SlideShare a Scribd company logo
1 of 22
By
 : SAIKAT BISWAS
NETWORK SECURITY
WHAT IS NETWORK SECURITY.
WHY DO I NEED SECURITY
HOW DOES NETWORK SECURITY
WORK
HOW DO I BENEFIT FROM NETWORK
SECURITY
TYPES OF NETWORK SECURITY
CONTENTS
 Network security is any activity designed to protect the
usability and integrity of your network and data. It includes
both hardware and software technologies. Effective network
security manages access to the network. It targets a variety
of threats and stops them from entering or spreading on your
network.
WHAT IS NETWORK SECURITY ?
Protect vital information while still
allowing access to those who need it
Trade secrets, medical records, etc.
WHY DO I NEED SECURITY ?
 Network security combines multiple layers of defences at
the edge and in the network. Each network security layer
implements policies and controls. Authorized users gain
access to network resources, but malicious actors are
blocked from carrying out exploits and threats.
HOW DOES NETWORK SECURITY WORK ?
 Digitization has transformed our world. How we live, work,
play, and learn have all changed. Every organization that
wants to deliver the services that customers and
employees demand must protect its network. Network
security also helps you protect proprietary information
from attack. Ultimately it protects your reputation.
HOW DO I BENEFIT FROM
NETWORK SECURITY ?
 ACCESS CONTROL
 ANTIVIRUS AND ANTIMALWARE SOFTWARE
 APPLICATION SECURITY
 BEHAVIOURALANALYTICS
 DATA LOSS PREVENTION
 E-MAIL SECURITY
 FIREWALLS
 INTRUSION PREVENTION SYSTEMS
 MOBILE DEVICE SECURITY
 NETWORK SEGMENTATION
 SECURITY INFORMATION & EVENT MANAGEMENT
 VPN
 WEB SECURITY
 WIRELESS SECURITY
TYPES OF NETWORK SECURITY
 Network access control, or NAC, solutions support network
visibility and access management through policy
enforcement on devices and users of corporate networks.
ACCESS CONTROL
 "Malware," short for "malicious software," includes viruses,
worms, Trojans, ransom ware, and spyware. Sometimes
malware will infect a network but lie dormant for days or even
weeks. The best antimalware programs not only scan for
malware upon entry, but also continuously track files
afterward to find anomalies, remove malware, and fix damage.
ANTIVIRUS & ANTIMALWARE
SOFTWARE
 Any software you use to run your business needs to be
protected, whether your IT staff builds it or whether you
buy it. Unfortunately, any application may contain holes,
or vulnerabilities, that attackers can use to infiltrate your
network. Application security encompasses the hardware,
software, and processes you use to close those holes.
APPLICATION SECURITY
 To detect abnormal network behaviour, you must
know what normal behaviour looks like.
Behavioural analytics tools automatically discern
activities that deviate from the norm. Your security
team can then better identify indicators of
compromise that pose a potential problem and
quickly remediate threats.
BEHAVIOURAL ANALYTICS
 Organizations must make sure that their staff does not send
sensitive information outside the network. Data loss
prevention, or DLP, technologies can stop people from
uploading, forwarding, or even printing critical information
in an unsafe manner.
DATA LOSS PREVENTION
 Email gateways are the number one threat vector for a
security breach. Attackers use personal information and
social engineering tactics to build sophisticated phishing
campaigns to deceive recipients and send them to sites
serving up malware. An email security application blocks
incoming attacks and controls outbound messages to
prevent the loss of sensitive data.
E-MAIL SECURITY
 Firewalls put up a barrier between your trusted internal
network and untrusted outside networks, such as the
Internet. They use a set of defined rules to allow or block
traffic. A firewall can be hardware, software, or both.
FIREWALLS
This System protects against network
and application-level attacks, securing
organizations against intrusion
attempts, malware, Trojans, DoS and
DDoS attacks, malicious code
transmission, backdoor activity and
blended threats.
INTRUSION PREVENTION SYSTEMS
 Cybercriminals are increasingly targeting mobile devices and
apps. Within the next 3 years, 90% of IT organizations may
support corporate applications on personal mobile devices. Of
course, you need to control which devices can access your
network. You will also need to configure their connections to
keep network traffic private.
MOBILE DEVICE SECURITY
 Software-defined segmentation puts network
traffic into different classifications and makes
enforcing security policies easier. Ideally, the
classifications are based on endpoint identity, not
mere IP addresses. You can assign access rights
based on role, location, and more so that the right
level of access is given to the right people and
suspicious devices are contained and remediated.
NETWORK SEGMENTATION
 SIEM products pull together the information that
your security staff needs to identify and respond to
threats. These products come in various forms,
including physical and virtual appliances and server
software.
SECURITY INFORMATION & EVENT
MANAGEMENT
 A virtual private network encrypts the connection
from an endpoint to a network, often over the
Internet. Typically, a remote-access VPN uses IPsec
or Secure Sockets Layer to authenticate the
communication between device and network.
V P N (VIRTUAL PRIVATE NETWORK)
 A web security solution will control your staff’s
web use, block web-based threats, and deny
access to malicious websites. It will protect your
web gateway on site or in the cloud. "Web
security" also refers to the steps you take to
protect your own website.
WEB SECURITY
 Wireless networks are not as secure as
wired ones. Without stringent security
measures, installing a wireless LAN can be
like putting Ethernet ports everywhere,
including the parking lot. To prevent an
exploit from taking hold, you need products
specifically designed to protect a wireless
network.
WIRELESS SECURITY
THANK
YOU

