Network Security powerpoint
Network Security powerpoint
Learning intention
We are learning about security issues relating to networks.
Success Criteria :
I will be successful when I can describe:
• Hardware and software security.
• What are the threats to data and what are the series of
safeguards to protect data.
• Deliberate, accidental and event-based threats.
• Protocols/ standards commonly used on network.
1
What is a Computer
Network?
2
What is Network
Security?
• Network security is composed of hardware
(Biometrics) and software (Norton security,
firewall) components designed to protect
the data and information being processed on
the network.
• Additionally, these components provide
preventative measures setup to protect the
network infrastructure, and its data from
unauthorized access, data modification,
corruption, and improper disclosure.
• Ultimately, network security is designed to
create a secure environment where users of
computers, software programs, and mobile
applications can perform computer or digital
activities free of network vulnerabilities.
3
What Is Network Security ?
Network Security:
The practice of
preventing and
mitigating attacks on
computer systems
and networks.
4
In Other Words,
Network security is the work you do:
• To protect computers, servers,
mobile devices, electronic
systems, networks, and the
information on them...
• From being used in ways other
than how they were
designed/intended to be used...
• Or to minimize the damage when
that happens.
Why Do We
Need Network
Security?
(Cybersecurity)
Watch the video: https://www.youtube.com/watch?v=sdpxddDzXfE
The video gives the background for why the Internet was
built in an insecure way, and briefly describes some types of
security threats (03:30)
•Every piece of technology is designed, built, and
Network maintained by people.
people
7
What is an Attack?
(in cybersecurity terms)
Cyber Attack: An
attempt to make a
computer, system,
or other resources:
Do something for
Do something it
someone it wasn’t
wasn’t meant to, or
meant to
8
Cyber Attack?
9
Common Network
Vulnerabilities
11
Computer Virus
Besides a direct attack on a network, computer viruses are the
most worrisome.
“A computer virus is a software program downloaded to your
network then executing without your knowledge”.
All computer viruses are man-made and are designed to
replicate themselves once released on a network. Most virus
forms constitute a danger to the network and can quickly
engage available memory and eventually bring the network to a
grinding halt. Viruses are also capable of transmitting itself
across networks avoiding existing network security systems.
13
Limiting Network Vulnerabilities
• Network security engineers and other computer experts agree that eliminating any
and all security threats to a network is not likely, however, there are several
security prevention measures that can be taken to protect our networks. The list
below should not be considered all-inclusive but provides a solid foundation for
good network security practices.
– Create security policies and enforce them
– Do not globally share resources and folders
– Educate users on how to recognize a security threat
– Establish network security monitoring practices
– Explain phishing and social engineering scams to all users
– Keep system software updated
– Limit administrator and user system privileges
– Purchase and install anti-virus software
– Perform a virus scan on downloaded programs before installing
– Take corrective measures before, and after an attack regardless of its
nature
– Use good password construction and require frequent password
replacement
SECURITY MEASURES
Security measures need to be taken to protect data and
information:
1. Use of Hardware and software to secure data online
2. Username and password
3. Firewall
4. Encryption
1. Use of Hardware and software to secure data online
Hardware security
Hardware security protects the machine and peripheral hardware from
theft and from electronic intrusion and damage. A hardware risk
originates from an outdated or particular piece of hardware. Hardware
risks are more vulnerable to crashes or physical damage, such as an
old hard drive is a big risk because of its age.
Software security
Software security provides barriers and other cyber-tools that protect
programs, files, and the information flow to and from a computer. For
instance, antivirus software such as Norton security.
16
2. Username and password
A: golf77
B: r@3m3_st3v3ns (P@55w0rd)
C: E5%@#**??
• Password: golf77
• Approximate Cracking Time: 15
Seconds
• Password: gr@3m3_st3v3ns
• Approximate Cracking Time: 35
Answer Minutes
• E5%@#**??
• Approximate Cracking Time: 55
Minutes
A firewall is a software or hardware device
that inspects incoming and outgoing
traffic on a network. Based on a
predetermined set of policies and rules, or an
access control list (ACL), the firewall filters
and restricts all connections that do not abide
by those rules. The main purpose of a firewall
is to separate trusted networks from the
external network or the internet.
3. Firewall
20
4. What is encryption?
• Encryption in cyber security is the conversion of
data from a readable format into an encoded
format. Encrypted data can only be read or
processed after it's been decrypted. Encryption is
the basic building block of data security.
21
Biometrics is an automated method of recognizing a person based on
behavioral or physiological characteristics. This means that a computer
system recognizes a user without using a password. This is an attractive
option since there are many security risks associated with passwords, in
addition to the challenge of having to remember dozens of different
passwords.
A biometric system requires that the particular characteristic of a person is
first recorded. This information is then stored and associated with a
particular user. Then the system becomes operational, and every time a
user wants to access the system, the particular characteristic is measured
and compared to the stored information.
• Biometric identification methods include the following:
Physical Security or – Fingerprint recognition - This relies on matching the unique
Biometrics print patterns found on one or more fingers. This is probably
the most widely used biometric identification method in use
today.
– Facial recognition - This compares selected facial features from
a digital image to a facial database. This approach is widely
used in surveillance but can also be used for security
purposes.
– Eye iris recognition - This analyzes the complex and unique
patterns of the irises of an individual's eyes using visible or
near infrared light. This system is widely used for border
crossings in several countries.
– Other types of biometrics include voice analysis, handwriting
and signature analysis.
22
• Effective network security practices are
critical for maintaining the integrity of our
information systems and home networks. As
discussed, individuals responsible for
networks, either public or private, must
eliminate network security vulnerabilities on
their networks by recognizing security threats
Lesson as they occur, eradicate those threats, and re-
establish network security as quickly as
Summary possible following the attack. If left
unchecked, networks are open to a variety
of computer viruses and hacker assaults.
Although eliminating all security threats is not
likely, there are numerous security practices
you can use, such as strong passwords,
keeping software updated, and installing anti-
virus software.
23
Homework
Complete the ‘System Security’ quiz on Study.com. Click the below link to
access to the quiz:
https://study.com/academy/practice/quiz-worksheet-classifications-of-systems-
security.html?format=print
24