SlideShare a Scribd company logo
Assignment:
Assignment name : Network Security in computer network
Course code: CSE 317
Submitted to:
pranab Bandhu nath
senior Lecturer, Department of CSE
City university, Dhaka
Submitted by
Md parvez
Id: 184902610
Bsc in cse(day)
Batch 49th
What is Network Security?
Network Security protects your network and data from breaches,
intrusions and other threats. This is a vast and overarching term that
describes hardware and software solutions as well as processes or rules
and configurations relating to network use, accessibility, and overall threat
protection.
introduction to network security in computer
network
Network security is a broad term that covers a multitude of technologies,
devices and processes. In its simplest term, it is a set of rules and
configurations designed to protect the integrity, confidentiality and
accessibility of computer networks and data using both software and
hardware technologies.
t are Network Security Attacks?
What is a Network Attack?
Network attacks are unauthorized actions on the digital assets within an
organizational network. Malicious parties usually execute network attacks
to alter, destroy, or steal private data. Perpetrators in network attacks tend
to target network perimeters to gain access to internal systems.
There are two main types of network attacks: passive and active. In
passive network attacks, malicious parties gain unauthorized access to
networks, monitor, and steal private data without making any alterations.
Active network attacks involve modifying, encrypting, or damaging data.
Upon infiltration, malicious parties may leverage other hacking activities,
such as malware and endpoint attacks, to attack an organizational network.
With more organizations adopting remote working, networks have become
more vulnerable to data theft and destruction.
Types of Network Security
 Access control. This refers to controlling which users have access
to the network or especially sensitive sections of the network. Using
security policies, you can restrict network access to only recognized users
and devices or grant limited access to noncompliant devices or guest
users.
 Antivirus and anti-malware software. Malware, or
“malicious software,” is a common form of cyberattack that comes in many
different shapes and sizes. Some variations work quickly to delete files or
corrupt data, while others can lie dormant for long periods of time and
quietly allow hackers a back door into your systems. The best antivirus
software will monitor network traffic in real time for malware, scan activity
log files for signs of suspicious behavior or long-term patterns, and offer
threat remediation capabilities.
 Application security. Each device and software product used
within your networking environment offers a potential way in for hackers.
For this reason, it is important that all programs be kept up-to-date and
patched to prevent cyberattackers from exploiting vulnerabilities to access
sensitive data. Application security refers to the combination of hardware,
software, and best practices you use to monitor issues and close gaps in
your security coverage.
 Behavioral analytics. In order to identify abnormal behavior,
security support personnel need to establish a baseline of what constitutes
normal behavior for a given customer’s users, applications, and network.
Behavioral analytics software is designed to help identify common
indicators of abnormal behavior, which can often be a sign that a security
breach has occurred. By having a better sense of each customer’s
baselines, MSPs can more quickly spot problems and isolate threats.
 Data loss prevention. Data loss prevention (DLP)
technologies are those that prevent an organization’s employees from
sharing valuable company information or sensitive data—whether
unwittingly or with ill intent—outside the network. DLP technologies can
prevent actions that could potentially expose data to bad actors outside the
networking environment, such as uploading and downloading files,
forwarding messages, or printing.
 Distributed denial of service prevention. Distributed
denial of service (DDoS) attacks are becoming increasingly common. They
function by overloading a network with one-sided connection requests that
eventually cause the network to crash. A DDoS prevention tool scrubs
incoming traffic to remove nonlegitimate traffic that could threaten your
network, and may consist of a hardware appliance that works to filter out
traffic before it reaches your firewalls.
 Email security. Email is an especially important factor to consider
when implementing networking security tools. Numerous threat vectors, like
scams, phishing, malware, and suspicious links, can be attached to or
incorporated into emails. Because so many of these threats will often use
elements of personal information in order to appear more convincing, it is
important to ensure an organization’s employees
undergo sufficient security awareness training to detect when an email is
suspicious. Email security software works to filter out incoming threats and
can also be configured to prevent outgoing messages from sharing certain
forms of data.
 Firewalls. Firewalls are another common element of a network
security model. They essentially function as a gatekeeper between a
network and the wider internet. Firewalls filter incoming and, in some
cases, outgoing traffic by comparing data packets against predefined rules
and policies, thereby preventing threats from accessing the network.
 Mobile device security. The vast majority of us have mobile
devices that carry some form of personal or sensitive data we would like to
keep protected. This is a fact that hackers are aware of and can easily take
advantage of. Implementing mobile device security measures can limit
device access to a network, which is a necessary step to ensuring network
traffic stays private and doesn’t leak out through vulnerable mobile
connections.
 Network segmentation. Dividing and sorting network traffic
based on certain classifications streamlines the job for security support
personnel when it comes to applying policies. Segmented networks also
make it easier to assign or deny authorization credentials for employees,
ensuring no one is accessing information they should not be. Segmentation
also helps to sequester potentially compromised devices or intrusions.
 Security information and event management. These
security systems (called SIEMs) combine host-based and network-based
intrusion detection systems that combine real-time network traffic
monitoring with historical data log file scanning to provide administrators
with a comprehensive picture of all activity across the network. SIEMs are
similar to intrusion prevention systems (IPS), which scan network traffic for
suspicious activity, policy violations, unauthorized access, and other signs
of potentially malicious behavior in order to actively block the attempted
intrusions. An IPS can also log security events and send notifications to the
necessary players in the interest of keeping network administrators
informed.
 Web security. Web security software serves a few purposes. First, it
limits internet access for employees, with the intention of preventing them
from accessing sites that could contain malware. It also blocks other web-
based threats and works to protect a customer’s web gateway.
reference
https://www.checkpoint.com/cyber-
hub/network-security/what-is-network-
security/
https://www.google.com/search?q=what
+is+network+security+in+computer+net
works&sxsrf=ALeKk032YzP0uc0SoXi_N-
SpShxlZjpVzg%3A1624749869652&ei=Lb
fXYPyQJ8O5rQHZybeABw&oq=what+net
work+security+in+computer+networks&
gs_lcp=Cgdnd3Mtd2l6EAEYADIGCAAQB
xAeOgQIIxAnOgIIADoECAAQHkoECEEY
AFD5OFjHUmDIcGgAcAJ4AIABiAGIAY4
GkgEDMC42mAEAoAEBqgEHZ3dzLXdp
esABAQ&sclient=gws-wiz
Network srcurity
Network srcurity
Network srcurity

