SlideShare a Scribd company logo
CYBER EDU
What is Network Security?
Network security defined, explained, and
explored
 Network security defined
Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a
set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and
data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure,
requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the
wild today.
Today's network architecture is complex and is faced with a threat environment that is always changing and attackers that
are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of areas, including
devices, data, applications, users and locations. For this reason, there are many network security management tools and
applications in use today that address individual threats and exploits and also regulatory non-compliance. When just a few
minutes of downtime can cause widespread disruption and massive damage to an organization's bottom line and reputation,
it is essential that these protection measures are in place
How does network security work?
 There are many layers to consider when addressing network
security across an organization. Attacks can happen at any layer in
the network security layers model, so your network security
hardware, software and policies must be designed to address each
area.
 Network security typically consists of three different controls:
physical, technical and administrative. Here is a brief description of
the different types of network security and how each control works.
Physical Network Security
 Physical security controls are designed to prevent
unauthorized personnel from gaining physical access to
network components such as routers, cabling cupboards
and so on. Controlled access, such as locks, biometric
authentication and other devices, is essential in any
organization.
Technical Network Security
 Technical security controls protect data that is stored on
the network or which is in transit across, into or out of
the network. Protection is twofold; it needs to protect
data and systems from unauthorized personnel, and it
also needs to protect against malicious activities from
employees.
Administrative Network Security
 Administrative security controls consist of security
policies and processes that control user behavior,
including how users are authenticated, their level of
access and also how IT staff members implement
changes to the infrastructure.
Types of network security
 We have talked about the different types of network
security controls. Now let's take a look at some of the
different ways you can secure your network.
• Network Access Control
• Antivirus and Antimalware Software
• Firewall Protection
• Virtual Private Networks
Network Access Control
 To ensure that potential attackers cannot infiltrate your network, comprehensive access
control policies need to be in place for both users and devices. Network access control
(NAC) can be set at the most granular level. For example, you could grant administrators
full access to the network but deny access to specific confidential folders or prevent
their personal devices from joining the network.
Antivirus and Antimalware Software
• Antivirus and antimalware software protect an organization from a
range of malicious software, including viruses, ransomware, worms and
trojans. The best software not only scans files upon entry to the
network but continuously scans and tracks files.
Firewall Protection
 Firewalls, as their name suggests, act as a barrier between the untrusted external
networks and your trusted internal network. Administrators typically configure a set
of defined rules that blocks or permits traffic onto the network. For
example, Forcepoint's Next Generation Firewall (NGFW) offers seamless and
centrally managed control of network traffic, whether it is physical, virtual or in the
cloud.
Virtual Private Networks
• Virtual private networks (VPNs) create a connection to the network from another endpoint
or site. For example, users working from home would typically connect to the
organization's network over a VPN. Data between the two points is encrypted and the user
would need to authenticate to allow communication between their device and the
network. Forcepoint's Secure Enterprise SD-WAN allows organizations to quickly create
VPNs using drag-and-drop and to protect all locations with our Next Generation Firewall
Network security for businesses and consumers
 Network security should be a high priority for any organization that works with
networked data and systems. In addition to protecting assets and the integrity of
data from external exploits, network security can also manage network traffic
more efficiently, enhance network performance and ensure secure data sharing
between employees and data sources.
 There are many tools, applications and utilities available that can help you to
secure your networks from attack and unnecessary downtime. Forcepoint offers
a suite of network security solutions that centralize and simplify what are often
complex processes and ensure robust network security is in place across your
enterprise.

More Related Content

What's hot

The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
jeremywatkins57
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 

What's hot (20)

Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 

Similar to Network security

Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 

Similar to Network security (20)

network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Network security
Network security Network security
Network security
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 

Recently uploaded

一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 

Recently uploaded (13)

How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 

Network security

  • 1. CYBER EDU What is Network Security? Network security defined, explained, and explored
  • 2.  Network security defined Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. Today's network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of areas, including devices, data, applications, users and locations. For this reason, there are many network security management tools and applications in use today that address individual threats and exploits and also regulatory non-compliance. When just a few minutes of downtime can cause widespread disruption and massive damage to an organization's bottom line and reputation, it is essential that these protection measures are in place
  • 3. How does network security work?  There are many layers to consider when addressing network security across an organization. Attacks can happen at any layer in the network security layers model, so your network security hardware, software and policies must be designed to address each area.  Network security typically consists of three different controls: physical, technical and administrative. Here is a brief description of the different types of network security and how each control works.
  • 4. Physical Network Security  Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
  • 5. Technical Network Security  Technical security controls protect data that is stored on the network or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.
  • 6. Administrative Network Security  Administrative security controls consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.
  • 7. Types of network security  We have talked about the different types of network security controls. Now let's take a look at some of the different ways you can secure your network. • Network Access Control • Antivirus and Antimalware Software • Firewall Protection • Virtual Private Networks
  • 8. Network Access Control  To ensure that potential attackers cannot infiltrate your network, comprehensive access control policies need to be in place for both users and devices. Network access control (NAC) can be set at the most granular level. For example, you could grant administrators full access to the network but deny access to specific confidential folders or prevent their personal devices from joining the network. Antivirus and Antimalware Software • Antivirus and antimalware software protect an organization from a range of malicious software, including viruses, ransomware, worms and trojans. The best software not only scans files upon entry to the network but continuously scans and tracks files.
  • 9. Firewall Protection  Firewalls, as their name suggests, act as a barrier between the untrusted external networks and your trusted internal network. Administrators typically configure a set of defined rules that blocks or permits traffic onto the network. For example, Forcepoint's Next Generation Firewall (NGFW) offers seamless and centrally managed control of network traffic, whether it is physical, virtual or in the cloud. Virtual Private Networks • Virtual private networks (VPNs) create a connection to the network from another endpoint or site. For example, users working from home would typically connect to the organization's network over a VPN. Data between the two points is encrypted and the user would need to authenticate to allow communication between their device and the network. Forcepoint's Secure Enterprise SD-WAN allows organizations to quickly create VPNs using drag-and-drop and to protect all locations with our Next Generation Firewall
  • 10. Network security for businesses and consumers  Network security should be a high priority for any organization that works with networked data and systems. In addition to protecting assets and the integrity of data from external exploits, network security can also manage network traffic more efficiently, enhance network performance and ensure secure data sharing between employees and data sources.  There are many tools, applications and utilities available that can help you to secure your networks from attack and unnecessary downtime. Forcepoint offers a suite of network security solutions that centralize and simplify what are often complex processes and ensure robust network security is in place across your enterprise.