SlideShare a Scribd company logo
1 of 4
Network security
    YUE PING
• Network security consists of the
  provisions made in an underlying
  computer network infrastructure, policies
  adopted by the network administrator to
  protect the network and the network-
  accessible resources from unauthorized
  access.
Network security concepts
• Network security starts from
  authenticating : username , password,
  a fingerprint or retinal scan .
• Intrusion prevention system (IPS).
• Anomaly-based intrusion detection
  system.
• Communication between two hosts using
  the network could be encrypted to
  maintain privacy.
• Security Management for networks is
  different for all kinds of situations. A small
  home or an office would only require basic
  security while large businesses will require
  high maintenance and advanced software
  and hardware to prevent malicious attacks
  from hacking and spamming.

More Related Content

What's hot

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Network Security
Network SecurityNetwork Security
Network SecurityJoe Baker
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeIkhtiar Khan Sohan
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 

What's hot (19)

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
презентация1
презентация1презентация1
презентация1
 
Network security
Network securityNetwork security
Network security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Network security
Network securityNetwork security
Network security
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 

Viewers also liked

Luminaria Presentation
Luminaria PresentationLuminaria Presentation
Luminaria Presentationguest59a0b1
 
My Roads Less Traveled
My Roads Less TraveledMy Roads Less Traveled
My Roads Less TraveledDavid Frost
 
Dogs & Cats: How Product Managers 
can work better with 
UX Designers
Dogs & Cats: How Product Managers 
can work better with 
UX DesignersDogs & Cats: How Product Managers 
can work better with 
UX Designers
Dogs & Cats: How Product Managers 
can work better with 
UX DesignersPatrick Neeman
 
Lavacon: What Is Content Strategy?
Lavacon: What Is Content Strategy?Lavacon: What Is Content Strategy?
Lavacon: What Is Content Strategy?Patrick Neeman
 
Lavacon: UX for Content Strategists and Technical Writers
Lavacon: UX for Content Strategists and Technical WritersLavacon: UX for Content Strategists and Technical Writers
Lavacon: UX for Content Strategists and Technical WritersPatrick Neeman
 
LavaCon: Hunting Unicorns - What Makes an Effective UX Professional
LavaCon: Hunting Unicorns - What Makes an Effective UX ProfessionalLavaCon: Hunting Unicorns - What Makes an Effective UX Professional
LavaCon: Hunting Unicorns - What Makes an Effective UX ProfessionalPatrick Neeman
 
Hunting Unicorns - What makes an effective UX Professional
Hunting Unicorns - What makes an effective UX ProfessionalHunting Unicorns - What makes an effective UX Professional
Hunting Unicorns - What makes an effective UX ProfessionalPatrick Neeman
 
Certificacion iso
Certificacion isoCertificacion iso
Certificacion isonoemi
 
Career Paths of User Experience
Career Paths of User ExperienceCareer Paths of User Experience
Career Paths of User ExperiencePatrick Neeman
 
UX Portfolios: How to tell your story
UX Portfolios: How to tell your storyUX Portfolios: How to tell your story
UX Portfolios: How to tell your storyPatrick Neeman
 
What is User Experience, A Primer - U of Washington
What is User Experience, A Primer - U of WashingtonWhat is User Experience, A Primer - U of Washington
What is User Experience, A Primer - U of WashingtonPatrick Neeman
 
Enterprise UX - The "Next" Last Frontier
Enterprise UX - The "Next" Last FrontierEnterprise UX - The "Next" Last Frontier
Enterprise UX - The "Next" Last FrontierPatrick Neeman
 
How to get a great UX job, U of Washington Presentation
How to get a great UX job, U of Washington PresentationHow to get a great UX job, U of Washington Presentation
How to get a great UX job, U of Washington PresentationPatrick Neeman
 
SoCal UX Camp -- How To Get A Great UX Job
SoCal UX Camp -- How To Get A Great UX JobSoCal UX Camp -- How To Get A Great UX Job
SoCal UX Camp -- How To Get A Great UX JobPatrick Neeman
 
UXSpeakeasy - How To Get A Great UX Job
UXSpeakeasy - How To Get A Great UX JobUXSpeakeasy - How To Get A Great UX Job
UXSpeakeasy - How To Get A Great UX JobPatrick Neeman
 
General Assembly - How To Get A Great UX Job
General Assembly - How To Get A Great UX JobGeneral Assembly - How To Get A Great UX Job
General Assembly - How To Get A Great UX JobPatrick Neeman
 