More Related Content

What's hot

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Network security
Network securityNetwork security
Network security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
cyber security
cyber securitycyber security
cyber security
 
Information security
Information securityInformation security
Information security
 
cyber security
cyber security cyber security
cyber security
 

Similar to Network Security ppt

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Similar to Network Security ppt (20)

Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Network security
Network securityNetwork security
Network security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
CS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptxCS INFORMATION MANAGEMENT.pptx
CS INFORMATION MANAGEMENT.pptx
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory
 
Network security
Network security Network security
Network security
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 

Network Security ppt

  • 1. By  : SAIKAT BISWAS NETWORK SECURITY
  • 2. WHAT IS NETWORK SECURITY. WHY DO I NEED SECURITY HOW DOES NETWORK SECURITY WORK HOW DO I BENEFIT FROM NETWORK SECURITY TYPES OF NETWORK SECURITY CONTENTS
  • 3.  Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. WHAT IS NETWORK SECURITY ?
  • 4. Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. WHY DO I NEED SECURITY ?
  • 5.  Network security combines multiple layers of defences at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats. HOW DOES NETWORK SECURITY WORK ?
  • 6.  Digitization has transformed our world. How we live, work, play, and learn have all changed. Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects your reputation. HOW DO I BENEFIT FROM NETWORK SECURITY ?
  • 7.  ACCESS CONTROL  ANTIVIRUS AND ANTIMALWARE SOFTWARE  APPLICATION SECURITY  BEHAVIOURALANALYTICS  DATA LOSS PREVENTION  E-MAIL SECURITY  FIREWALLS  INTRUSION PREVENTION SYSTEMS  MOBILE DEVICE SECURITY  NETWORK SEGMENTATION  SECURITY INFORMATION & EVENT MANAGEMENT  VPN  WEB SECURITY  WIRELESS SECURITY TYPES OF NETWORK SECURITY
  • 8.  Network access control, or NAC, solutions support network visibility and access management through policy enforcement on devices and users of corporate networks. ACCESS CONTROL
  • 9.  "Malware," short for "malicious software," includes viruses, worms, Trojans, ransom ware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage. ANTIVIRUS & ANTIMALWARE SOFTWARE
  • 10.  Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network. Application security encompasses the hardware, software, and processes you use to close those holes. APPLICATION SECURITY
  • 11.  To detect abnormal network behaviour, you must know what normal behaviour looks like. Behavioural analytics tools automatically discern activities that deviate from the norm. Your security team can then better identify indicators of compromise that pose a potential problem and quickly remediate threats. BEHAVIOURAL ANALYTICS
  • 12.  Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner. DATA LOSS PREVENTION
  • 13.  Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data. E-MAIL SECURITY
  • 14.  Firewalls put up a barrier between your trusted internal network and untrusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both. FIREWALLS
  • 15. This System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats. INTRUSION PREVENTION SYSTEMS
  • 16.  Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years, 90% of IT organizations may support corporate applications on personal mobile devices. Of course, you need to control which devices can access your network. You will also need to configure their connections to keep network traffic private. MOBILE DEVICE SECURITY
  • 17.  Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated. NETWORK SEGMENTATION
  • 18.  SIEM products pull together the information that your security staff needs to identify and respond to threats. These products come in various forms, including physical and virtual appliances and server software. SECURITY INFORMATION & EVENT MANAGEMENT
  • 19.  A virtual private network encrypts the connection from an endpoint to a network, often over the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network. V P N (VIRTUAL PRIVATE NETWORK)
  • 20.  A web security solution will control your staff’s web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud. "Web security" also refers to the steps you take to protect your own website. WEB SECURITY
  • 21.  Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an exploit from taking hold, you need products specifically designed to protect a wireless network. WIRELESS SECURITY