0% found this document useful (0 votes)
11 views

Introduction to information security lecture 1 security

Uploaded by

nawalasmat22
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Introduction to information security lecture 1 security

Uploaded by

nawalasmat22
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Introduction to

network security
CREATED BY NAQSH MALIK
What is network security?

 Network security refers to the technologies, policies, people,


and procedures that defend any communication
infrastructure from cyberattacks, unauthorized access,
and data loss. In addition to the network itself, they also secure
traffic and network-accessible assets at both the network edge
and inside the perimeter.
Why is network security
important?
 It can protect your data, help prevent costly data
breaches, and improve network performance. It's crucial to
take network security seriously to keep your business from a
possible breach that could be costly and damaging.
What describes network security?

 Network security is any activity designed to protect the


usability and integrity of your network and data. It includes
both hardware and software technologies.
Three basic security concepts important to
information on the internet are

 Confidentiality
 integrity
 availability.
Confidentiality

 Network security is any activity designed to protect the


usability and integrity of your network and data. It includes
both hardware and software technologies. It targets a variety of
threats. It stops them from entering or spreading on your
network. Effective network security manages access to the
network.
integrity

 Integrity in cyber security means data is complete,


trustworthy and has not been modified or accidentally
altered by an unauthorised user. The integrity of data can be
compromised unintentionally by errors in entering data, a system
malfunction, or forgetting to maintain an up-to-date backup
availability.

 Availability means guaranteeing reliable access to


information by authorised personnel. In order to be readily
accessible, data must be stored in a logical yet secure system.
High availability aids rapid business processing and ultimately
benefits your organisation.
The most common network security
threats include malware and a range of
other cyberattacks
 Phishing. Phishing is a social engineering attack designed to
induce the recipient of a message to take some action. ...
 Ransomware. Ransomware has emerged as one of the top
malware threats of recent years. ...
 DOS and DDoS Attacks. ...
 Trojans.
 Man in the middle
Phishing attacks

 Phishing attacks are the practice of sending fraudulent


communications that appear to come from a reputable
source. It is usually done through email. The goal is to steal
sensitive data like credit card and login information, or to install
malware on the victim's machine.
Ransomware

 Ransomware is a type of malware that locks and encrypts a


victim's data, files, devices or systems, rendering them
inaccessible and unusable until the attacker receives a
ransom payment. The first iterations of ransomware used only
encryption to prevent victims from accessing their files and
systems.
denial-of-service (DoS)

 A denial-of-service (DoS) attack is a cyberattack on devices,


information systems, or other network resources that
prevents legitimate users from accessing expected
services and resources. This is usually accomplished by
flooding the targeted host or network with traffic until the target
can't respond or crashes.
DDoS Attack

 DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack"


and it is a cybercrime in which the attacker floods a server
with internet traffic to prevent users from accessing
connected online services and sites.
Man in the middle

 A man-in-the-middle (MitM) attack is a type of cyber attack in


which the attacker secretly intercepts and relays
messages between two parties who believe they are
communicating directly with each other. The attack is a type
of eavesdropping in which the attacker intercepts and then
controls the entire conversation.
Below are some key strategies that
network administrators should
consider
 Regular Security Audits. ...
 Strong Authentication and Access Controls. ...
 Encryption and Data Protection. ...
 Network Segmentation. ...
 Employee Training and Awareness. ...
 Continuous Monitoring and Incident Response.

You might also like