SlideShare a Scribd company logo
Network Security

10/30/2013

A presentation by Nkosinathi Lungu

1
Why Network Security?

We need our networks secured because there are a lot of threats to networks
from hackers and software’s. Our networks hold a lot of data some of which is
confidential and could lead industry sabotage and espionage and so it must be
protected.

10/30/2013

A presentation by Nkosinathi Lungu

2
Common Security Threats
There are several threats to computer networks some of the most common being;
 Viruses Worms and Trojans
 Spyware and Adware
 Hacker Attacks
 Denial of Service Attacks
 Data interception and theft
 Identity Theft

10/30/2013

A presentation by Nkosinathi Lungu

3
Securing the Network
There are several ways in which we can ensure that our networks stay secure like;
 Authentication: All users of the network must enter some credentials to prove
that they have authority to access what’s on the network
 Firewalls: Once a user logs on a firewall can ascertain what rights the user has
on the network and what resources are available to that user.
 Antivirus and Antispyware: Also essential for the network security as this will
be able to block any malicious software that tries to run on your machine
 Password Policies: Users should be prompted to change their passwords at
least every other month.

10/30/2013

A presentation by Nkosinathi Lungu

4
Securing the Network continued
 Network Analyzer: This can be used to monitor who is logged onto the
network and what resources they are accessing
 Network Key: In the case of wireless networks it’s important that users must
enter a network key before being allowed on the network.
 Encryption: encryption software can be installed on the networks so that any
outsider accessing the information won’t be able to read it.
 Physical Access to data areas: All places with terminals on the network must
be secured so that no one can just access them

10/30/2013

A presentation by Nkosinathi Lungu

5
Servers
What is a Server?

 A server is a system either hardware or software that responds to requests
across a network to provide services
 Servers are central to a network as they hold all the data from user access data
to personal and the organizations data.

10/30/2013

A presentation by Nkosinathi Lungu

6
Server Room
What is a Server room?

 A server room is a room where the organizations servers are kept and as such
they need to be secured
 Server Rooms can also be used to keep backups as well as house switches and
routers

10/30/2013

A presentation by Nkosinathi Lungu

7
Securing the Server Room
Some ways to secure server rooms are;
 Isolation: It is important that the server room is isolated and kept away form
human traffic
 Physical Access: Users should authenticate themselves before entering the
server room. There are several ways to do this like keycards, Door access code
locks or biometrics like fingerprint.
 Monitoring: If possible have cameras in and around the server room so that
you can monitor who is accessing the room.
 Server Racks: Keep servers in racks as they are secure and can be locked that
way even if someone breaks into your server room they can’t access the
server.

10/30/2013

A presentation by Nkosinathi Lungu

8
Securing the Server Room Continued
 Smoke Detectors: In case of a fire the smoke detectors will go off and the fire
can be put off before any damage is done.
 Elevation: Make sure that the servers are all off the ground so that in the event
of flooding there is less likelihood of them getting affected.
 Air Conditioning: Servers like other computers produce heat and depending
on the traffic they get they can get really hot so it’s important that the server
room is air conditioned
 Windows: Ensure that there are no windows to the server room or if there are
they should be well secured
 Password Lockouts: It is advisable to set your servers so that they can lock
after a few failed log in attempts.

10/30/2013

A presentation by Nkosinathi Lungu

9
Summary
 We see that it is important to secure our networks for various reasons because
they are used to store sensitive and important data which we want to keep
secure as it might be used for malicious intent in the wrong hands.

10/30/2013

A presentation by Nkosinathi Lungu

10

More Related Content

What's hot

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
Hitesh Mohapatra
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Ahmed Ghazey
 

What's hot (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security
Network security Network security
Network security
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network security
Network securityNetwork security
Network security
 
Dos attack
Dos attackDos attack
Dos attack
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Computer security
Computer securityComputer security
Computer security
 
Network Security
Network Security Network Security
Network Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 

Viewers also liked

Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
Ideba
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
Jai4uk
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
Sergio Loureiro
 
Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
Chanankorn Jandaeng
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
Khoa Nguyen
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
guested929b
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 

Viewers also liked (19)

Network Security
Network SecurityNetwork Security
Network Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Network Security
Network SecurityNetwork Security
Network Security
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar to Network security

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
01
01 01
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
Revathiparamanathan
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
Protelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
Protelion
 
03 cia
03 cia03 cia
03 cia
Jadavsejal
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
Ritesh Dwivedi
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
ahmed53254
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
secued cloud
 secued cloud secued cloud
secued cloud
Devyani Vaidya
 
What is fire wall and how it works
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it works
netsourceid
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
vickeryr87
 

