SlideShare a Scribd company logo
1 of 11
Network Security: Attacks, Tools and Techniques
Author
Siddharth Ghansela
Dept. of Computer Science & Application
G B Pant Engineering College
Pauri Garhwal-246194,India
Prepare By Waqas Ahmad
Telecommunication And Networking (SUIT Peshawar)
Presented By: Abdullah Khan Reg No. Su-12-001-020.
Presented To: Mr. Adam Khan Program: BS CS .
Semester:6th .
◦
Abstract
Network security is main issue of this generation of computing
because many types of attacks are increasing day by day.
Establishing a network is not a big issue for network administrators
but protecting the entire network is a big issue. There are various
methods and tools are available today for destroying the existing
network. In this paper we mainly emphasize on the network
security also we present some major issues that can affect our
network.
What Is Network?
A group or system of interconnected
A network is two or more computers
A network is a collection of computers, servers, mainframes, network devices, peripherals, or
other devices connected to one another allowing for data to be shared and used
Computers: A group of interconnected (via cable and/or wireless) computers and peripherals
that is capable of sharing software and hardware resources between many users. The Internet is
a global network of networks. See also local area network and wide area network
What Is Network Security?
Network security is the process by which digital information are protected
Goals of security are to protect confidentiality, maintain integrity, and assure availability.
To secure the information and the entire network system, one specific methodology is required
which can be capable of providing the complete security solutions.
The security of network is a big issue for security administrators because network is growing day
by day.
BASIC TYPES OF ATTACKS
Here the Author are presenting some basic class of attacks which can be a cause for slow network
performance, uncontrolled traffic, viruses etc
A. Security Threats:
B. Virus Attack:
C. Unauthorized application installations:
D. Unauthorized Access
Define Each And Every Type Of Attack
A. Security Threats:
There are a number of security threats that can be the cause of a network
security attack. Main security threats are:
viruses
spywares
unauthorized access to the network resources and data
accidental deletion of the files and the uncontrolled internet access.
Define Each And Every Type Of Attack……
B. Virus Attack:
A computer virus is a small program or an executable code that when executed
and replicated, perform different unwanted and harmful functions for a computer and a network.
Viruses can destroy your hard disks and processors, consume memory at a very large scale and
destroy the overall performance of a computer or network
Define Each And Every Type Of Attack……
c) Unauthorized application installations:
Another virus and security attack prevention method is to install only the
authorized software applications to our network server and your all client computers. Nobody
should be allowed to install any kind of program which can cause security threats such as songs or
video programs, codec, gaming software or other web based applications.
Define Each And Every Type Of Attack……
D. Unauthorized Access:
Access to the network resources and data should be allowed only to the
authorized persons. Every shared folder and resources in your network should have been accessed
only by the authorized persons and should also be scanned and monitored regularly.
BASIC SECURITY TIPS
This basic Network Security useful security tips and methods to secure your network such as…
Installing a update antivirus program
Email scanning programs
Network monitoring tools
Internet access policy
CONCLUSION
There are a number of ways, which guarantee for the safety and security of
your network. Perform regular network security testing. Don’t provide more
or unwanted access to any network user. Must have an updated antivirus
program. Operating system should be regularly updated. If you have windows
based operating system you can update it from the Microsoft website. Keep
inventory of your network resources such as devices and software
applications. Turn off your computer when you are away and don’t leave
your computer unattended. Put a strong network and system administrator
password. Use a switched network, so that you can identify the problem very
quickly.

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Malware
MalwareMalware
Malware
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network security
Network security Network security
Network security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
cyber security
cyber security cyber security
cyber security
 
Network security
Network securityNetwork security
Network security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Application security
Application securityApplication security
Application security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Viewers also liked

Viewers also liked (20)

Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Network security attacks
Network security attacksNetwork security attacks
Network security attacks
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Network virus
Network virusNetwork virus
Network virus
 

Similar to Network Security: Attacks, Tools and Techniques

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectUp2Universe
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxAkttripathi
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfCareerera
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 

Similar to Network Security: Attacks, Tools and Techniques (20)

CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
How to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docxHow to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Network security
Network securityNetwork security
Network security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Network Security: Attacks, Tools and Techniques

  • 1. Network Security: Attacks, Tools and Techniques Author Siddharth Ghansela Dept. of Computer Science & Application G B Pant Engineering College Pauri Garhwal-246194,India Prepare By Waqas Ahmad Telecommunication And Networking (SUIT Peshawar) Presented By: Abdullah Khan Reg No. Su-12-001-020. Presented To: Mr. Adam Khan Program: BS CS . Semester:6th . ◦
  • 2. Abstract Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.
  • 3. What Is Network? A group or system of interconnected A network is two or more computers A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another allowing for data to be shared and used Computers: A group of interconnected (via cable and/or wireless) computers and peripherals that is capable of sharing software and hardware resources between many users. The Internet is a global network of networks. See also local area network and wide area network
  • 4. What Is Network Security? Network security is the process by which digital information are protected Goals of security are to protect confidentiality, maintain integrity, and assure availability. To secure the information and the entire network system, one specific methodology is required which can be capable of providing the complete security solutions. The security of network is a big issue for security administrators because network is growing day by day.
  • 5. BASIC TYPES OF ATTACKS Here the Author are presenting some basic class of attacks which can be a cause for slow network performance, uncontrolled traffic, viruses etc A. Security Threats: B. Virus Attack: C. Unauthorized application installations: D. Unauthorized Access
  • 6. Define Each And Every Type Of Attack A. Security Threats: There are a number of security threats that can be the cause of a network security attack. Main security threats are: viruses spywares unauthorized access to the network resources and data accidental deletion of the files and the uncontrolled internet access.
  • 7. Define Each And Every Type Of Attack…… B. Virus Attack: A computer virus is a small program or an executable code that when executed and replicated, perform different unwanted and harmful functions for a computer and a network. Viruses can destroy your hard disks and processors, consume memory at a very large scale and destroy the overall performance of a computer or network
  • 8. Define Each And Every Type Of Attack…… c) Unauthorized application installations: Another virus and security attack prevention method is to install only the authorized software applications to our network server and your all client computers. Nobody should be allowed to install any kind of program which can cause security threats such as songs or video programs, codec, gaming software or other web based applications.
  • 9. Define Each And Every Type Of Attack…… D. Unauthorized Access: Access to the network resources and data should be allowed only to the authorized persons. Every shared folder and resources in your network should have been accessed only by the authorized persons and should also be scanned and monitored regularly.
  • 10. BASIC SECURITY TIPS This basic Network Security useful security tips and methods to secure your network such as… Installing a update antivirus program Email scanning programs Network monitoring tools Internet access policy
  • 11. CONCLUSION There are a number of ways, which guarantee for the safety and security of your network. Perform regular network security testing. Don’t provide more or unwanted access to any network user. Must have an updated antivirus program. Operating system should be regularly updated. If you have windows based operating system you can update it from the Microsoft website. Keep inventory of your network resources such as devices and software applications. Turn off your computer when you are away and don’t leave your computer unattended. Put a strong network and system administrator password. Use a switched network, so that you can identify the problem very quickly.