SlideShare a Scribd company logo
Wireless Networking (WSN Networking)
Presented By:
Rana Atiq ur Rehman
MS170401013
MS COMPUTER SCIENCES,
COMPUTER NETWORKING
Virtual University of Pakistan, Sahiwal Campus, Sahiwal
Network Security
Network security is an organization’s strategy
that enables guaranteeing the security of its
assets including all network traffic. It includes
both software and hardware technologies.
Access to the network is managed by effective
network security, which targets a wide range
of threats and then arrests them from
spreading or entering in the network.
Network Security
Network security is an integration of
multiple layers of defenses in the
network and at the network. Policies
and controls are implemented by
each network security layer. Access to
networks is gained by authorized
users, whereas, malicious actors are
indeed blocked from executing threats
and exploits.
Our world has presently been transformed by digitization,
resulting in changes in almost all our daily activities. It is
essential for all organizations to protect their networks if
they aim at delivering the services demanded by
employees and customers. This eventually protects the
reputation of your organization. With hackers increasing
and becoming smarter day by day, the need to
utilize network security tool becomes more and more
impotent.
Network Security
Types of Network Security
1. Antivirus and Antimalware Software
2. Application Security
3. Behavioral Analytics
4. Data Loss Prevention (DLP)
5. Email Security
6. Firewalls
7. Mobile Device Security
8. Network Segmentation
9. Security Information and Event Management (SIEM)
10.Virtual Private Network (VPN)
11.Web Security
12.Wireless Security
13.Endpoint Security
14.Network Access Control (NAC)
Network Security
Antivirus and Antimalware Software : This software is used for
protecting against malware, which includes spyware, ransomware,
Trojans, worms, and viruses. Malware can also become very
dangerous as it can infect a network and then remain calm for days
or even weeks. This software handles this threat by scanning for
malware entry and regularly tracks files afterward in order to detect
anomalies, remove malware, and fix damage.
Application Security: It is important to have an application security
since no app is created perfectly. It is possible for any application to
comprise of vulnerabilities, or holes, that are used by attackers to enter
your network. Application security thus encompasses the software,
hardware, and processes you select for closing those holes.
Network Security
Network Security
Behavioral Analytics: In order to detect abnormal network
behaviour, you will have to know what normal behavior looks like.
Behavioral analytics tools are capable of automatically discerning
activities that deviate from the norm. Your security team will thus
be able to efficiently detect indicators of compromise that pose a
potential problem and rapidly remediate threats.
Data Loss Prevention (DLP): Organizations should guarantee that
their staff does not send sensitive information outside the network.
They should thus use DLP technologies, network security
measures, that prevent people from uploading, forwarding, or even
printing vital information in an unsafe manner.
Network Security
Email Security: Email gateways are considered to be the number one threat
vector for a security breach. Attackers use social engineering tactics and personal
information in order to build refined phishing campaigns to deceive recipients
and then send them to sites serving up malware. An email security application is
capable of blocking incoming attacks and controlling outbound messages in order
to prevent the loss of sensitive data.
Firewalls: Firewalls place a barrier between your trusted internal network and
un-trusted outside networks, like the Internet. A set of defined rules are
employed to block or allow traffic. A firewall can be software, hardware, or both.
The free firewall efficiently manages traffic on your PC, monitors in/out
connections, and secures all connections when you are online. Intrusion
Prevention System (IPS): An IPS is a network security capable of scanning network
traffic in order to actively block attacks. The IPS Setting interface permits the
administrator to configure the rule set updates for Snort. It is possible to
schedule the rule set updates allowing them to automatically run at particular
intervals and these updates can be run manually on demand.
Network Security
Mobile Device Security: Mobile devices and apps are increasingly being targeted
by cybercriminals. 90% of IT organizations could very soon support corporate
applications on personal mobile devices. There is indeed the necessity for you to
control which devices can access your network. It is also necessary to configure
their connections in order to keep network traffic private.