Similar to Network security (20)

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
01
01 01
01
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
03 cia
03 cia03 cia
03 cia
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
secued cloud
 secued cloud secued cloud
secued cloud
 
What is fire wall and how it works
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it works
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 

More from Nkosinathi Lungu

NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overview
Nkosinathi Lungu
 
I.T project challenges
I.T project challengesI.T project challenges
I.T project challenges
Nkosinathi Lungu
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
Life of a freelancer
Life of a freelancerLife of a freelancer
Life of a freelancer
Nkosinathi Lungu
 
I.T t shirts
I.T t shirtsI.T t shirts
I.T t shirts
Nkosinathi Lungu
 
Health information systems (his)
Health information systems (his)Health information systems (his)
Health information systems (his)Nkosinathi Lungu
 

More from Nkosinathi Lungu (6)

NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overview
 
I.T project challenges
I.T project challengesI.T project challenges
I.T project challenges
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Life of a freelancer
Life of a freelancerLife of a freelancer
Life of a freelancer
 
I.T t shirts
I.T t shirtsI.T t shirts
I.T t shirts
 
Health information systems (his)
Health information systems (his)Health information systems (his)
Health information systems (his)
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Network security

  • 2. Why Network Security? We need our networks secured because there are a lot of threats to networks from hackers and software’s. Our networks hold a lot of data some of which is confidential and could lead industry sabotage and espionage and so it must be protected. 10/30/2013 A presentation by Nkosinathi Lungu 2
  • 3. Common Security Threats There are several threats to computer networks some of the most common being;  Viruses Worms and Trojans  Spyware and Adware  Hacker Attacks  Denial of Service Attacks  Data interception and theft  Identity Theft 10/30/2013 A presentation by Nkosinathi Lungu 3
  • 4. Securing the Network There are several ways in which we can ensure that our networks stay secure like;  Authentication: All users of the network must enter some credentials to prove that they have authority to access what’s on the network  Firewalls: Once a user logs on a firewall can ascertain what rights the user has on the network and what resources are available to that user.  Antivirus and Antispyware: Also essential for the network security as this will be able to block any malicious software that tries to run on your machine  Password Policies: Users should be prompted to change their passwords at least every other month. 10/30/2013 A presentation by Nkosinathi Lungu 4
  • 5. Securing the Network continued  Network Analyzer: This can be used to monitor who is logged onto the network and what resources they are accessing  Network Key: In the case of wireless networks it’s important that users must enter a network key before being allowed on the network.  Encryption: encryption software can be installed on the networks so that any outsider accessing the information won’t be able to read it.  Physical Access to data areas: All places with terminals on the network must be secured so that no one can just access them 10/30/2013 A presentation by Nkosinathi Lungu 5
  • 6. Servers What is a Server?  A server is a system either hardware or software that responds to requests across a network to provide services  Servers are central to a network as they hold all the data from user access data to personal and the organizations data. 10/30/2013 A presentation by Nkosinathi Lungu 6
  • 7. Server Room What is a Server room?  A server room is a room where the organizations servers are kept and as such they need to be secured  Server Rooms can also be used to keep backups as well as house switches and routers 10/30/2013 A presentation by Nkosinathi Lungu 7
  • 8. Securing the Server Room Some ways to secure server rooms are;  Isolation: It is important that the server room is isolated and kept away form human traffic  Physical Access: Users should authenticate themselves before entering the server room. There are several ways to do this like keycards, Door access code locks or biometrics like fingerprint.  Monitoring: If possible have cameras in and around the server room so that you can monitor who is accessing the room.  Server Racks: Keep servers in racks as they are secure and can be locked that way even if someone breaks into your server room they can’t access the server. 10/30/2013 A presentation by Nkosinathi Lungu 8
  • 9. Securing the Server Room Continued  Smoke Detectors: In case of a fire the smoke detectors will go off and the fire can be put off before any damage is done.  Elevation: Make sure that the servers are all off the ground so that in the event of flooding there is less likelihood of them getting affected.  Air Conditioning: Servers like other computers produce heat and depending on the traffic they get they can get really hot so it’s important that the server room is air conditioned  Windows: Ensure that there are no windows to the server room or if there are they should be well secured  Password Lockouts: It is advisable to set your servers so that they can lock after a few failed log in attempts. 10/30/2013 A presentation by Nkosinathi Lungu 9
  • 10. Summary  We see that it is important to secure our networks for various reasons because they are used to store sensitive and important data which we want to keep secure as it might be used for malicious intent in the wrong hands. 10/30/2013 A presentation by Nkosinathi Lungu 10