0% found this document useful (0 votes)
2 views

Network Security powerpoint

The document outlines the importance of network security, which involves hardware and software measures to protect data from unauthorized access and various threats. It discusses common vulnerabilities and security threats, such as cyber attacks and computer viruses, while emphasizing the need for preventative measures like strong passwords, firewalls, and encryption. Effective network security practices are crucial for maintaining the integrity of information systems and mitigating risks associated with digital activities.

Uploaded by

aiza.siraje99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Network Security powerpoint

The document outlines the importance of network security, which involves hardware and software measures to protect data from unauthorized access and various threats. It discusses common vulnerabilities and security threats, such as cyber attacks and computer viruses, while emphasizing the need for preventative measures like strong passwords, firewalls, and encryption. Effective network security practices are crucial for maintaining the integrity of information systems and mitigating risks associated with digital activities.

Uploaded by

aiza.siraje99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Network Security

Learning intention
We are learning about security issues relating to networks.

Success Criteria :
I will be successful when I can describe:
• Hardware and software security.
• What are the threats to data and what are the series of
safeguards to protect data.
• Deliberate, accidental and event-based threats.
• Protocols/ standards commonly used on network.

1
What is a Computer
Network?

• A computer network is composed of two


or more computers (nodes), and assorted
peripheral devices that, once connected
electronically, enable the user to:
– Share resources
– Send and receive data across
networks locally and world-wide
– Store data locally or on the cloud

2
What is Network
Security?
• Network security is composed of hardware
(Biometrics) and software (Norton security,
firewall) components designed to protect
the data and information being processed on
the network.
• Additionally, these components provide
preventative measures setup to protect the
network infrastructure, and its data from
unauthorized access, data modification,
corruption, and improper disclosure.
• Ultimately, network security is designed to
create a secure environment where users of
computers, software programs, and mobile
applications can perform computer or digital
activities free of network vulnerabilities.

3
What Is Network Security ?

Network Security:
The practice of
preventing and
mitigating attacks on
computer systems
and networks.

4
In Other Words,
Network security is the work you do:
• To protect computers, servers,
mobile devices, electronic
systems, networks, and the
information on them...
• From being used in ways other
than how they were
designed/intended to be used...
• Or to minimize the damage when
that happens.
Why Do We
Need Network
Security?
(Cybersecurity)
Watch the video: https://www.youtube.com/watch?v=sdpxddDzXfE

The video gives the background for why the Internet was
built in an insecure way, and briefly describes some types of
security threats (03:30)
•Every piece of technology is designed, built, and
Network maintained by people.

security is •People also use and operate the technology.

about •These people are the stakeholders in that technology.

people
7
What is an Attack?
(in cybersecurity terms)

Cyber Attack: An
attempt to make a
computer, system,
or other resources:

Do something for
Do something it
someone it wasn’t
wasn’t meant to, or
meant to

8
Cyber Attack?

9
Common Network
Vulnerabilities

Security threats are everywhere, and their effectiveness depends on how


vulnerable a computer network is. In this context, vulnerability is identified as
a flaw in our security which permits an assault on network resources. If
left unchecked, network security vulnerabilities leave the network open for a
variety of computer viruses, and various types of hacker assaults.

What is network security vulnerability?


Watch the video: https://www.youtube.com/watch?v=2VaPTIuRs4k&t=162s
Common network threats
include:
1. Inappropriate Material
2. Cyberbullying
3. Online Predators
What are 4. Sharing Personal Information
5. Email, IM & Chatrooms
network 6. Sharing Pictures & Videos
7. Cell Phones & Wi-Fi Gadgets

threats? 8. Social Network Sites


9. Online Gaming
10. Viruses, Malware & Adware

11
Computer Virus
Besides a direct attack on a network, computer viruses are the
most worrisome.
“A computer virus is a software program downloaded to your
network then executing without your knowledge”.
All computer viruses are man-made and are designed to
replicate themselves once released on a network. Most virus
forms constitute a danger to the network and can quickly
engage available memory and eventually bring the network to a
grinding halt. Viruses are also capable of transmitting itself
across networks avoiding existing network security systems.

https://www.youtube.com/watch?v=Ip-u5NZJiwY (0.00 - 2.33 ,


5.11- 6.35)
The table below identifies several common security
Common threats by name and provides a brief description of
each.
Security
Threats

