GOOD MORNING - PowerPoint PPT Presentation

About This Presentation
Title:

GOOD MORNING

Description:

... ROUTER TRAFFIC REGULATION FIREWALL TRAFFIC REGULATION HOST ... The rules of a firewall can inspect one or more ... and the source or destination port. – PowerPoint PPT presentation

Number of Views:28
Avg rating:3.0/5.0
Slides: 18
Provided by: 123semina
Category:

less

Transcript and Presenter's Notes

Title: GOOD MORNING


1
  • GOOD MORNING
  • TO
  • ONE AND ALL

2
OUR TEAM
  • VENKATESH
  • THARUN
  • SADIK
  • FROM
  • AVANTHI ENGG. COLLEGE

3
OUR TOPIC
  • NETWORK-SECURITY
  • CRYPTOGRAPHY

4
NETWORK-SECURITY
  • INTRODUCTION FOR SECURITY
  • WHAT IS MEANT BY NETWORK-SECURITY ?
  • NEED FOR THE SECURITY ?

5
NEED FOR SECURITY
  • Protect valuable or sensitive organizational
    information while making it readily available.
  • System administrators need to understand the
    various aspects of security to develop measures
    and policies to protect assets and limit their
    vulnerabilities.

6
(No Transcript)
7
(No Transcript)
8
(No Transcript)
9
TRAFFIC REGULATIONS
  • TYPES OF DEFINITIONS
  • ROUTER TRAFFIC REGULATION
  • FIREWALL TRAFFIC REGULATION
  • HOST TRAFFIC REGULATION

10
FIREWALLS
  • INTRODUCTION
  • Firewalls make it possible to filter incoming and
    outgoing traffic that flows through your system.
  • The rules of a firewall can inspect one or more
    characteristics of the packets, including but not
    limited to the protocol type, the source or
    destination host address, and the source or
    destination port.
  • Firewalls can greatly enhance the security of a
    host or a network.

11
(No Transcript)
12
Diagrammatic representation of a Firewall

GLOBAL INTERNET
FIREWALL
I N S I D E OUTSIDE
13
USES OF FIREWALLS
  • To protect and insulate the applications and
    services of your internal network from unwanted
    traffic coming in from the public Internet.
  • To limit or disable access from hosts of the
    internal network to services of the public
    Internet.
  • To support network address translation (NAT),
    which allows your internal network to use private
    IP addresses and share a single connection to the
    public Internet

14
(No Transcript)
15
DIFFERENT TYPES OF THREATS TO NETWORK
  • E-MAIL BOMBS
  • MACROS
  • VIRUSES
  • SPAM

16
CRYPTOGRAPHY
  • What is cryptography?
  • SERVICES
  • Decryption is the reverse of encryption, and Hash
    functions-it involves the use of zero keys.
  • Secret key functions-it involves the use of one
    key.
  • Public key functions-it involves the use of two
    keys.

17
TYPES OF CRYPTOGRAPHIC FUNCTIONS
  • Decryption is the reverse of encryption, and Hash
    functions-it involves the use of zero keys.
  • Secret key functions-it involves the use of one
    key.
  • Public key functions-it involves the use of two
    keys.
Write a Comment
User Comments (0)
About PowerShow.com