Network Segmentation: Software-defined segmentation places network traffic
into varied classifications and makes enforcing security policies a lot easier. The
classifications are ideally based on endpoint identity, not just IP addresses. Rights
can be accessed based on location, role, and more so that the right people get
the correct level of access and suspicious devices are thus contained and
remediated.
Security Information and Event Management (SIEM): SIEM products bring
together all the information needed by your security staff in order to identify and
respond to threats. These products are available in different forms, including
virtual and physical appliances and server software.
Network Security
Virtual Private Network (VPN): A VPN is another type of network security
capable of encrypting the connection from an endpoint to a network, mostly over
the Internet. A remote-access VPN typically uses IPsec or Secure Sockets Layer in
order to authenticate the communication between network and device.
Web Security: A perfect web security solution will help in controlling your
staff’s web use, denying access to malicious websites, and blocking
Wireless Security: The mobile office movement is presently gaining
momentum along with wireless networks and access points. However,
wireless networks are not as secure as wired ones and this makes way for
hackers to enter. It is thus essential for the wireless security to be strong. It
should be noted that without stringent security measures installing a wireless
LAN could be like placing Ethernet ports everywhere. Products specifically
designed for protecting a wireless network will have to be used in order to
prevent an exploit from taking place.
Network Security
Endpoint Security: Endpoint Security, also known Endpoint Protection or
Network Security, is a methodology used for protecting corporate networks
when accessed through remote devices such as laptops or several other
wireless devices and mobile devices. For instance, Comodo Advanced
Endpoint Protection software presents seven layers of defense that include
viruscope, file reputation, auto-sandbox, host intrusion prevention, web URL
filtering, firewall, and antivirus software. All this is offered under a single
offering in order to protect them from both unknown and known threats.
Network Access Control (NAC): This network security process helps you to
control who can access your network. It is essential to recognize each device
and user in order to keep out potential attackers. This indeed will help you to
enforce your security policies. Noncompliant endpoint devices can be given
only limited access or just blocked.
Network Security
Network Security
Network Security
Network Security
The network security key is the password or pass phrase
that you use to authenticate with your homenetwork. In
order to establish a secure connection with your wireless
router, you have to provide the keyto prove that you are
authorized to do so.
Network Security
Definition - What does Network Security Key mean?
A network security key usually refers to the password
or alphanumeric key that end users enter to access a
local area network.
In common use, the network security key differs from
other network keys used to determine network
addresses, etc.
A security key is a resource for a specific security
protocol that helps secure the local network.
Network Security
What is a Network Security Key and How Can You Identify Yours?
Your Network Security Key is the Password for Your
Internet Network.
It connects your computers or other devices to your router,
allowing you to receive the signal and get online. If your
computer forgets or someone changes the network security
key, you will be unable to access your internet-based websites,
programs, and files. You very often will need it if trying to
connect a new device to your network.
Network Security
How do you find your network security key?
On Your Router
Often, the network security will be marked on a label on your router, and if you never
changed the password or reset your router to default settings, than you’re good to go. It
may be listed as “Security Key,” “WEP Key,” “WPA Key,” “WPA2 Key,” “Wireless Key,” or
“Passphrase.”
You might also find this in the documentation that came with your router.
If you can’t find it on your router or in the paperwork, how you find it depends on your
operating system.
On Your Computers and Devices
When you are connected to the network, your computer remembers it, and you can look
in your PC to obtain the password. It’s a good idea to write it down somewhere ahead of
time and keep it somewhere safe so you can easily retrieve it as needed.
Network Security
Windows 7:
Click the Start button, and then open the Control
Panel. Select “Network and Internet,” click “View
network status and tasks.” Click on “Manage
Wireless Networks” and then find the name of your
wireless network on the menu that opens.
Right-click, choose “Properties,” and then select the
Security tab. Check “Show characters,” if the
characters are concealed, and then you will see your
Network security key.