Agile and UX, July 8 - Scrum Club, Los Angeles, CA
Agile and UX, July 8 - Scrum Club, Los Angeles, CAAgile and UX, July 8 - Scrum Club, Los Angeles, CA
Agile and UX, July 8 - Scrum Club, Los Angeles, CAPatrick Neeman
 

Viewers also liked (18)

Luminaria Presentation
Luminaria PresentationLuminaria Presentation
Luminaria Presentation
 
Bibliografia apit
Bibliografia apitBibliografia apit
Bibliografia apit
 
My Roads Less Traveled
My Roads Less TraveledMy Roads Less Traveled
My Roads Less Traveled
 
Dogs & Cats: How Product Managers 
can work better with 
UX Designers
Dogs & Cats: How Product Managers 
can work better with 
UX DesignersDogs & Cats: How Product Managers 
can work better with 
UX Designers
Dogs & Cats: How Product Managers 
can work better with 
UX Designers
 
Lavacon: What Is Content Strategy?
Lavacon: What Is Content Strategy?Lavacon: What Is Content Strategy?
Lavacon: What Is Content Strategy?
 
Lavacon: UX for Content Strategists and Technical Writers
Lavacon: UX for Content Strategists and Technical WritersLavacon: UX for Content Strategists and Technical Writers
Lavacon: UX for Content Strategists and Technical Writers
 
LavaCon: Hunting Unicorns - What Makes an Effective UX Professional
LavaCon: Hunting Unicorns - What Makes an Effective UX ProfessionalLavaCon: Hunting Unicorns - What Makes an Effective UX Professional
LavaCon: Hunting Unicorns - What Makes an Effective UX Professional
 
Hunting Unicorns - What makes an effective UX Professional
Hunting Unicorns - What makes an effective UX ProfessionalHunting Unicorns - What makes an effective UX Professional
Hunting Unicorns - What makes an effective UX Professional
 
Certificacion iso
Certificacion isoCertificacion iso
Certificacion iso
 
Career Paths of User Experience
Career Paths of User ExperienceCareer Paths of User Experience
Career Paths of User Experience
 
UX Portfolios: How to tell your story
UX Portfolios: How to tell your storyUX Portfolios: How to tell your story
UX Portfolios: How to tell your story
 
What is User Experience, A Primer - U of Washington
What is User Experience, A Primer - U of WashingtonWhat is User Experience, A Primer - U of Washington
What is User Experience, A Primer - U of Washington
 
Enterprise UX - The "Next" Last Frontier
Enterprise UX - The "Next" Last FrontierEnterprise UX - The "Next" Last Frontier
Enterprise UX - The "Next" Last Frontier
 
How to get a great UX job, U of Washington Presentation
How to get a great UX job, U of Washington PresentationHow to get a great UX job, U of Washington Presentation
How to get a great UX job, U of Washington Presentation
 
SoCal UX Camp -- How To Get A Great UX Job
SoCal UX Camp -- How To Get A Great UX JobSoCal UX Camp -- How To Get A Great UX Job
SoCal UX Camp -- How To Get A Great UX Job
 
UXSpeakeasy - How To Get A Great UX Job
UXSpeakeasy - How To Get A Great UX JobUXSpeakeasy - How To Get A Great UX Job
UXSpeakeasy - How To Get A Great UX Job
 
General Assembly - How To Get A Great UX Job
General Assembly - How To Get A Great UX JobGeneral Assembly - How To Get A Great UX Job
General Assembly - How To Get A Great UX Job
 
Agile and UX, July 8 - Scrum Club, Los Angeles, CA
Agile and UX, July 8 - Scrum Club, Los Angeles, CAAgile and UX, July 8 - Scrum Club, Los Angeles, CA
Agile and UX, July 8 - Scrum Club, Los Angeles, CA
 

Similar to Homework0703

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................MuhammadKhalil858111
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architectureImran Khan
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 

Similar to Homework0703 (20)

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Internet security
Internet securityInternet security
Internet security
 
Computer security
Computer securityComputer security
Computer security
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Network security
Network securityNetwork security
Network security
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Homework0703

  • 1. Network security YUE PING
  • 2. • Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network- accessible resources from unauthorized access.
  • 3. Network security concepts • Network security starts from authenticating : username , password, a fingerprint or retinal scan . • Intrusion prevention system (IPS). • Anomaly-based intrusion detection system. • Communication between two hosts using the network could be encrypted to maintain privacy.
  • 4. • Security Management for networks is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.