More Related Content

What's hot

Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
SaranSwathi1
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
Nrapesh Shah
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
Jeffery Brown
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
bdemchak
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
Dhani Ahmad
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 

What's hot (20)

Data protection and security
Data protection and securityData protection and security
Data protection and security
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
C02
C02C02
C02
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Web security
Web securityWeb security
Web security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 

Similar to Network srcurity

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
VinayPratap58
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
KENNEDYDONATO1
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
forladies
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
DebmalyaSingha
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 

Similar to Network srcurity (20)

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
information security technology
information security technologyinformation security technology
information security technology
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Network security
Network securityNetwork security
Network security
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 

More from sheikhparvez4

Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
sheikhparvez4
 
Vsat in computer network
Vsat in computer networkVsat in computer network
Vsat in computer network
sheikhparvez4
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
sheikhparvez4
 
Introduction to setelite system
Introduction to setelite systemIntroduction to setelite system
Introduction to setelite system
sheikhparvez4
 
Topology
TopologyTopology
Topology
sheikhparvez4
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
sheikhparvez4
 
Computer hardware and software
Computer hardware and softwareComputer hardware and software
Computer hardware and software
sheikhparvez4
 
Classification of computer network
Classification of computer networkClassification of computer network
Classification of computer network
sheikhparvez4
 
Ip and mac adress
Ip and mac adressIp and mac adress
Ip and mac adress
sheikhparvez4
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
sheikhparvez4
 

More from sheikhparvez4 (10)

Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
 
Vsat in computer network
Vsat in computer networkVsat in computer network
Vsat in computer network
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
Introduction to setelite system
Introduction to setelite systemIntroduction to setelite system
Introduction to setelite system
 
Topology
TopologyTopology
Topology
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Computer hardware and software
Computer hardware and softwareComputer hardware and software
Computer hardware and software
 
Classification of computer network
Classification of computer networkClassification of computer network
Classification of computer network
 
Ip and mac adress
Ip and mac adressIp and mac adress
Ip and mac adress
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
 

