SlideShare a Scribd company logo
Seminar Guide
Mr . Mahesh Dali
Asst. Professor
Mr. Mahesh Dali
Asst.Professor
TRISHLA THAKUR
1DS11TE098
Department of telecommunication Engineering
 Introduction- Why network security is necessary
 Existing risks-Be aware of vulnerabalities and threats
 Security technologies-Understand security services
 Discussion on SAPPDRR model and other dynamic
model
 further Improvement of campus network
Why we need security?
 Protect vital information while still allowing access to
those who need it
 Provide authentication & access control for resources
 Campus network is a highly professional LAN,
which is interconnected with internet which is in
harsh environment
 Managing the network of a higher-education
campus or organization has raised problems of
massive growth of stored data and need to share it
causing over-stressed network, network misuse and
security breaches.
 They is a continuous risk of hacker’s attacks, system
failure and information leakage
Campus network should be formed
on
Unified plan
Based on
Security risk
analysis
Adopt advance
technologies
Such as
firewall,honeynet,VPN
&
monitoring system
Strengthen systems and
specifications
Under the
guidance of dynamic
model
 Campus network is based on TCP/IP protocol
of the large scale LAN
 TCP/IP is constructed by the physical layer,
network interface layer, transport layer and
application layers.
 The risk of campus network security comes
from all the layers.
Improper placement of physical devices or
environmental preventive measures are ineffective
 This layer directly threatens to attack the other
layer. security issues are mainly
 MAC addresses related attacking
 DHCP discontented fool
 ARP attacks
layer encapsulates IP datagram routing forward to
address the problem of communication between
machine.
The common security problems of this layer are:
 IP Address spoofing,
 RIP (routing information protocol) attacks
 Port scanning threat
 Introduction- Why network security is necessary
 Existing risks-Be aware of vulnerabilities and threats
 Security technologies-Understand security services
 Discussion on SAPPDRR model and other dynamic
model
 Improvement of campus network
 Lots of vulnerabilities on hosts in network
 Users don’t keep systems up to date
 Solution?
 Limit access to the network
 Put firewalls across the perimeter of the
network
A firewall is an integrated collection of security
measures designed to prevent unauthorized
electronic access to a networked computer system.
 Packet Filtering
 Network Address Translation (NAT)
 Proxy Services
 Virus Scanning
 Content Filtering
WHAT IS VPN?
VPN is a technology that allows private networks to make
use of a public network, such as the Internet, as a means
of communication .
 Two connections – one is made to the Internet and
the second is made to the VPN.
 Datagram – contains data, destination and source
information.
 Firewalls – VPNs allow authorized users to pass
through the firewalls.
 Protocols – protocols create the VPN tunnels.
 Authentication – validates that the data was
sent from the sender.
 Access control – limiting unauthorized users
from accessing the network.
 Confidentiality – preventing the data to be read
or copied as the data is being transported.
 Data Integrity – ensuring that the data has not
been altered
 A honeynet is a trap set to detect, deflect, or, in
some manner, counteract attempts at unauthorized
use of information systems.
 High-interaction honeypot designed to:
 capture in-depth information
 learn who would like to use your
system without your permission
for their own ends
 Its an architecture, not a product or software.
Study of campus network security
 Digital certificates provide a mechanism to
authenticate and secure information on open
networks.
 Applications using this mechanism include
o secure email
o secure web communications
o digital signing of software files
o smart card authentication
o encrypting file systems
 SSL is a digital certificates issued by a trusted Certificate
Authority for e-commerce website.
 Digital certificate is issued by a third-party Certificate
Authority (CA) like VeriSign.
 PDR(protection ,detection ,recovery ) MODEL
 PPDR (policy, protection, detection, recovery)MODEL
 APPDRR MODEL
This is a network security model based on concept of
closed-loop control.
 This model is a passive dynamic defense model
PDR,PPDR and APPDRR model minimize the loss of network attacks
but defence and protection required costly system and speed will be
affected.
 Reasonable security mechanism, risk analysis carried out
according to the specific need of the service, to develop
appropriate security policies.
 Network security of SAPPDRR model= Risk analysis+
Security strategy+ Defence system +Real-time monitoring
+Real-time response +Disaster recovery +Active
counterattack SAPPDRR model deals with all this.
 This model is active dynamic defence model
 A,B,C,D----- mutually independent safety
system
 X(attacker)from network B
Example
Dynamic
model
deals with
demand
for service
Risk
analysis
Security
policies
System
defence
Real time
monitoring
Response
Disaster
recovery
Initiative
fight back
Purpose of a monitor
 check regularly that everything is in order and,
if not, transmit an alarm
 When fault is rectified monitor will record,
update the system and again work
A monitor is often dedicated to a particular
function:
o ping monitor -checks that all equipment
o Interface monitor- checks that interfaces and
communications are operating
o Module monitor-checks switches, power supplies and fan
modules
o Threshold module- transmits an alarm if traffic load, CPU
load, etc. exceeds a pre-defined limit
A ping monitor uses an ICMP echo (ping) while other
uses SNMP. All these monitors send alarm signals to
the alarm system.
 Along with the development of computer network
technology , campus network expanding and
Increasing of users and visitors, the development of
a virtual private network technology, the popularity
of Internet and the stability of the campus network
safe operation have all become the focus of the
campus network management. SAPPDRR model &
Network monitoring is the basic measure to ensure
network stability and monitor the flow of
information online. The proper control of network
information can also be used to monitor the
network information, eliminate unhealthy Internet
information, and maintain the network environment .
SAPPDRR model can satisfy the needs of our campus
network management and security management.
1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014
2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring system, 2014
3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006.
4.Tian Bin, Research on Monitoring IP Network, 2006
5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002.
6.Network Security: History, Importance, and Future “University of Florida Department of Electrical and
Computer Engineering Bhavya Daya ”.
7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html.
8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007
I
QUESTIONS

