentiality Connection Confidentiality Connectionless Confidentiality Selective Confidentiality Traffic flow Confidentiality June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 7
  • 8. Security services..Contd.. O Data Integrity Connection integrity with recovery Connection integrity without recovery Connectionless integrity Selective field Connection Integrity Selective field Connectionless Integrity O Non Repudiation Non Repudiation, origin Non Repudiation, Destination June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 8
  • 9. Security Attacks, Mechanism & ServicesO Security Mechanisms : A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. June 10,2013 Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 9
  • 10. Internetwork Security Model O A message is to be transferred from one party to another across some sort of Internet service. O The two parties, who are the principals in this transaction, must cooperate for the exchange to take place. O A logical information channel is established by defining a route through the Internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals. Network Security Model June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 10
  • 11. This general model shows that there are four basic tasks in designing a particular security service: O1. Design an algorithm for performing the security- related transformation. Thealgorithm should be such that an opponent cannot defeat its purpose. O2. Generate the secret information to be used with the algorithm. O3. Develop methods for the distribution and sharing of the secret information. O4. Specify a protocol to be used by the two principals that makes use of the securityalgorithm and the secret information to achieve a particular security service. June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 11 Internetwork Security Model
  • 12. Internet Standards & RFC’s June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 12
  • 13. Information Security Maintenance O Once an organization has improved the security posture of the organization, the security group must turn its attention to the maintenance of security readiness O Information security must constantly monitor the threats, assets, and vulnerabilities O The team also reviews external information to stay on top of the latest general and specific threats to its information security O It is more expensive to reengineer the information security profile again and again June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 13
  • 14. Security Management Models Management models are frameworks that structure the tasks of managing a particular set of activities or business functions. ISO Model The ISO management model is a five-layer approach that provides structure to the administration and management of networks and systems The core ISO model addresses management and operation thorough five topics: O Fault management O Configuration and Change management O Accounting management O Performance management O Security management June 10,2013 Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 14
  • 15. ISO Model Contd…. June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 15
  • 16. The Maintenance Model June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 16
  • 17. Conclusion O Hence, we can conclude that the need for security in communicating networks is mandatory & the techniques provided to maintain information security are more reliable & implementing the same can serve our purpose in achieving higher security to our Information & network. June 10,2013Department of Computer Science & EngineeringDepartment of Computer Science & Engineering 17
  • 18. www.Wikepeadia.com. Network Security Essentials ,Fourth Edition by William Stallings. Principles of Information Security by Michael D Whitman. June 10,2013Department of Computer Science & Engineering 18 References
  • 19. Thank you!!! June 10,2013Department of Computer Science & Engineering 19