Network Security

  • 363 views
Uploaded on

 

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
363
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
53
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Network Security
  • 2. NetworkA network consists of two or more computers that arelinked in order to share resources (such as printers andCDs), exchange files, or allow electronic communications.The computers on a network may be linked throughcables, telephone lines, radio waves, satellites, etc.
  • 3. Computer NetworkA computer network is a type oftelecommunications network between dataprocessing nodes for the purpose of datacommunications. It is a communicationsnetwork between the computers.Theinterconnection of computers is accomplishedwith a variety of networking hardware.
  • 4. SecuritySecurity is the process of resistance to, or protection fromany harm. It applies to any vulnerable and valuable asset, suchas a person, community, nation, or organization.
  • 5. Network Security A specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy needed to protect a network and the resources from unauthorized access.
  • 6. Network ThreatsViruses : Computer programs written by maliciousprogrammers and designed to infect computers when triggeredby a specific event.Trojan horse programs : Destructive code, which is used toaffect a application.Vandals : Software applications that cause destruction.Attacks : Access attacks (which exploit network vulnerabilitiesin order to gain entry to e-mail, databases, or the corporatenetwork)Data interception : Altering data packets being transmitted.Social engineering : Obtaining confidential network securityinformation through non-technical means, such as posing as atechnical support person and asking for peoples passwords.
  • 7. Network security toolsAntivirus software packages : These packages restricts mostvirus threats if regularly updated and correctly maintained.Secure network infrastructure : Dedicated network securityhardware and software-Tools such as firewalls provide protectionfor all areas of the network and enable secure connections.Virtual private networks : These networks provide accesscontrol between two different computers on a network. This allowsremote workers to connect to the network without the risk of ahacker or thief intercepting data.Identity services : These services help to identify users andcontrol their activities and transactions on the network. Servicesinclude passwords, digital certificates, and digital authenticationkeys.Encryption : Encryption ensures that messages cannot be read orchanged by anyone other than the authorized recipient.
  • 8. Network Security ObjectivesProtect our :•Internet servers.•Internal network and systems.•Data.•Company image. And keep the data confidential.
  • 9. Advantages of Network Security•Protects personal data of clients on the network.•Protects information been shared between computers onthe network.•Protects the physical computers from harm based frompossible attacks on the network from the outside i.e. hackingattempts or virus attacks from the internet.•Protects confidential data of the organization from beingread or altered.
  • 10. Presented by:- SAYANTAN SUR BCA(H) –2nd SEM THANK YOU