SlideShare a Scribd company logo
1 of 10
Network Security
Chapter goals
1. What is a network?
2. Why do we need network security?
3. What is vulnerability?
4. Firewall as network security
5. Conclusion
What is a network?
A network is a series of nodes interconnected to each other
by communication paths. Each computer is a network
which is connected to other network using wired
connection or a wireless connection such as Wi-Fi.
The best example for a network is internet. A router
network is required to connect internet with one or many
computer networks together.
Network security and its uses
Network security is a set of policies which blocks
vulnerabilities such as unauthorized access to the
computer networks.
It is mainly developed to avoid thefts, misuse of
computer, etc. If one network is affected, there are
wide chances to affects the other networks which are
interconnected.
Network security and its uses
When network security software such as firewall is
installed in a computer network, the connections that it
receives are well scanned by the firewall software and
accepts the connection only if it is found safe. The rest
of the connections which are unsafe are denied to enter
the network.
By this method our computer, and devices that are
connected to computer can be kept safe and the data
can be protected.
What is vulnerability?
Vulnerability in computer network is a weakness in
security that are exposed to attacks by hackers or
intruders. A risk in computer network can be named
as a vulnerability.
Firewall as network security
Firewall is a network security software which acts as a
protecting barrier against threats from attackers to
exploit the computer network.
Computers can be attacked using external devices such as
pendrive, hard-disk, CDs, etc. Through which malware
is sent to the system and the hackers takes full control
over the system and destroys the computer.
Firewall as network security
Another way is through wireless connection such as
internet. Internet is a network that connects
thousands and thousands of network together. Now a
days, malicious software are passed by sending email
spam, by visiting untrusted domains, downloading
malicious files, etc.
A firewall is used to block the unauthorized access to the
system. The network that a computer receives to
connect is well scanned by the firewall present in the
computer, the data is sent to the computer only if the
data obeys the following rules programmed in the
firewall software.
Conclusion
With an increase in online attacks, it is mandatory to
have security software such as firewall installed to
secure and protect the network from hackers.
Conclusion
With an increase in online attacks, it is mandatory to
have security software such as firewall installed to
secure and protect the network from hackers.

More Related Content

What's hot

CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityComputing Cage
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threatsrashidalkamdah
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 

What's hot (20)

CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network security
Network securityNetwork security
Network security
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network security
Network securityNetwork security
Network security
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 

Viewers also liked

Viewers also liked (9)

1
11
1
 
Mike Occhipinti pm resume 20161208
Mike Occhipinti pm resume 20161208Mike Occhipinti pm resume 20161208
Mike Occhipinti pm resume 20161208
 
Loomis Resume
Loomis ResumeLoomis Resume
Loomis Resume
 
ECC Prosperidade - Riqueza com Felicidade 2015Jun30
ECC Prosperidade - Riqueza com Felicidade 2015Jun30ECC Prosperidade - Riqueza com Felicidade 2015Jun30
ECC Prosperidade - Riqueza com Felicidade 2015Jun30
 
the cost of unemployment
the cost of unemployment the cost of unemployment
the cost of unemployment
 
IRLL
IRLLIRLL
IRLL
 
Managing Software Entitlements in Software Asset Management Solutions from CA
Managing Software Entitlements in Software Asset Management Solutions from CAManaging Software Entitlements in Software Asset Management Solutions from CA
Managing Software Entitlements in Software Asset Management Solutions from CA
 
Livro "Os Segredos da Mente Milionária" - T. Harv Eker (resumo)
Livro "Os Segredos da Mente Milionária" - T. Harv Eker (resumo) Livro "Os Segredos da Mente Milionária" - T. Harv Eker (resumo)
Livro "Os Segredos da Mente Milionária" - T. Harv Eker (resumo)
 
Case Write Up Surgical Gastric Carcinoma
Case Write Up Surgical Gastric CarcinomaCase Write Up Surgical Gastric Carcinoma
Case Write Up Surgical Gastric Carcinoma
 