Network Security
“Thank you for your patience” is a way to acknowledge that the other person has been
waiting for an extended period of time, usually longer than they should expect to have
waited in the situation. Patience: the capacity to accept or tolerate delay, problems, or
suffering without becoming annoyed or anxious.

More Related Content

PDF
NSA and PT
PPTX
Network security
PDF
Importance of Using Firewall for Threat Protection
PDF
TACTiCS_WP Security_Addressing Security in SDN Environment
PDF
Cyber Security - IDS/IPS is not enough
PDF
SMB Network Security Checklist
PPTX
Network Security
PDF
Eximbank security presentation
NSA and PT
Network security
Importance of Using Firewall for Threat Protection
TACTiCS_WP Security_Addressing Security in SDN Environment
Cyber Security - IDS/IPS is not enough
SMB Network Security Checklist
Network Security
Eximbank security presentation

What's hot (20)

PDF
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
PDF
Network srcurity
PDF
The use of honeynet to detect exploited systems (basic version)
PDF
Intrusion Detection and Prevention System in an Enterprise Network
PDF
Network Security Tutorial | Introduction to Network Security | Network Securi...
PPT
Chapter1 intro network_security_sunorganised
PDF
Network infrastructure security management solution - A holistic approach in ...
PPTX
Network security and firewalls
PDF
Review of network diagram
PPTX
Aca presentation arm_
PPT
Top Tactics For Endpoint Security
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
Next Generation Network: Security and Architecture
PPTX
امن نظم المعلومات وامن الشبكات
PPTX
Network security
PPTX
Cyber security
PPTX
Wireless Communiction Security
PPTX
What is network security and Types
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Network srcurity
The use of honeynet to detect exploited systems (basic version)
Intrusion Detection and Prevention System in an Enterprise Network
Network Security Tutorial | Introduction to Network Security | Network Securi...
Chapter1 intro network_security_sunorganised
Network infrastructure security management solution - A holistic approach in ...
Network security and firewalls
Review of network diagram
Aca presentation arm_
Top Tactics For Endpoint Security
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Next Generation Network: Security and Architecture
امن نظم المعلومات وامن الشبكات
Network security
Cyber security
Wireless Communiction Security
What is network security and Types
Ad

Similar to Wireless Networking (20)

PDF
network_security.docx_2.pdf
PPTX
Network Security ppt
DOCX
Network security
PPTX
Network security
PDF
Network Security Fundamentals
PPTX
unit 2 IT security solution.pptx
PDF
Edu 03Anju 23 assignment.pdf
PPTX
Network Security of Data Protection
DOCX
Different Types Of Network Security Devices And Tools.docx
PDF
8 Top Cybersecurity Tools.pdf
PDF
Cyber security notes or Mca/bca about security
PPTX
Internet safety and you
PPTX
8 Top Cybersecurity Tools.pptx
PPTX
iTM ppt....pptx
PPTX
Network-security-ppt.pptx...............
PDF
A Brief Note On Companies And The Largest Ever Consumer...
PDF
Advantages and Disadvantages of Network Security.pdf
PPTX
network security ppt.pptx
PPTX
ppt on securities.pptx
PDF
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
network_security.docx_2.pdf
Network Security ppt
Network security
Network security
Network Security Fundamentals
unit 2 IT security solution.pptx
Edu 03Anju 23 assignment.pdf
Network Security of Data Protection
Different Types Of Network Security Devices And Tools.docx
8 Top Cybersecurity Tools.pdf
Cyber security notes or Mca/bca about security
Internet safety and you
8 Top Cybersecurity Tools.pptx
iTM ppt....pptx
Network-security-ppt.pptx...............
A Brief Note On Companies And The Largest Ever Consumer...
