Networking Infrastructure       & Security<br />Topic :<br /><ul><li>What is the impact of security on network ...
What are the main characteristics of VLANs</li></ul>Presented by: Kerry-Ann Cole<br />
Introduction <br />Network security involves all activities that organizations, enterprises, and institutions undertake to...
Threats to network security include:<br />Viruses : Computer programs written by devious programmers and designed to repli...
Network security tools include:<br />Antivirus software packages : These packages counter most virus threats if regularly ...
Network security tools include:<br />Virtual private networks : These networks provide access control and data encryption ...
Two Approaches to Security<br />Open Door <br />     Is a type of security, in which you grant everyone access to everythi...
Physical Security: Locking Your Doors<br />The first level of security in any computer network is physical security.<br />...
Securing User Accounts<br />Properly configured user accounts can prevent unauthorized users from accessing the network, e...
Here Are Some Ways In Which You Can Strengthen Users Account <br />Your usernames<br />Using passwords wisely<br />
Server Password Settings<br />
Summary Of Passwords<br />Passwords must be at least five characters in length. A mixture of numbers and letters provides ...
Securing the Administrator account<br />At least one network user must have the authority to use the network without any o...
Hardening Your Network<br />Using a Firewall<br />Disabling unnecessary services<br />Patching your servers<br />
Securing Your Wireless Network<br />Use encryption<br />Use anti-virus and anti-spyware software, and a firewall<br />Turn...
The Impact of Network Security <br />Improved productivity<br />Enhanced control <br /> Improved usage of IT resources<br ...
VLANs: Virtual Local Area Network<br />VLANs support logical grouping of network nodes to reduce broadcast traffic and all...
Upcoming SlideShare
Loading in …5
×

Networking infrastructure

643 views
592 views

Published on

Network security

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
643
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
38
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Networking infrastructure

  1. 1. Networking Infrastructure & Security<br />Topic :<br /><ul><li>What is the impact of security on network functionality?
  2. 2. What are the main characteristics of VLANs</li></ul>Presented by: Kerry-Ann Cole<br />
  3. 3. Introduction <br />Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. <br />An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.<br />P@$$W0RD<br />
  4. 4. Threats to network security include:<br />Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event<br />Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games<br />Attacks : Including investigation attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); <br />Data interception : Involves eavesdropping on communications or altering data packets being transmitted<br />Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords<br />
  5. 5. Network security tools include:<br />Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.<br />Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management.<br />Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.<br />
  6. 6. Network security tools include:<br />Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data. <br />Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.<br />Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.<br />
  7. 7. Two Approaches to Security<br />Open Door <br /> Is a type of security, in which you grant everyone access to everything by default and then place restrictions just on those resources to which you want to limit access.<br />Close Door<br /> Is a type of security, in which you begin by denying access to everything and then grant specific users access to the specific resources that they need.<br />
  8. 8. Physical Security: Locking Your Doors<br />The first level of security in any computer network is physical security.<br />Physical Guide Lines to Protect the Server<br />✦ Lock the computer room.<br />✦ Give the key only to people you trust.<br />✦ Keep track of who has the keys.<br />✦ Disable the floppy drive on the server. <br />
  9. 9. Securing User Accounts<br />Properly configured user accounts can prevent unauthorized users from accessing the network, even if they gain physical access to the network.<br />
  10. 10. Here Are Some Ways In Which You Can Strengthen Users Account <br />Your usernames<br />Using passwords wisely<br />
  11. 11. Server Password Settings<br />
  12. 12. Summary Of Passwords<br />Passwords must be at least five characters in length. A mixture of numbers and letters provides the greatest security; however, this is not required. <br />Passwords must be unique. You cannot use the same password twice. <br />Passwords must be changed every 60 days. The computer will prompt you and allow for grace logons<br />
  13. 13. Securing the Administrator account<br />At least one network user must have the authority to use the network without any of the restrictions imposed on other users.<br />This user is called the administrator.<br /> Anyone who knows the default administrator username and password can access your system with full administrator rights and privileges, thus bypassing the security restrictions that you so carefully set up.<br />
  14. 14. Hardening Your Network<br />Using a Firewall<br />Disabling unnecessary services<br />Patching your servers<br />
  15. 15. Securing Your Wireless Network<br />Use encryption<br />Use anti-virus and anti-spyware software, and a firewall<br />Turn off identifier broadcasting.<br />Allow only specific computers to access your wireless network.<br />
  16. 16. The Impact of Network Security <br />Improved productivity<br />Enhanced control <br /> Improved usage of IT resources<br />Utmost protection as well as security of data.<br /> Acceptance of a good network security system also ensures that only right personnel have the right level of access.<br />
  17. 17. VLANs: Virtual Local Area Network<br />VLANs support logical grouping of network nodes to reduce broadcast traffic and allow more control in implementing security policies.<br />
  18. 18. Characteristics of VLANS<br />Reduce the amount of broadcast traffic a network<br />Each VLAN operates as separate local area network<br />Members of a VLAN can only talk to other members of the same VLAN<br />Traffic that needs to go between different VLANS is processed through a routing function in the managed switch.<br />

×