SlideShare a Scribd company logo
Wireless Security,
Firewall,Encryption
Ashwin Harikumar
www.ashwinharikumar.wixsite.com
Wireless Security
• Wireless security is the prevention of unauthorized access or
damage to computers using wireless networks.
• The most common types of wireless security are Wired Equivalent
Privacy (WEP) and Wi-Fi Protected Access (WPA).
• WEP is an old IEEE 802.11 standard from 1999, which was outdated
in 2003 by WPA, or Wi-Fi Protected Access.
A screenshot of an
wireless security of
wifi modem.Here
the WPA2 is shown.
Firewall
• A firewall is a network security system that monitors and controls
the incoming and outgoing network traffic based on predetermined
security rules.
• It establishes a barrier between a trusted, secure internal network
and another outside network, such as the Internet, that is assumed
not to be
• Firewall technology emerged in the late 1980s when the Internet was
a fairly new technology in terms of its global use and connectivity.
secure or trusted.
An illustration showing a
firewall would be
located in a network.
Encryption
• Encryption is the process of encoding a message or information in
such a way that only authorized parties can access it.
• Encryption does not of itself prevent interference, but denies the
intelligible content to a would-be interceptor.
• Encryption has long been used by militaries and governments to
facilitate secret communication. It is now commonly used in
protecting information within many kinds of civilian systems
Thank You

More Related Content

PDF
sw2 week13
PPTX
Presentation1 new (1) (1)cf
PPT
Firewall
PPTX
Network security
PPTX
NETWORK SECURITY
PPTX
Network security
PPTX
Network Security and Firewall
PDF
Ga13
sw2 week13
Presentation1 new (1) (1)cf
Firewall
Network security
NETWORK SECURITY
Network security
Network Security and Firewall
Ga13

What's hot (19)

PDF
Slied13
PPTX
Wirless Security By Zohaib Zeeshan
PPT
voice
PPTX
Network security
PPTX
Network Security Issues
PPTX
Wireless security report
PDF
Prew14
PDF
Prew14
PDF
Topics in network security
PPT
Homework0703
PPT
Cryptppt1
PPTX
Computer Networking
PPTX
Network security
PPTX
Network security
PPTX
Attack presentation
PPTX
Most Advanced Wireless Security Training : Tonex Training
PPT
Wireless Intrusion Prevention Systems or WIPS
PDF
English Week13
PPTX
Network Security: Attacks, Tools and Techniques
Slied13
Wirless Security By Zohaib Zeeshan
voice
Network security
Network Security Issues
Wireless security report
Prew14
Prew14
Topics in network security
Homework0703
Cryptppt1
Computer Networking
Network security
Network security
Attack presentation
Most Advanced Wireless Security Training : Tonex Training
Wireless Intrusion Prevention Systems or WIPS
English Week13
Network Security: Attacks, Tools and Techniques
Ad

Viewers also liked (20)

PDF
Securing the Use of Wireless Fidelity (WiFi) in Libraries
PPTX
Social media marketing
PPTX
Wpa2 psk security measure
PDF
NBA: Shooting Guard + Small Forward Selection
PDF
NBA: Point Guard Selection
PPT
Firewall
PPT
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
PPT
Emerging Technologies in the Workplace For Quality Service
PPT
Technology in ECE Powerpoint
PPT
Data security in local network using distributed firewall ppt
PPT
Patanjali Ayurved Limited (PAL)
PDF
Patanjali: Business Model and effects on the FMCG sector in India
PPT
Wireless security presentation
PDF
Product mix patanjali
PPTX
Patanjali- The great Indian Company
PPT
PPTX
4g technology
PPTX
Patanjali 2
PPTX
Project on Patanjali Personal Care Products
PPTX
Firewall presentation
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Social media marketing
Wpa2 psk security measure
NBA: Shooting Guard + Small Forward Selection
NBA: Point Guard Selection
Firewall
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Emerging Technologies in the Workplace For Quality Service
Technology in ECE Powerpoint
Data security in local network using distributed firewall ppt
Patanjali Ayurved Limited (PAL)
Patanjali: Business Model and effects on the FMCG sector in India
Wireless security presentation
Product mix patanjali
Patanjali- The great Indian Company
4g technology
Patanjali 2
Project on Patanjali Personal Care Products
Firewall presentation
Ad

Similar to Wireless Security, Firewall,Encryption (20)

PDF
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
PPTX
Wifi Security
PPTX
Network Security - Advanced Computer Network.pptx
PPTX
Network security
PPTX
Wireless security
PPTX
372103483.pptx
PPTX
Module 6 Wireless Network security
PPT
Wi fi protected-access
PPT
Wireless Security.ppt
PPT
Wireless Security.ppt
PPT
254460979-ishant abcd-098765432222-1.ppt
PPTX
Wireless networking and security
PPT
Wireless Device and Network level security
PPTX
Wireless Communication and MobileCo5.pptx
PDF
Wireless Security | Wireless Network Security
PDF
Viable means using which Wireless Network Security can be Jeopardized
PPT
Ch06 Wireless Network Security
PDF
Comprehensive Guide On Network Security
PPT
Shashank wireless lans security
PPTX
Wireless network security
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wifi Security
Network Security - Advanced Computer Network.pptx
Network security
Wireless security
372103483.pptx
Module 6 Wireless Network security
Wi fi protected-access
Wireless Security.ppt
Wireless Security.ppt
254460979-ishant abcd-098765432222-1.ppt
Wireless networking and security
Wireless Device and Network level security
Wireless Communication and MobileCo5.pptx
Wireless Security | Wireless Network Security
Viable means using which Wireless Network Security can be Jeopardized
Ch06 Wireless Network Security
Comprehensive Guide On Network Security
Shashank wireless lans security
Wireless network security

Recently uploaded (20)

PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
WRN_Investor_Presentation_August 2025.pdf
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
How to Get Funding for Your Trucking Business
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
A Brief Introduction About Julia Allison
PPTX
Amazon (Business Studies) management studies
PPT
Chapter four Project-Preparation material
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
How to Get Business Funding for Small Business Fast
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
IFRS Notes in your pocket for study all the time
PDF
Business model innovation report 2022.pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Principles of Marketing, Industrial, Consumers,
WRN_Investor_Presentation_August 2025.pdf
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
How to Get Funding for Your Trucking Business
ICG2025_ICG 6th steering committee 30-8-24.pptx
Reconciliation AND MEMORANDUM RECONCILATION
A Brief Introduction About Julia Allison
Amazon (Business Studies) management studies
Chapter four Project-Preparation material
Power and position in leadershipDOC-20250808-WA0011..pdf
340036916-American-Literature-Literary-Period-Overview.ppt
unit 1 COST ACCOUNTING AND COST SHEET
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
How to Get Business Funding for Small Business Fast
DOC-20250806-WA0002._20250806_112011_0000.pdf
IFRS Notes in your pocket for study all the time
Business model innovation report 2022.pdf
New Microsoft PowerPoint Presentation - Copy.pptx
Unit 1 Cost Accounting - Cost sheet

Wireless Security, Firewall,Encryption

  • 2. Wireless Security • Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. • The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). • WEP is an old IEEE 802.11 standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi Protected Access.
  • 3. A screenshot of an wireless security of wifi modem.Here the WPA2 is shown.
  • 4. Firewall • A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. • It establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be • Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. secure or trusted.
  • 5. An illustration showing a firewall would be located in a network.
  • 6. Encryption • Encryption is the process of encoding a message or information in such a way that only authorized parties can access it. • Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. • Encryption has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems