UNIT-I Network Concepts

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 32

KLN COLLEGE OF ENGINEERING

DEPARTMENT OF CSE
(CYBER SECURITY)

20SC301
INTRODUCTION TO CYBER
SECURITY

Year: II
Semester: III
Academic Year: 2023 - T. SUGANYA, M.E.,
2024 AP-CSE(CS)/KLNCE
Overview
Unit-I - Basic Concepts
Types of attacks , virus threats
Unit-II - Cyber Space & Forensics
National Cyber security Policy
Forensic – Need, Analysis &
Investigation
Unit-III - Cyber crime, Mobile & Wireless
Devices
Credit card frauds, Security Registry
settings
Unit-IV - Cyber Security Organizational
Implications Social media marketing,
Terminologies
1. Computer Network & Types
2. OSI Layer Model
3. TCP/IP
4. Connecting Devices
5. WWW & Internet
6. Web Client ,Web Server
7. Session Tracking Cookies
8. Firewall
9. Information Security
10. Cyber Security
Computer Network
•A computer network consists of various kinds of
nodes. Servers, networking hardware, personal
computers
•connects numerous independent computers in
order to share information (data) and
resources.
Types of Networks
Open Systems Interconnect –Basic Reference Model
It divides Network architecture into 7 Layers
Application Layer
Providing services to the users
File Transfer, Mail Transfer, DB
sources
Presentation Layer
Translation
Encryption
Compression
Session Layer
Dialog control & Synchronization
Transport Layer
Delivery of message from one
process to another
Connection oriented or connection
less
Segmentation & Reassembly
Network Layer
Delivery of Packets from source
to destination host
IP Address (Logical Address)
Routing
Data Link Layer
Moves frames from one host to
another host via physical layer
MAC Address – Physical Address
Flow Control & Error Control
Physical Layer
Move data in the form of electro magnetic
signals
Move individual bits from one host to
another host – analog/digital form
Physical Topology
TCP/IP
Internet Protocol Suite : set of
communication protocols used for
Internet & other Networks
TCP : Transmission Control Protocol
IP:
◦ Internet Protocol
◦ Routable Protocol, IP Addressing,
Fragmentation & Reassembly
◦ Router & Gateways
Protocols Suits
Connecting Devices
Network Connecting
Devices
Router is another very popular
network device which is used for
internal networking. By router, we
can send data from one network to
another network

Gateway is being used to connect


different network. When a network
has different protocol

Network interface card is used to


establish connection among more
than two computers
Physical Layer
To establish a local area network,
we need a central device which
can connect all the computer is
called Hub
Repeater makes the signal more
strengthen. When we pass a
signal through a cable it becomes
weak after going a few distance
DataLink Layer
Bridge is also a network device
which can connect more than one
network
Switch allows us to interconnect
links to form a large networks
Internet & WWW
It connects millions of computers,
webpages, websites, and servers
world wide web is a collection of
all the web pages, and web
documents that you can see on
the Internet by searching their
URLs (Uniform Resource Locator)
on the Internet
Internet & WWW
Web Client
web client is an application that
communicates with a web server, using
Hypertext Transfer Protocol (HTTP). Ex:
Chrome, firefox,opera
Webservers
System in which the web server
software runs.
the web server is to store,
process and deliver web pages to
the users.
There are four leading web
servers − Apache, IIS
TCP & HTTP
Information Security
An information security expert
may develop the means of data
access by authorized individuals
Establish security measures to
keep information safe
Protects Information Asset,data
from unauthorized access
Provides Confidentiality, Integrity
& Availability
Cyber Security
Cybersecurity expert focuses on
protecting information from
cyberattacks
Protection of cyber space against
cyber threats & attacks
Web related security
Type of information security
Firewall
A Firewall is a network security device that
monitors and filters incoming and outgoing
network traffic based on an organization’s
previously established security policies
History
The Cybersecurity checking began in
the 1970s when researcher Bob
Thomas created a computer program
called Creeper that could move across
ARPANET’s network. Ray Tomlinson,
the innovator of email, wrote the
program Reaper, which chased and
deleted Creepers.
Reaper was the very first example of
checking a malware antivirus softwar
 first self-replicating program i.e.
Viruses
Refernces
 R2: Introduction to Computer Networks and Cyber security,
Chwan-Hwa (John) Wu, J. David Irwin, CRC Press T&F
Group,2013
https://cracklogic.com/installing-
complete-web-server-step-by-
step-on-windows-pc/

You might also like