Recently uploaded

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

Network srcurity

  • 1. Assignment: Assignment name : Network Security in computer network Course code: CSE 317 Submitted to: pranab Bandhu nath senior Lecturer, Department of CSE City university, Dhaka Submitted by Md parvez Id: 184902610 Bsc in cse(day) Batch 49th What is Network Security? Network Security protects your network and data from breaches, intrusions and other threats. This is a vast and overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility, and overall threat protection. introduction to network security in computer network
  • 2. Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. t are Network Security Attacks? What is a Network Attack? Network attacks are unauthorized actions on the digital assets within an organizational network. Malicious parties usually execute network attacks to alter, destroy, or steal private data. Perpetrators in network attacks tend to target network perimeters to gain access to internal systems. There are two main types of network attacks: passive and active. In passive network attacks, malicious parties gain unauthorized access to networks, monitor, and steal private data without making any alterations. Active network attacks involve modifying, encrypting, or damaging data. Upon infiltration, malicious parties may leverage other hacking activities, such as malware and endpoint attacks, to attack an organizational network. With more organizations adopting remote working, networks have become more vulnerable to data theft and destruction. Types of Network Security  Access control. This refers to controlling which users have access to the network or especially sensitive sections of the network. Using security policies, you can restrict network access to only recognized users and devices or grant limited access to noncompliant devices or guest users.  Antivirus and anti-malware software. Malware, or “malicious software,” is a common form of cyberattack that comes in many different shapes and sizes. Some variations work quickly to delete files or corrupt data, while others can lie dormant for long periods of time and quietly allow hackers a back door into your systems. The best antivirus software will monitor network traffic in real time for malware, scan activity
  • 3. log files for signs of suspicious behavior or long-term patterns, and offer threat remediation capabilities.  Application security. Each device and software product used within your networking environment offers a potential way in for hackers. For this reason, it is important that all programs be kept up-to-date and patched to prevent cyberattackers from exploiting vulnerabilities to access sensitive data. Application security refers to the combination of hardware, software, and best practices you use to monitor issues and close gaps in your security coverage.  Behavioral analytics. In order to identify abnormal behavior, security support personnel need to establish a baseline of what constitutes normal behavior for a given customer’s users, applications, and network. Behavioral analytics software is designed to help identify common indicators of abnormal behavior, which can often be a sign that a security breach has occurred. By having a better sense of each customer’s baselines, MSPs can more quickly spot problems and isolate threats.  Data loss prevention. Data loss prevention (DLP) technologies are those that prevent an organization’s employees from sharing valuable company information or sensitive data—whether unwittingly or with ill intent—outside the network. DLP technologies can prevent actions that could potentially expose data to bad actors outside the networking environment, such as uploading and downloading files, forwarding messages, or printing.  Distributed denial of service prevention. Distributed denial of service (DDoS) attacks are becoming increasingly common. They function by overloading a network with one-sided connection requests that eventually cause the network to crash. A DDoS prevention tool scrubs incoming traffic to remove nonlegitimate traffic that could threaten your network, and may consist of a hardware appliance that works to filter out traffic before it reaches your firewalls.  Email security. Email is an especially important factor to consider when implementing networking security tools. Numerous threat vectors, like scams, phishing, malware, and suspicious links, can be attached to or incorporated into emails. Because so many of these threats will often use elements of personal information in order to appear more convincing, it is
  • 4. important to ensure an organization’s employees undergo sufficient security awareness training to detect when an email is suspicious. Email security software works to filter out incoming threats and can also be configured to prevent outgoing messages from sharing certain forms of data.  Firewalls. Firewalls are another common element of a network security model. They essentially function as a gatekeeper between a network and the wider internet. Firewalls filter incoming and, in some cases, outgoing traffic by comparing data packets against predefined rules and policies, thereby preventing threats from accessing the network.  Mobile device security. The vast majority of us have mobile devices that carry some form of personal or sensitive data we would like to keep protected. This is a fact that hackers are aware of and can easily take advantage of. Implementing mobile device security measures can limit device access to a network, which is a necessary step to ensuring network traffic stays private and doesn’t leak out through vulnerable mobile connections.  Network segmentation. Dividing and sorting network traffic based on certain classifications streamlines the job for security support personnel when it comes to applying policies. Segmented networks also make it easier to assign or deny authorization credentials for employees, ensuring no one is accessing information they should not be. Segmentation also helps to sequester potentially compromised devices or intrusions.  Security information and event management. These security systems (called SIEMs) combine host-based and network-based intrusion detection systems that combine real-time network traffic monitoring with historical data log file scanning to provide administrators with a comprehensive picture of all activity across the network. SIEMs are similar to intrusion prevention systems (IPS), which scan network traffic for suspicious activity, policy violations, unauthorized access, and other signs of potentially malicious behavior in order to actively block the attempted intrusions. An IPS can also log security events and send notifications to the necessary players in the interest of keeping network administrators informed.
  • 5.  Web security. Web security software serves a few purposes. First, it limits internet access for employees, with the intention of preventing them from accessing sites that could contain malware. It also blocks other web- based threats and works to protect a customer’s web gateway. reference https://www.checkpoint.com/cyber- hub/network-security/what-is-network- security/ https://www.google.com/search?q=what +is+network+security+in+computer+net works&sxsrf=ALeKk032YzP0uc0SoXi_N- SpShxlZjpVzg%3A1624749869652&ei=Lb fXYPyQJ8O5rQHZybeABw&oq=what+net work+security+in+computer+networks& gs_lcp=Cgdnd3Mtd2l6EAEYADIGCAAQB xAeOgQIIxAnOgIIADoECAAQHkoECEEY AFD5OFjHUmDIcGgAcAJ4AIABiAGIAY4 GkgEDMC42mAEAoAEBqgEHZ3dzLXdp esABAQ&sclient=gws-wiz