SlideShare a Scribd company logo
           Networking Infrastructure       & Security Topic : ,[object Object]
What are the main characteristics of VLANsPresented by: Kerry-Ann Cole
Introduction  Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations.  An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them. P@$$W0RD
Threats to network security include: Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games Attacks : Including investigation attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network);  Data interception : Involves eavesdropping on communications or altering data packets being transmitted Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords
Network security tools include: Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained. Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management. Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
Network security tools include: Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data.  Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys. Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.
Two Approaches to Security Open Door       Is a type of security, in which you grant everyone access to everything by default and then place restrictions just on those resources to which you want to limit access. Close Door      Is a type of security, in which you begin by denying access to everything and then grant specific users access to the specific resources that they need.
Physical Security: Locking Your Doors The first level of security in any computer network is physical security. Physical Guide Lines to Protect the Server ✦ Lock the computer room. ✦ Give the key only to people you trust. ✦ Keep track of who has the keys. ✦ Disable the floppy drive on the server.
Securing User Accounts Properly configured user accounts can prevent unauthorized users from accessing the network, even if they gain physical access to the network.
Here Are Some Ways In Which You Can Strengthen Users Account  Your usernames Using passwords wisely
Server Password Settings
Summary Of Passwords Passwords must be at least five characters in length. A mixture of numbers and letters provides the greatest security; however, this is not required.  Passwords must be unique. You cannot use the same password twice.  Passwords must be changed every 60 days. The computer will prompt you and allow for grace logons
Securing the Administrator account At least one network user must have the authority to use the network without any of the restrictions imposed on other users. This user is called the administrator.     Anyone who knows the default administrator username and password can access your system with full administrator rights and privileges, thus bypassing the security restrictions that you so carefully set up.
Hardening Your Network Using a Firewall Disabling unnecessary services Patching your servers
Securing Your Wireless Network Use encryption Use anti-virus and anti-spyware software, and a firewall Turn off identifier broadcasting. Allow only specific computers to access your wireless network.
The Impact of Network Security  Improved productivity Enhanced control   Improved usage of IT resources Utmost protection as well as security of data.  Acceptance of a good network security system also ensures that only right personnel have the right level of access.
VLANs: Virtual Local Area Network VLANs support logical grouping of network nodes to reduce broadcast traffic and allow more control in implementing security policies.

More Related Content

What's hot

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Network security ppt
Network security pptNetwork security ppt
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
AfreenYousaf
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
ThousandEyes
 
Digital Rights Management PPT
Digital Rights Management PPTDigital Rights Management PPT
Digital Rights Management PPTSuresh Khutale
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
Dhani Ahmad
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
Pedro Alexander Romero Tortosa
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
Joe Shestak
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
Jafar Nesargi
 

What's hot (20)

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
 
Digital Rights Management PPT
Digital Rights Management PPTDigital Rights Management PPT
Digital Rights Management PPT
 
Security policies
Security policiesSecurity policies
Security policies
 
Network security
Network security Network security
Network security
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Network security
Network securityNetwork security
Network security
 
Active directory
Active directory Active directory
Active directory
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
 
Ip address
Ip addressIp address
Ip address
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 

Similar to Networking infrastructure

unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
lochanrajdahal
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
AkilSayyad2
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Network and web security
Network and web securityNetwork and web security
Network and web security
Nitesh Saitwal
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
MijanurSepai1
 
Introduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptxIntroduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptx
abhisma21
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 

Similar to Networking infrastructure (20)

unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Introduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptxIntroduction-to-Computer Network-Security.pptx
Introduction-to-Computer Network-Security.pptx
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Data security
Data securityData security
Data security
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 

Networking infrastructure

  • 1.
  • 2. What are the main characteristics of VLANsPresented by: Kerry-Ann Cole
  • 3. Introduction Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them. P@$$W0RD
  • 4. Threats to network security include: Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games Attacks : Including investigation attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); Data interception : Involves eavesdropping on communications or altering data packets being transmitted Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords
  • 5. Network security tools include: Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained. Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management. Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
  • 6. Network security tools include: Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data. Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys. Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.
  • 7. Two Approaches to Security Open Door Is a type of security, in which you grant everyone access to everything by default and then place restrictions just on those resources to which you want to limit access. Close Door Is a type of security, in which you begin by denying access to everything and then grant specific users access to the specific resources that they need.
  • 8. Physical Security: Locking Your Doors The first level of security in any computer network is physical security. Physical Guide Lines to Protect the Server ✦ Lock the computer room. ✦ Give the key only to people you trust. ✦ Keep track of who has the keys. ✦ Disable the floppy drive on the server.
  • 9. Securing User Accounts Properly configured user accounts can prevent unauthorized users from accessing the network, even if they gain physical access to the network.
  • 10. Here Are Some Ways In Which You Can Strengthen Users Account Your usernames Using passwords wisely
  • 12. Summary Of Passwords Passwords must be at least five characters in length. A mixture of numbers and letters provides the greatest security; however, this is not required. Passwords must be unique. You cannot use the same password twice. Passwords must be changed every 60 days. The computer will prompt you and allow for grace logons
  • 13. Securing the Administrator account At least one network user must have the authority to use the network without any of the restrictions imposed on other users. This user is called the administrator. Anyone who knows the default administrator username and password can access your system with full administrator rights and privileges, thus bypassing the security restrictions that you so carefully set up.
  • 14. Hardening Your Network Using a Firewall Disabling unnecessary services Patching your servers
  • 15. Securing Your Wireless Network Use encryption Use anti-virus and anti-spyware software, and a firewall Turn off identifier broadcasting. Allow only specific computers to access your wireless network.
  • 16. The Impact of Network Security Improved productivity Enhanced control Improved usage of IT resources Utmost protection as well as security of data. Acceptance of a good network security system also ensures that only right personnel have the right level of access.
  • 17. VLANs: Virtual Local Area Network VLANs support logical grouping of network nodes to reduce broadcast traffic and allow more control in implementing security policies.
  • 18. Characteristics of VLANS Reduce the amount of broadcast traffic a network Each VLAN operates as separate local area network Members of a VLAN can only talk to other members of the same VLAN Traffic that needs to go between different VLANS is processed through a routing function in the managed switch.