SlideShare a Scribd company logo
Network Security
As our society has evolved to the digital age, network security is more important than ever.
Threats to Networks   • Crashing a system with too much information  • Listening to unencrypted traffic  • Redirecting traffic  • Fraud  • Malicious software
Solutions   • Anti-Virus software  • Encryption  • Firewalls  • Security policies for users
One of the best ways to protect a network is strong control over user passwords.
Password Tips   • Use different passwords  • Don't use a variation of log in  • Store passwords in a secure place  • Use a long password made of numbers letters and symbols  • Use a phrase that only you know
System administrators should limit access to the network
Firewalls filter what comes into the network and is a valuable in defending the network
Anti-virus software actively monitors the system for possible threats - but it must be up to date to be effective
Backing up the data stored on a network or system is always a good idea
Having and enforcing the AUP is critical for the security of the network. Most damage to a network comes from the authorized users.
Email can be dangerous! Only open email from senders you know.
Those automatic updates may be annoying, but are critical to the security of a network!
Final Tips   • Never open a strange file  • password protect all data  • Always back up data  • Allow updates  • Never share a password
References http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html
References http://www.google.com/goodtoknow/online-safety/passwords/
References http://www.wisegeek.com/what-is-network-security.htm

More Related Content

What's hot

Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 

What's hot (20)

Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Adware
AdwareAdware
Adware
 
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
 
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
 
Network Security
Network Security Network Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Network security
Network securityNetwork security
Network security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

Similar to Network Security

Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 

Similar to Network Security (20)

Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Network security
Network securityNetwork security
Network security
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Security
SecuritySecurity
Security
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 

Network Security