Similar to Network security

edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYabdul talha
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Internet security
Internet security Internet security
Internet security Ayesha Rana
 

Similar to Network security (20)

Network Security
Network SecurityNetwork Security
Network Security
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Computer networking
Computer networking Computer networking
Computer networking
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Firewall
FirewallFirewall
Firewall
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Internet security
Internet security Internet security
Internet security
 

More from William hendric

Beginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialBeginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialWilliam hendric
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_securityWilliam hendric
 
Auto sanbox technology a complete overview
Auto sanbox technology a complete overviewAuto sanbox technology a complete overview
Auto sanbox technology a complete overviewWilliam hendric
 
Facebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyFacebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyWilliam hendric
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingWilliam hendric
 
overview about comodo ev ssl certificate
overview about comodo ev ssl certificateoverview about comodo ev ssl certificate
overview about comodo ev ssl certificateWilliam hendric
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTWilliam hendric
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoWilliam hendric
 

More from William hendric (9)

Beginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL TutorialBeginners Guide to SSL | SSL Tutorial
Beginners Guide to SSL | SSL Tutorial
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
How to install_comodo_free_internet_security
How to install_comodo_free_internet_securityHow to install_comodo_free_internet_security
How to install_comodo_free_internet_security
 
Auto sanbox technology a complete overview
Auto sanbox technology a complete overviewAuto sanbox technology a complete overview
Auto sanbox technology a complete overview
 
Facebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacyFacebook might lose battle to guard users' privacy
Facebook might lose battle to guard users' privacy
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack Everything
 
overview about comodo ev ssl certificate
overview about comodo ev ssl certificateoverview about comodo ev ssl certificate
overview about comodo ev ssl certificate
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 

Network security

  • 2. Chapter goals 1. What is a network? 2. Why do we need network security? 3. What is vulnerability? 4. Firewall as network security 5. Conclusion
  • 3. What is a network? A network is a series of nodes interconnected to each other by communication paths. Each computer is a network which is connected to other network using wired connection or a wireless connection such as Wi-Fi. The best example for a network is internet. A router network is required to connect internet with one or many computer networks together.
  • 4. Network security and its uses Network security is a set of policies which blocks vulnerabilities such as unauthorized access to the computer networks. It is mainly developed to avoid thefts, misuse of computer, etc. If one network is affected, there are wide chances to affects the other networks which are interconnected.
  • 5. Network security and its uses When network security software such as firewall is installed in a computer network, the connections that it receives are well scanned by the firewall software and accepts the connection only if it is found safe. The rest of the connections which are unsafe are denied to enter the network. By this method our computer, and devices that are connected to computer can be kept safe and the data can be protected.
  • 6. What is vulnerability? Vulnerability in computer network is a weakness in security that are exposed to attacks by hackers or intruders. A risk in computer network can be named as a vulnerability.
  • 7. Firewall as network security Firewall is a network security software which acts as a protecting barrier against threats from attackers to exploit the computer network. Computers can be attacked using external devices such as pendrive, hard-disk, CDs, etc. Through which malware is sent to the system and the hackers takes full control over the system and destroys the computer.
  • 8. Firewall as network security Another way is through wireless connection such as internet. Internet is a network that connects thousands and thousands of network together. Now a days, malicious software are passed by sending email spam, by visiting untrusted domains, downloading malicious files, etc. A firewall is used to block the unauthorized access to the system. The network that a computer receives to connect is well scanned by the firewall present in the computer, the data is sent to the computer only if the data obeys the following rules programmed in the firewall software.
  • 9. Conclusion With an increase in online attacks, it is mandatory to have security software such as firewall installed to secure and protect the network from hackers.
  • 10. Conclusion With an increase in online attacks, it is mandatory to have security software such as firewall installed to secure and protect the network from hackers.