Network Security


Published on

An overview on Network Security

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Network Security

  1. 1. Network Security Omonigho Palmer-Ikuku , Security+, MCSE: Security, CCNA
  2. 2. Outline <ul><li>Introduction </li></ul><ul><li>Extent of Network security </li></ul><ul><li>- Types of threats </li></ul><ul><li>- Types of network security attacks </li></ul><ul><li>Impact of Network security on companies and organizations </li></ul><ul><li>Strategies and Solutions </li></ul><ul><li>Implications and benefits of network security </li></ul><ul><li>Conclusion </li></ul>
  3. 3. Introduction <ul><li>What is a Network? </li></ul><ul><li>- a group of computers and devices interconnected by communication equipments, software, hardware and paths </li></ul>
  4. 4. Introduction (cont’d) <ul><li>Why Network security? </li></ul><ul><li>- a survey which shows that 85 percent of organizations that responded to the survey discovered breaches in their network security </li></ul><ul><li>What is a Network Security? </li></ul><ul><li>- all activities that organizations, individuals, and institutions takes to protect computers assets, data and instill integrity and continuity of operations </li></ul><ul><li>The CIA abbreviation </li></ul><ul><li>- Confidentiality: safeguarding of information from unauthorized disclosure </li></ul><ul><li>- Integrity: safeguarding delicate data from alterations without authorization </li></ul><ul><li>- Availability: certify that services are available to endorsed users only </li></ul><ul><li>The reverse of confidentiality, integrity, and availability is disclosure, alteration, and destruction (D.A.D.). </li></ul>
  5. 5. Extent of Network security <ul><li>Other Important Concepts </li></ul><ul><li>- Authenticity: guarantees that data, transactions are unadulterated </li></ul><ul><li>- Authorization: rights and permission given to individuals to use computers </li></ul><ul><li>- Identification: Is the way to identify users of a system </li></ul><ul><li>Larger companies and larger networks are at greater network security risk compared to smaller companies and smaller networks </li></ul><ul><li>The internet as a medium for doing business and its consequences </li></ul><ul><li>The effect of breach in information security is usually very horrific </li></ul>
  6. 6. Extent of Network security (cont’d) <ul><li>Types of network security threats </li></ul><ul><li>- Malware: Gotten from two words malicious and software, it’s a </li></ul><ul><li> software that is built to destroy computers </li></ul><ul><li>- Social Engineering: a subset of information security is a nontechnical method of hacking into a system or network </li></ul><ul><li>- Malicious Insiders: more delicate data and records are lost when a there is a network security attack by an insider </li></ul><ul><li>- Careless Employees: poor training for employees and lack of knowledge on the necessary network security policies </li></ul><ul><li>Types of network security attacks </li></ul><ul><li>- Passwords attacks: dictionary attacks and brute-force. The use of strong passwords is highly recommended </li></ul><ul><li>- IP Address Spoofing: hackers can change the IP address of computers during communication and access networks </li></ul><ul><li>- Denial-of-Service: attackers denies authorized users access to the network by send unwanted traffic to the network </li></ul><ul><li>- Packet Sniffer: analyze, display, capture and read network data exchanges and packets </li></ul>
  7. 7. Impact of Network security on companies and organizations <ul><li>UK businesses (53%) that suffered security incidents were able to restore normal business operations within a day </li></ul><ul><li>The rank of information security in the list of executives meetings is increasing </li></ul><ul><li>Whenever there is a breach in internet security on a company, transactions reduces </li></ul><ul><li>Negative reaction on the price of the stock </li></ul><ul><li>Due to the rise of blogs and social technologies, there is more work to secure networks </li></ul><ul><li>Improper disposal of computer devices and unused documents can be harmful </li></ul>
  8. 8. Strategies and Solutions <ul><li>Virtual private network (VPN)- links are provided between nodes to provide remote users secured access to their intended network </li></ul><ul><li>Cryptography- a subset of encryption, data is transformed into an unreadable format </li></ul><ul><li>Secure Sockets Layer (SSL)- now known as Transport Layer Security (TLS) is used to provide data integrity and security over the internet </li></ul><ul><li>Hypertext Transfer Protocol Secure (HTTPS)- is a combination of http and a network security protocol </li></ul>
  9. 9. Strategies and Solutions (cont’d) <ul><li>Computer viruses- ability to spread makes it easy to exploit security vulnerabilities </li></ul><ul><li>Firewalls- serves as a shield for intruders </li></ul><ul><li>Intrusion detection systems (IDS)- used to detect unauthorized access, monitor and audit networks </li></ul><ul><li>Penetration test- process of testing the security measures of a computer network </li></ul>
  10. 10. Strategies and Solutions (cont’d) <ul><li>Backup- copy data into another location </li></ul><ul><li>Business continuity planning (BCP)- organization wide plan that depicts how an organization will recover from interruptions </li></ul><ul><li>Disaster recovery plan (DRP)- an IT related infrastructure recovery </li></ul><ul><li>Appropriate use of portable storage devices </li></ul><ul><li>Physical security- closed-circuit television cameras, access control systems </li></ul>
  11. 11. Implications and benefits of network security <ul><li>With the increase in awareness, there is more persuasion from companies </li></ul><ul><li>Security policy- document that states the rules related to security that governs an organization </li></ul><ul><li>Even home computer users are a part of the crusade </li></ul><ul><li>Possessing the right education is also very important </li></ul><ul><li>- CCIE security, CISSP, Comptia Security+, and CCSP </li></ul><ul><li>- courses in universities, information from journals and magazines </li></ul>
  12. 12. Conclusion <ul><li>Regular auditing of IT infrastructure, regular penetration test and periodic examination of the company’s BCP </li></ul><ul><li>Adequate network security enhances its reputation, protects stakeholder’s valuable information </li></ul><ul><li>Network security starts with actions from individual </li></ul><ul><li>It’s not a product, it's a process </li></ul><ul><li>Network security is the responsibility of everyone. It is better to prevent threats than to get rid of </li></ul>