Advantages and Disadvantages of Network Security.pdf
network security ppt.pptx
ppt on securities.pptx
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine Learning_overview_presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation

Wireless Networking

  • 1. Wireless Networking (WSN Networking) Presented By: Rana Atiq ur Rehman MS170401013 MS COMPUTER SCIENCES, COMPUTER NETWORKING Virtual University of Pakistan, Sahiwal Campus, Sahiwal
  • 2. Network Security Network security is an organization’s strategy that enables guaranteeing the security of its assets including all network traffic. It includes both software and hardware technologies. Access to the network is managed by effective network security, which targets a wide range of threats and then arrests them from spreading or entering in the network.
  • 3. Network Security Network security is an integration of multiple layers of defenses in the network and at the network. Policies and controls are implemented by each network security layer. Access to networks is gained by authorized users, whereas, malicious actors are indeed blocked from executing threats and exploits.
  • 4. Our world has presently been transformed by digitization, resulting in changes in almost all our daily activities. It is essential for all organizations to protect their networks if they aim at delivering the services demanded by employees and customers. This eventually protects the reputation of your organization. With hackers increasing and becoming smarter day by day, the need to utilize network security tool becomes more and more impotent. Network Security
  • 5. Types of Network Security 1. Antivirus and Antimalware Software 2. Application Security 3. Behavioral Analytics 4. Data Loss Prevention (DLP) 5. Email Security 6. Firewalls 7. Mobile Device Security 8. Network Segmentation 9. Security Information and Event Management (SIEM) 10.Virtual Private Network (VPN) 11.Web Security 12.Wireless Security 13.Endpoint Security 14.Network Access Control (NAC) Network Security
  • 6. Antivirus and Antimalware Software : This software is used for protecting against malware, which includes spyware, ransomware, Trojans, worms, and viruses. Malware can also become very dangerous as it can infect a network and then remain calm for days or even weeks. This software handles this threat by scanning for malware entry and regularly tracks files afterward in order to detect anomalies, remove malware, and fix damage. Application Security: It is important to have an application security since no app is created perfectly. It is possible for any application to comprise of vulnerabilities, or holes, that are used by attackers to enter your network. Application security thus encompasses the software, hardware, and processes you select for closing those holes. Network Security
  • 7. Network Security Behavioral Analytics: In order to detect abnormal network behaviour, you will have to know what normal behavior looks like. Behavioral analytics tools are capable of automatically discerning activities that deviate from the norm. Your security team will thus be able to efficiently detect indicators of compromise that pose a potential problem and rapidly remediate threats. Data Loss Prevention (DLP): Organizations should guarantee that their staff does not send sensitive information outside the network. They should thus use DLP technologies, network security measures, that prevent people from uploading, forwarding, or even printing vital information in an unsafe manner.
  • 8. Network Security Email Security: Email gateways are considered to be the number one threat vector for a security breach. Attackers use social engineering tactics and personal information in order to build refined phishing campaigns to deceive recipients and then send them to sites serving up malware. An email security application is capable of blocking incoming attacks and controlling outbound messages in order to prevent the loss of sensitive data. Firewalls: Firewalls place a barrier between your trusted internal network and un-trusted outside networks, like the Internet. A set of defined rules are employed to block or allow traffic. A firewall can be software, hardware, or both. The free firewall efficiently manages traffic on your PC, monitors in/out connections, and secures all connections when you are online. Intrusion Prevention System (IPS): An IPS is a network security capable of scanning network traffic in order to actively block attacks. The IPS Setting interface permits the administrator to configure the rule set updates for Snort. It is possible to schedule the rule set updates allowing them to automatically run at particular intervals and these updates can be run manually on demand.
  • 9. Network Security Mobile Device Security: Mobile devices and apps are increasingly being targeted by cybercriminals. 90% of IT organizations could very soon support corporate applications on personal mobile devices. There is indeed the necessity for you to control which devices can access your network. It is also necessary to configure their connections in order to keep network traffic private. Network Segmentation: Software-defined segmentation places network traffic into varied classifications and makes enforcing security policies a lot easier. The classifications are ideally based on endpoint identity, not just IP addresses. Rights can be accessed based on location, role, and more so that the right people get the correct level of access and suspicious devices are thus contained and remediated. Security Information and Event Management (SIEM): SIEM products bring together all the information needed by your security staff in order to identify and respond to threats. These products are available in different forms, including virtual and physical appliances and server software.