13
Limiting Network Vulnerabilities

• Network security engineers and other computer experts agree that eliminating any
and all security threats to a network is not likely, however, there are several
security prevention measures that can be taken to protect our networks. The list
below should not be considered all-inclusive but provides a solid foundation for
good network security practices.
– Create security policies and enforce them
– Do not globally share resources and folders
– Educate users on how to recognize a security threat
– Establish network security monitoring practices
– Explain phishing and social engineering scams to all users
– Keep system software updated
– Limit administrator and user system privileges
– Purchase and install anti-virus software
– Perform a virus scan on downloaded programs before installing
– Take corrective measures before, and after an attack regardless of its
nature
– Use good password construction and require frequent password
replacement
SECURITY MEASURES
Security measures need to be taken to protect data and
information:
1. Use of Hardware and software to secure data online
2. Username and password
3. Firewall
4. Encryption
1. Use of Hardware and software to secure data online

Hardware security
Hardware security protects the machine and peripheral hardware from
theft and from electronic intrusion and damage. A hardware risk
originates from an outdated or particular piece of hardware. Hardware
risks are more vulnerable to crashes or physical damage, such as an
old hard drive is a big risk because of its age.

Software security
Software security provides barriers and other cyber-tools that protect
programs, files, and the information flow to and from a computer. For
instance, antivirus software such as Norton security.

16
2. Username and password

• Combination of username and password is one of the most widely ised


security controls
When creating a password, think beyond words or numbers that a cybercriminal
could easily figure out, like your birthday. It’s also better to create a unique
password instead of using the same password across multiple sites—a password
manager tool can help you keep track. Choose combinations of lower and upper-
case letters, numbers, and symbols and change them periodically.
• Some information system require users to create a password that meets
particular requirements. For instance, the password must
• Be at least 8 digits long
• Contain at least one upper case letter
• Contain at least one lower case letter
• Contain at least one number
• Contain at least one special character
Activity: Which of
the following is the
safest password?
Which password is stronger

A: golf77

B: r@3m3_st3v3ns (P@55w0rd)

C: E5%@#**??
• Password: golf77
• Approximate Cracking Time: 15
Seconds

• Password: gr@3m3_st3v3ns
• Approximate Cracking Time: 35
Answer Minutes

• E5%@#**??
• Approximate Cracking Time: 55
Minutes
A firewall is a software or hardware device
that inspects incoming and outgoing
traffic on a network. Based on a
predetermined set of policies and rules, or an
access control list (ACL), the firewall filters
and restricts all connections that do not abide
by those rules. The main purpose of a firewall
is to separate trusted networks from the
external network or the internet.
3. Firewall

20
4. What is encryption?
• Encryption in cyber security is the conversion of
data from a readable format into an encoded
format. Encrypted data can only be read or
processed after it's been decrypted. Encryption is
the basic building block of data security.

• Encryption is a way of scrambling data so that only


authorized parties can understand the information.
In technical terms, it is the process of converting Ciphertext
human-readable plaintext to incomprehensible
text, also known as ciphertext. In simpler terms,
encryption takes readable data and alters it so that
it appears random. Encryption requires the use of
a cryptographic key: a set of mathematical values
that both the sender and the recipient of an
encrypted message agree on.

21
Biometrics is an automated method of recognizing a person based on
behavioral or physiological characteristics. This means that a computer
system recognizes a user without using a password. This is an attractive
option since there are many security risks associated with passwords, in
addition to the challenge of having to remember dozens of different
passwords.
A biometric system requires that the particular characteristic of a person is
first recorded. This information is then stored and associated with a
particular user. Then the system becomes operational, and every time a
user wants to access the system, the particular characteristic is measured
and compared to the stored information.
• Biometric identification methods include the following:
Physical Security or – Fingerprint recognition - This relies on matching the unique
Biometrics print patterns found on one or more fingers. This is probably
the most widely used biometric identification method in use
today.
– Facial recognition - This compares selected facial features from
a digital image to a facial database. This approach is widely
used in surveillance but can also be used for security
purposes.
– Eye iris recognition - This analyzes the complex and unique
patterns of the irises of an individual's eyes using visible or
near infrared light. This system is widely used for border
crossings in several countries.
– Other types of biometrics include voice analysis, handwriting
and signature analysis.

22
• Effective network security practices are
critical for maintaining the integrity of our
information systems and home networks. As
discussed, individuals responsible for
networks, either public or private, must
eliminate network security vulnerabilities on
their networks by recognizing security threats
Lesson as they occur, eradicate those threats, and re-
establish network security as quickly as
Summary possible following the attack. If left
unchecked, networks are open to a variety
of computer viruses and hacker assaults.
Although eliminating all security threats is not
likely, there are numerous security practices
you can use, such as strong passwords,
keeping software updated, and installing anti-
virus software.

23
Homework

Complete the ‘System Security’ quiz on Study.com. Click the below link to
access to the quiz:

https://study.com/academy/practice/quiz-worksheet-classifications-of-systems-
security.html?format=print

24

You might also like