More Related Content

PPTX
Botnet and its Detection Techniques
PPTX
PPT
Malware
PPT
Proxy Servers
PPTX
Firewall
PPTX
Securityawareness
PDF
Corporate threat vector and landscape
PDF
Final Project Report-SIEM
Botnet and its Detection Techniques
Malware
Proxy Servers
Firewall
Securityawareness
Corporate threat vector and landscape
Final Project Report-SIEM

What's hot (20)

PDF
Mise En Place d'une Solution de Supervision Réseau
PPTX
Malware classification using Machine Learning
PPTX
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
PPTX
information security (network security methods)
PPTX
Threat hunting foundations: People, process and technology.pptx
PPTX
Checkpoint Overview
PPTX
Firewall
PPT
Computer forensics
PDF
Client-Side Penetration Testing Presentation
PDF
WannaCry Ransomware Attack: What to Do Now
PDF
System Monitoring With Nagios PowerPoint Presentation Slides
PPTX
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Phishing Incident Response Playbook
PDF
Alphorm.com Formation Certified Network Defender 1/2 : Réussir la certification
PDF
الهجمات السيبرانية
PDF
Concept of Operations (CONOPS) for Police Intelligence Operations (PIO)
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Malware Detection By Machine Learning Presentation.pptx
PDF
Threat intelligence notes
Mise En Place d'une Solution de Supervision Réseau
Malware classification using Machine Learning
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
information security (network security methods)
Threat hunting foundations: People, process and technology.pptx
Checkpoint Overview
Firewall
Computer forensics
Client-Side Penetration Testing Presentation
WannaCry Ransomware Attack: What to Do Now
System Monitoring With Nagios PowerPoint Presentation Slides
Cyber Threat Hunting with Phirelight
Phishing Incident Response Playbook
Alphorm.com Formation Certified Network Defender 1/2 : Réussir la certification
الهجمات السيبرانية
Concept of Operations (CONOPS) for Police Intelligence Operations (PIO)
Ethical hacking introduction to ethical hacking
Malware Detection By Machine Learning Presentation.pptx
Threat intelligence notes
Ad

Viewers also liked (20)

