0% found this document useful (0 votes)
81 views

Network Security

The document discusses network security. It defines network security as the policies and practices adopted to prevent unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It covers a variety of computer networks used in everyday jobs, conducting transactions, and communications. Network security involves authorizing access to data and is controlled by the network administrator.

Uploaded by

Surajit Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Network Security

The document discusses network security. It defines network security as the policies and practices adopted to prevent unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It covers a variety of computer networks used in everyday jobs, conducting transactions, and communications. Network security involves authorizing access to data and is controlled by the network administrator.

Uploaded by

Surajit Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Presentation on-

NETWORK SECURITY
Team Members:-

 SURAJIT SINGHA and SUDEEP CH. CHANDA

BCA 5th SEM


CONTENTS-

• Introduction.
• Definition.
INTRODUCTION
Network security consists of the policies and practices adopted
to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-
accessible resources .
Network security covers a variety of computer networks, both
public and private, that are used in everyday jobs; conducting
transactions and communications among businesses,
government agencies and individuals .
Network security is involved in organizations, enterprises, and
other types of institutions. It does as its title explains: It secures
the network, as well as protecting and overseeing operations
being done .
Network security involves the authorization of access to data in
a network, which is controlled by the network administrator .
Network security is an over-arching term
that describes that the policies and
procedures implemented by a network
administrator to avoid and keep track of
unauthorized access, exploitation,
modification, or denial of the network
and network resources.
 This means that a well-implemented
network security blocks viruses,
malware, hackers, etc. from accessing
or altering secure information.
 Antivirus and Antimalware Software.

 Application Security.

 Email Security.

 Firewalls.

 Virtual Private Network (VPN).


ANTIVIRUS AND ANTIMALWARE SOFTWARE
 This software is used for protecting against
malware, which includes spyware, worms,
and viruses.

 This software handles this threat by scanning


for malware entry and regularly tracks files
afterward in order to detect anomalies,
remove malware, and fix damage.
APPLICATION SECURITY.
 Application security thus encompasses the
software, hardware, and processes you select
for closing those holes.

 It is important to have an application security


since no app is created perfectly.
 Email gateways are considered to be the number one threat
vector for a security breach.

 An email security application is capable of blocking


incoming attacks and controlling outbound messages in order
to prevent the loss of sensitive data.
 Firewalls place a barrier between our trusted internal
network and untrusted outside networks, like the Internet.

 A firewall can be software, hardware, or both. The free


firewall efficiently manages traffic on our PC, monitors
in/out connections, and secures all connections when we are
online.
A VPN is another type of network security capable of
encrypting the connection from an endpoint to a network,
mostly over the Internet.

A remote-access VPN typically uses IPsec or Secure Sockets


Layer in order to authenticate the communication
between network and device.
 Cryptography involves creating written or generated
codes that allow information to be kept secret.
 Cryptography converts data into a format that is
unreadable for an unauthorized user, allowing it to be
transmitted without unauthorized entities decoding it
back into a readable format, thus compromising the
data.
 Information security uses cryptography on several
levels. The information cannot be read without a key
to decrypt it.
 The information maintains its integrity during transit
and while being stored.`
 Symmetric key Cryptography.

 Asymmetric key Cryptography.


 An encryption system in which the sender and receiver of a
message share a single, common key that is used to encrypt
and decrypt the message.
 Symmetric-key systems are simpler and faster.
 Symmetric-key cryptography is sometimes called secret-key
cryptography.
 The most popular symmetric-key system is the Data
Encryption Standard (DES).
 Asymmetric cryptography , also known as public key
cryptography , uses public and private keys to encrypt and
decrypt data.
 One key in the pair can be shared with everyone ; it is called the
public key. The other key is kept secret ; it is called the private
key.

You might also like