  • 10. Network Security Virtual Private Network (VPN): A VPN is another type of network security capable of encrypting the connection from an endpoint to a network, mostly over the Internet. A remote-access VPN typically uses IPsec or Secure Sockets Layer in order to authenticate the communication between network and device. Web Security: A perfect web security solution will help in controlling your staff’s web use, denying access to malicious websites, and blocking Wireless Security: The mobile office movement is presently gaining momentum along with wireless networks and access points. However, wireless networks are not as secure as wired ones and this makes way for hackers to enter. It is thus essential for the wireless security to be strong. It should be noted that without stringent security measures installing a wireless LAN could be like placing Ethernet ports everywhere. Products specifically designed for protecting a wireless network will have to be used in order to prevent an exploit from taking place.
  • 11. Network Security Endpoint Security: Endpoint Security, also known Endpoint Protection or Network Security, is a methodology used for protecting corporate networks when accessed through remote devices such as laptops or several other wireless devices and mobile devices. For instance, Comodo Advanced Endpoint Protection software presents seven layers of defense that include viruscope, file reputation, auto-sandbox, host intrusion prevention, web URL filtering, firewall, and antivirus software. All this is offered under a single offering in order to protect them from both unknown and known threats. Network Access Control (NAC): This network security process helps you to control who can access your network. It is essential to recognize each device and user in order to keep out potential attackers. This indeed will help you to enforce your security policies. Noncompliant endpoint devices can be given only limited access or just blocked.
  • 15. Network Security The network security key is the password or pass phrase that you use to authenticate with your homenetwork. In order to establish a secure connection with your wireless router, you have to provide the keyto prove that you are authorized to do so.
  • 16. Network Security Definition - What does Network Security Key mean? A network security key usually refers to the password or alphanumeric key that end users enter to access a local area network. In common use, the network security key differs from other network keys used to determine network addresses, etc. A security key is a resource for a specific security protocol that helps secure the local network.
  • 17. Network Security What is a Network Security Key and How Can You Identify Yours? Your Network Security Key is the Password for Your Internet Network. It connects your computers or other devices to your router, allowing you to receive the signal and get online. If your computer forgets or someone changes the network security key, you will be unable to access your internet-based websites, programs, and files. You very often will need it if trying to connect a new device to your network.
  • 18. Network Security How do you find your network security key? On Your Router Often, the network security will be marked on a label on your router, and if you never changed the password or reset your router to default settings, than you’re good to go. It may be listed as “Security Key,” “WEP Key,” “WPA Key,” “WPA2 Key,” “Wireless Key,” or “Passphrase.” You might also find this in the documentation that came with your router. If you can’t find it on your router or in the paperwork, how you find it depends on your operating system. On Your Computers and Devices When you are connected to the network, your computer remembers it, and you can look in your PC to obtain the password. It’s a good idea to write it down somewhere ahead of time and keep it somewhere safe so you can easily retrieve it as needed.
  • 19. Network Security Windows 7: Click the Start button, and then open the Control Panel. Select “Network and Internet,” click “View network status and tasks.” Click on “Manage Wireless Networks” and then find the name of your wireless network on the menu that opens. Right-click, choose “Properties,” and then select the Security tab. Check “Show characters,” if the characters are concealed, and then you will see your Network security key.
  • 20. Network Security “Thank you for your patience” is a way to acknowledge that the other person has been waiting for an extended period of time, usually longer than they should expect to have waited in the situation. Patience: the capacity to accept or tolerate delay, problems, or suffering without becoming annoyed or anxious.