PPTX
Fdi in indian retail sector a s.w.ot analysis
PDF
Latest Seminar Topics for Engineering,MCA,MSc Students
DOCX
Best topics for seminar
PPTX
Enterprise campus networks
PPTX
Campus security camera systems
PDF
ACPA Advisor Manual
PPTX
Campus security & safety
PDF
SECURITY AT NUST H12 ISLAMABAD
PPTX
CCCNA R&S-04-Fundamentals of WANs
PPTX
researchayurveda.org
PPTX
Virginia Tech - Campus Safety, Security, and Preparedness
DOCX
Latest seminar topics
PDF
Retail Sector Reports November-2016
PPT
School safety and security management
PDF
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
PPT
School Safety And Security
PPTX
Nat presentation
DOCX
Computer engineering and it seminar topics
PPT
latest seminar topics in computer science
PPT
Women's rights presentation
Fdi in indian retail sector a s.w.ot analysis
Latest Seminar Topics for Engineering,MCA,MSc Students
Best topics for seminar
Enterprise campus networks
Campus security camera systems
ACPA Advisor Manual
Campus security & safety
SECURITY AT NUST H12 ISLAMABAD
CCCNA R&S-04-Fundamentals of WANs
researchayurveda.org
Virginia Tech - Campus Safety, Security, and Preparedness
Latest seminar topics
Retail Sector Reports November-2016
School safety and security management
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
School Safety And Security
Nat presentation
Computer engineering and it seminar topics
latest seminar topics in computer science
Women's rights presentation
Ad

Similar to Study of campus network security (20)

PPTX
Network security
PDF
Overview of SMB, NetBIOS and other network attacks
PPT
Security chapter6
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPT
Securing E-Commerce Networks Presentation.ppt
PDF
Presentation on Network Security
PPT
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
PPT
Network and Information Security unit 1.ppt
PDF
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
PPTX
Network Security
PPTX
Unit 1 Network Fundamentals and Security .pptx
PDF
Introduction to Cyber security module - III
PPTX
Introduction to Network Security by Amit Thakur.pptx
PDF
Network security
PPT
Chapter 1.ppt
PPT
computer architecture.ppt
PDF
network_security.docx_2.pdf
PPTX
network_security_ppt[1].pptx
PPTX
Network security
PPTX
Network security protocols.pptx
Network security
Overview of SMB, NetBIOS and other network attacks
Security chapter6
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Securing E-Commerce Networks Presentation.ppt
Presentation on Network Security
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Network and Information Security unit 1.ppt
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security
Unit 1 Network Fundamentals and Security .pptx
Introduction to Cyber security module - III
Introduction to Network Security by Amit Thakur.pptx
Network security
Chapter 1.ppt
computer architecture.ppt
network_security.docx_2.pdf
network_security_ppt[1].pptx
Network security
Network security protocols.pptx

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
web development for engineering and engineering
PPTX
Construction Project Organization Group 2.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
OOP with Java - Java Introduction (Basics)
PPT
introduction to datamining and warehousing
PPTX
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Safety Seminar civil to be ensured for safe working.
web development for engineering and engineering
Construction Project Organization Group 2.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Sustainable Sites - Green Building Construction
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
R24 SURVEYING LAB MANUAL for civil enggi
OOP with Java - Java Introduction (Basics)
introduction to datamining and warehousing
additive manufacturing of ss316l using mig welding

