Published on

Published in: Education, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. NETWORK SECURITY • It Protect the usability, reliability, integrity, and safety of your network and data. • Effective network security targets a variety of threats and stops them from entering or spreading on your network. • Many network security threats today are spread over the Internet. • Network Security - measures to protect data during their transmission
  2. 2. The most common threats include: • Viruses, worms, and Trojan horses • Spyware and adware • Zero-day attacks, also called zero-hour attacks • Hacker attacks • Denial of service attacks • Data interception and theft • Identity theft
  3. 3. • Network security is accomplished through hardware and software. Software must be constantly updated and managed to protect you from emerging threats. Hardware usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.
  4. 4. Examples  SOFTWARE : • Anti-virus and anti-spyware • Firewall, to block unauthorized access to your network  HARDWARE : • Intrusion prevention systems (IPS), to identify fast-spreading threats • Virtual Private Networks (VPNs), to provide secure remote access
  5. 5. THREATS • With an increasing amount of people getting connected to networks, the security threats that cause massive harm are also increasing. • Network security is a major part of a network that needs to be maintained because information is being passed between computers,devices,etc and is very vulnerable to attack..
  6. 6. • Over the past five years people that manage network security have seen a massive increase of hackers and criminals creating malicious threats that have been pumped into networks across the world.
  7. 7. The biggest network threats: • Viruses and Worms • Trojan Horses • SPAM • Phishing • Packet Sniffers • Maliciously Coded Websites • Password Attacks • Hardware Loss and Residual Data Fragments • Shared Computers • Zombie Computers and Botnet
  8. 8. Virus & Worm • A Virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. • Viruses can cause a huge amount of damage to computers. • A worm is similar to a virus but a worm can run itself whereas a virus needs a host program to run. • Solution: Install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms.
  9. 9. Trojan Horse • A Trojan Horse is “a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. • Solution: Security suites, such as Norton Internet Security, will prevent you from downloading Trojan Horses
  10. 10. SPAM • SPAM is “flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. • Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of the e-mail providers online.
  11. 11. Phising • Phishing is “an e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. • Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent threat.
  12. 12. Password Attackers • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas. • Many systems on a network are password protected and hence it would be easy for a hacker to hack into the systems and steal data. This may be the easiest way to obtain private information because you are able to get software online that obtains the password for you.