0% found this document useful (0 votes)
4 views

Network Security

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Network Security

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

NETWORK

SECURITY
PRESENTED BY GROUP 1 & 5 (10-TRIAS)
KEY 1 Network Security

FEATURES 2
Importance of Security in
Computer System and Network

3
Security Attacks

4 Security Procedures

5 Virus Protection Software

6 Data Encryption

7 Port Protection
NETWORK SECURITY
Understanding computer and network
security is critical. Without proper security
measures, sensitive information like
private data, company secrets, and
national security items could be
compromised, affecting individuals,
organizations, and the public.
IMPORTANCE OF SECURITY IN COMPUTER
SYSTEM AND NETWORK

Computer and network security is important


for protecting data and equipment by
restricting access to unknown persons. All
members of the organization must prioritize
security, because these can lead to theft,
loss, intrusion into a network, and can have
physical damage, which will ultimately affect
and cause costs.
IMPORTANCE OF SECURITY IN COMPUTER
SYSTEM AND NETWORK

Technicians play an important role that must


be knowledgeable and responsible for
maintaining security, because they are
informed and responsible for higher levels of
sensitivity, such as configuring network
settings., applying software updates, and
installing security tools. They can also teach
users the right do's or don'ts regarding
security.
SECURITY ATTACKS

• PHYSICAL - Events or attacks that steals,


damage, or destroy such equipments as
servers, switches and wiring
• DATA - Events or attacks that remove, corrupt,
deny access to, allow access to, or steal
information
1.INTERNAL - Employees who have
access to data, equipment, and the
network
• Malicious Threats - when an employee
intends to do damage

• Accidental Threats - when a user


damages data or equipments
unintentionally
2. EXTERNAL - Users outside an
organization who do not have
authorized access to the network
or resources
• Unstructed Attacks - Use available resources
such as password or scripts, to gain access to
and run programs designed to vandalize
• Structed Attacks - Use code to access
operating systems and software
VIRUSES, WORMS, AND
TROJAN HORSES
• Viruses
Viruses attach to files
and spread through email, file transfers, or instant
messaging. They can corrupt or delete data, spread
to other computers, and even erase hard drives.
Some viruses can record keystrokes to steal
sensitive information.
VIRUSES, WORMS, AND
TROJAN HORSES
• WORMS
Worms are self-replicating
programs that spread through
networks, consuming bandwidth
and potentially damaging data or
applications. Unlike viruses, they
don't need to attach to other
programs.
VIRUSES, WORMS, AND
TROJAN HORSES
• Trojan horses
trojan horses are disguised as useful software but
contain malicious code. They can replicate like
viruses, spread to other computers, and cause
data damage or production loss. They can also
steal sensitive information or infect other
computers on the network.
SECURITY PROCEDURES
• USE SECURITY PLAN
• UPDATE SECURITY PLAN
REGULARLY
• SECURITY PLAN SHOULD BE
REVIEWED EACH YEAR
• TESTING SHOULD BE ON A
REGULAR BASIS
VIRUS PROTECTION
SOFTWARE
known as antivirus software, is software designed
to detect, disable, and remove viruses, worms, and
Trojans before they infect a computer. Antivirus
software becomes outdated quickly, however. The
technician is responsible for applying the most
recent updates, patches, and virus definitions as
part of a regular maintenance schedule. Many
organizations establish a written security policy
stating that employees are not permitted to install
any software that is not provided by the company.
DATA ENCRYPTION

Encrypting data involves using codes and ciphers.


Data encryption can help prevent attackers from
monitoring or recording traffic between resources
and computers. It may not be possible to decipher
encrypted data in time to make any use of it. A
security alert may inform you that you are using an
encrypted connection.
VIRTUAL
PRIVATE NETWORK
A virtual private network (VPN) is an
encryption system that protects data as
though it resides on a private network. The
data actually travels over the Internet or
another unsecured public network.
PORT
PROTECTION
Every communication using TCP/IP is associated with a port
number. HTTPS, for instance, by default uses port 433. A
firewall is a way of protecting a computer from intrusion
through the ports.

With port protection,the user can control the type of data sent
to a computer by selecting which ports will be open and
which will be secured. Data being transported on a network is
called traffic.
let us thrive in a secure cyberspace!

#CYBER TIWALA
#CYBER HANDA
#CYBER TATAG
THANK YOU FOR
LISTENING!
Data privacy is a human right, and it
belongs to you.
Lock it down, protect it up, and block the
hackers.
Secure your cyberspace, secure your
#87000 Gov. Ferrer Memorial INHS
digital life.
Group 1 and Group 5

You might also like