Study of campus network security

  • 1. Seminar Guide Mr . Mahesh Dali Asst. Professor Mr. Mahesh Dali Asst.Professor TRISHLA THAKUR 1DS11TE098 Department of telecommunication Engineering
  • 2.  Introduction- Why network security is necessary  Existing risks-Be aware of vulnerabalities and threats  Security technologies-Understand security services  Discussion on SAPPDRR model and other dynamic model  further Improvement of campus network
  • 3. Why we need security?  Protect vital information while still allowing access to those who need it  Provide authentication & access control for resources
  • 4.  Campus network is a highly professional LAN, which is interconnected with internet which is in harsh environment  Managing the network of a higher-education campus or organization has raised problems of massive growth of stored data and need to share it causing over-stressed network, network misuse and security breaches.
  • 5.  They is a continuous risk of hacker’s attacks, system failure and information leakage Campus network should be formed on Unified plan Based on Security risk analysis Adopt advance technologies Such as firewall,honeynet,VPN & monitoring system Strengthen systems and specifications Under the guidance of dynamic model
  • 6.  Campus network is based on TCP/IP protocol of the large scale LAN  TCP/IP is constructed by the physical layer, network interface layer, transport layer and application layers.  The risk of campus network security comes from all the layers.
  • 7. Improper placement of physical devices or environmental preventive measures are ineffective
  • 8.  This layer directly threatens to attack the other layer. security issues are mainly  MAC addresses related attacking  DHCP discontented fool  ARP attacks
  • 9. layer encapsulates IP datagram routing forward to address the problem of communication between machine. The common security problems of this layer are:  IP Address spoofing,  RIP (routing information protocol) attacks  Port scanning threat
  • 10.  Introduction- Why network security is necessary  Existing risks-Be aware of vulnerabilities and threats  Security technologies-Understand security services  Discussion on SAPPDRR model and other dynamic model  Improvement of campus network
  • 11.  Lots of vulnerabilities on hosts in network  Users don’t keep systems up to date  Solution?  Limit access to the network  Put firewalls across the perimeter of the network
  • 12. A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
  • 13.  Packet Filtering  Network Address Translation (NAT)  Proxy Services  Virus Scanning  Content Filtering
  • 14. WHAT IS VPN? VPN is a technology that allows private networks to make use of a public network, such as the Internet, as a means of communication .
  • 15.  Two connections – one is made to the Internet and the second is made to the VPN.  Datagram – contains data, destination and source information.  Firewalls – VPNs allow authorized users to pass through the firewalls.  Protocols – protocols create the VPN tunnels.
  • 16.  Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered
  • 17.  A honeynet is a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.  High-interaction honeypot designed to:  capture in-depth information  learn who would like to use your system without your permission for their own ends  Its an architecture, not a product or software.
  • 19.  Digital certificates provide a mechanism to authenticate and secure information on open networks.
  • 20.  Applications using this mechanism include o secure email o secure web communications o digital signing of software files o smart card authentication o encrypting file systems  SSL is a digital certificates issued by a trusted Certificate Authority for e-commerce website.  Digital certificate is issued by a third-party Certificate Authority (CA) like VeriSign.
  • 21.  PDR(protection ,detection ,recovery ) MODEL  PPDR (policy, protection, detection, recovery)MODEL  APPDRR MODEL
  • 22. This is a network security model based on concept of closed-loop control.  This model is a passive dynamic defense model PDR,PPDR and APPDRR model minimize the loss of network attacks but defence and protection required costly system and speed will be affected.
  • 23.  Reasonable security mechanism, risk analysis carried out according to the specific need of the service, to develop appropriate security policies.  Network security of SAPPDRR model= Risk analysis+ Security strategy+ Defence system +Real-time monitoring +Real-time response +Disaster recovery +Active counterattack SAPPDRR model deals with all this.  This model is active dynamic defence model
  • 24.  A,B,C,D----- mutually independent safety system  X(attacker)from network B Example
  • 25. Dynamic model deals with demand for service Risk analysis Security policies System defence Real time monitoring Response Disaster recovery Initiative fight back
  • 26. Purpose of a monitor  check regularly that everything is in order and, if not, transmit an alarm  When fault is rectified monitor will record, update the system and again work
  • 27. A monitor is often dedicated to a particular function: o ping monitor -checks that all equipment o Interface monitor- checks that interfaces and communications are operating o Module monitor-checks switches, power supplies and fan modules o Threshold module- transmits an alarm if traffic load, CPU load, etc. exceeds a pre-defined limit A ping monitor uses an ICMP echo (ping) while other uses SNMP. All these monitors send alarm signals to the alarm system.
  • 28.  Along with the development of computer network technology , campus network expanding and Increasing of users and visitors, the development of a virtual private network technology, the popularity of Internet and the stability of the campus network safe operation have all become the focus of the campus network management. SAPPDRR model & Network monitoring is the basic measure to ensure network stability and monitor the flow of information online. The proper control of network information can also be used to monitor the network information, eliminate unhealthy Internet information, and maintain the network environment . SAPPDRR model can satisfy the needs of our campus network management and security management.
  • 29. 1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014 2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring system, 2014 3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006. 4.Tian Bin, Research on Monitoring IP Network, 2006 5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002. 6.Network Security: History, Importance, and Future “University of Florida Department of Electrical and Computer Engineering Bhavya Daya ”. 7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html. 8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007