Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Network Security

2,516 views

Published on

An overview on Network Security

  • Be the first to comment

Network Security

  1. 1. Network Security Omonigho Palmer-Ikuku , Security+, MCSE: Security, CCNA
  2. 2. Outline <ul><li>Introduction </li></ul><ul><li>Extent of Network security </li></ul><ul><li>- Types of threats </li></ul><ul><li>- Types of network security attacks </li></ul><ul><li>Impact of Network security on companies and organizations </li></ul><ul><li>Strategies and Solutions </li></ul><ul><li>Implications and benefits of network security </li></ul><ul><li>Conclusion </li></ul>
  3. 3. Introduction <ul><li>What is a Network? </li></ul><ul><li>- a group of computers and devices interconnected by communication equipments, software, hardware and paths </li></ul>
  4. 4. Introduction (cont’d) <ul><li>Why Network security? </li></ul><ul><li>- a survey which shows that 85 percent of organizations that responded to the survey discovered breaches in their network security </li></ul><ul><li>What is a Network Security? </li></ul><ul><li>- all activities that organizations, individuals, and institutions takes to protect computers assets, data and instill integrity and continuity of operations </li></ul><ul><li>The CIA abbreviation </li></ul><ul><li>- Confidentiality: safeguarding of information from unauthorized disclosure </li></ul><ul><li>- Integrity: safeguarding delicate data from alterations without authorization </li></ul><ul><li>- Availability: certify that services are available to endorsed users only </li></ul><ul><li>The reverse of confidentiality, integrity, and availability is disclosure, alteration, and destruction (D.A.D.). </li></ul>
  5. 5. Extent of Network security <ul><li>Other Important Concepts </li></ul><ul><li>- Authenticity: guarantees that data, transactions are unadulterated </li></ul><ul><li>- Authorization: rights and permission given to individuals to use computers </li></ul><ul><li>- Identification: Is the way to identify users of a system </li></ul><ul><li>Larger companies and larger networks are at greater network security risk compared to smaller companies and smaller networks </li></ul><ul><li>The internet as a medium for doing business and its consequences </li></ul><ul><li>The effect of breach in information security is usually very horrific </li></ul>
  6. 6. Extent of Network security (cont’d) <ul><li>Types of network security threats </li></ul><ul><li>- Malware: Gotten from two words malicious and software, it’s a </li></ul><ul><li> software that is built to destroy computers </li></ul><ul><li>- Social Engineering: a subset of information security is a nontechnical method of hacking into a system or network </li></ul><ul><li>- Malicious Insiders: more delicate data and records are lost when a there is a network security attack by an insider </li></ul><ul><li>- Careless Employees: poor training for employees and lack of knowledge on the necessary network security policies </li></ul><ul><li>Types of network security attacks </li></ul><ul><li>- Passwords attacks: dictionary attacks and brute-force. The use of strong passwords is highly recommended </li></ul><ul><li>- IP Address Spoofing: hackers can change the IP address of computers during communication and access networks </li></ul><ul><li>- Denial-of-Service: attackers denies authorized users access to the network by send unwanted traffic to the network </li></ul><ul><li>- Packet Sniffer: analyze, display, capture and read network data exchanges and packets </li></ul>
  7. 7. Impact of Network security on companies and organizations <ul><li>UK businesses (53%) that suffered security incidents were able to restore normal business operations within a day </li></ul><ul><li>The rank of information security in the list of executives meetings is increasing </li></ul><ul><li>Whenever there is a breach in internet security on a company, transactions reduces </li></ul><ul><li>Negative reaction on the price of the stock </li></ul><ul><li>Due to the rise of blogs and social technologies, there is more work to secure networks </li></ul><ul><li>Improper disposal of computer devices and unused documents can be harmful </li></ul>
  8. 8. Strategies and Solutions <ul><li>Virtual private network (VPN)- links are provided between nodes to provide remote users secured access to their intended network </li></ul><ul><li>Cryptography- a subset of encryption, data is transformed into an unreadable format </li></ul><ul><li>Secure Sockets Layer (SSL)- now known as Transport Layer Security (TLS) is used to provide data integrity and security over the internet </li></ul><ul><li>Hypertext Transfer Protocol Secure (HTTPS)- is a combination of http and a network security protocol </li></ul>
  9. 9. Strategies and Solutions (cont’d) <ul><li>Computer viruses- ability to spread makes it easy to exploit security vulnerabilities </li></ul><ul><li>Firewalls- serves as a shield for intruders </li></ul><ul><li>Intrusion detection systems (IDS)- used to detect unauthorized access, monitor and audit networks </li></ul><ul><li>Penetration test- process of testing the security measures of a computer network </li></ul>
  10. 10. Strategies and Solutions (cont’d) <ul><li>Backup- copy data into another location </li></ul><ul><li>Business continuity planning (BCP)- organization wide plan that depicts how an organization will recover from interruptions </li></ul><ul><li>Disaster recovery plan (DRP)- an IT related infrastructure recovery </li></ul><ul><li>Appropriate use of portable storage devices </li></ul><ul><li>Physical security- closed-circuit television cameras, access control systems </li></ul>
  11. 11. Implications and benefits of network security <ul><li>With the increase in awareness, there is more persuasion from companies </li></ul><ul><li>Security policy- document that states the rules related to security that governs an organization </li></ul><ul><li>Even home computer users are a part of the crusade </li></ul><ul><li>Possessing the right education is also very important </li></ul><ul><li>- CCIE security, CISSP, Comptia Security+, and CCSP </li></ul><ul><li>- courses in universities, information from journals and magazines </li></ul>
  12. 12. Conclusion <ul><li>Regular auditing of IT infrastructure, regular penetration test and periodic examination of the company’s BCP </li></ul><ul><li>Adequate network security enhances its reputation, protects stakeholder’s valuable information </li></ul><ul><li>Network security starts with actions from individual </li></ul><ul><li>It’s not a product, it's a process </li></ul><ul><li>Network security is the responsibility of everyone. It is better to prevent threats than to get rid of </li></ul>

×