Network Security: Protocols, Firewalls and Hardware Security

Verified

Added on  2023/06/14

|13
|812
|292
AI Summary
This presentation covers the basics of network security, including protocols, firewalls, and hardware security measures. It explains the importance of protecting your system from unethical hackers and crackers and provides an overview of TCP/IP protocol stack, packet filtering, stateful packet inspector, and application layer firewall. The presentation also discusses the role of routers in securing a system and provides references for further reading.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network
Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Security
Network security can be defined as the
protection used by the administrator of a
network from the unethical hackers and
crackers from accessing files, making changes
in the files of the system.
This is one of the key task that needs to be
done by everyone form securing the systems
from the dark side of the internet.
Document Page
Network
Protocols
Hardware provides only connections , but
network protocol helps to communicate.
Provides a predefined rule for the
interconnection of the hardware's.
Each hardware needs to be individually
ready for the connections in order to
communicate.
Protocol helps In secured closing of the
hardware connections.
Document Page
Network
Protocols
There are more than 100 types of
protocols in the computer systems.
The most important protocol is the
TCP/IP protocol stack (Fiterău-
Broştean, Ramon Janssen and
Vaandrager).
Provides a secured method for data
movement including the webpage
and file transfer.
The transfer layer protocol of the
TCP is responsible for the movement
of the data transfer packets.
Internet protocol is responsible for
routing the packets in the desired
destination.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network
Protocol
Each device in an Internet protocol has a set of four
number separated by periods , for the unique
identification of the device.
In the set of the number the first two number
describes the network where the device belongs to.
The last two set belongs to the unique identification
number of the device.
Some of the important network protocols in the
TCP/IP are HTTP, FTP, POP, SMTP, DHCP and the
DNS
Document Page
Firewalls and
securing
Access
1
A firewall can be
defined a
network security
which controls
the incoming and
outgoing
network traffic
based on
predefined rules.
2
There are two
different types of
firewalls ,
Hardware
specified and the
software
specified.
3
The hardware
specified firewall
protects the
device it is
attached to and
not the
networks.
4
Software
hardware
provides firewall
to the networks.
Document Page
Firewalls and
securing Access
The firewall examines the
data packets when it enters
of leaves the network ,in
accordance to the network
administrator.
Shields the device from the
direct access to the internet
hiding from hackers.
Can be configured with
different types of filters to
allow various kind of the
traffic.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Firewalls and
securing Access
Different types of the firewall.
1. Packet filtering : That is which
provides firewall against the
internet packets.
2. Stateful packet inspector : The
work of this is similar to the
packet filtering method but is
done in a through manner
(Selvi, Sankar and Umarani).
3. Application layer firewall: Under
this method not just only looks
at the meta data but also the
actual file that are transferred.
Document Page
Firewalls and
securing
Access
The firewall filters can be based on the IP
addresses , protocol types, domain
names and other criteria’s(Kaur,
Karamjeet, et al).
This is one of the key measures that
must be taken in order to get security
from the outside world of internet.
Firewall can also be used for the purpose
tunnelling that is , creating secured
connections between two computers.
Document Page
Securing a
system with
hardware
This is the similar concept to the
hardware firewalls (Shim et al).
The routers that are used In the
homes are one of the best
example of this.
The router acts as a firewall and
blocks the network traffic.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Securing a
system with
hardware
In many router providing firewall
is a default setting and cannot
be over ridden.
Can be configured to provide
more secured access.
Can be used for avoiding
unknown email attachments.
Document Page
References
Kaur, Karamjeet, et al. "Programmable firewall using software defined
networking." Computing for Sustainable Global Development (INDIACom), 2015
2nd International Conference on. IEEE, 2015.
Selvi, V., R. Sankar, and R. Umarani. "The design and implementation of on-line
examination using firewall security." IOSR Journal of Computer Engineering 16.6
(2014): 20-24.
Fiterău-Broştean, Paul, Ramon Janssen, and Frits Vaandrager. "Learning fragments
of the TCP network protocol." International Workshop on Formal Methods for
Industrial Critical Systems. Springer, Cham, 2014.
Shim, Kyusung, Nhu Tri Do, and Beongku An. "The Impact of Hardware
Impairments and Imperfect Channel State Information on Physical Layer
Security." Journal of the Institute of Electronics and Information Engineers53.4
(2016): 79-86.
Document Page
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]