NETWORK SECURITY
SUBMITTED BY:
G.Rahul Reddy
21P61A1250
IT-A
CONTENTS:
• INTRODUCTION
• TYPES OF NETWORK SECURITY
• ADVANTAGES
• DISADVANTAGES
• CONCLUSION
INTRODUCTION:
• Network security consists of the polices, procesess and practices
adopted to prevent, detect and monitor access, misuse, modification,
or denial of a computer network and network-accessible resources.
• Network security involves the authorization of access to data in a
network, which is controlled by the network administrator.
• Users choose or are assigned an ID and password or other
authenticating information that allows them access to information
and programs within their authority.
TYPES:
• 1. Firewall
• Firewalls filter the traffic on your network. They work to prevent and block unauthorized internet
traffic.
• 2. Network Segmentation
• Network segmentation divides a network into multiple sections, and each section then acts as their
own individual networks
• 3. Access Control
• Access control gives you the ability to grant or deny access to individual users based on their
responsibilities within your network.
• 4. Remote Access VPN
• A remote access virtual private network (VPN) provides integrity and privacy of information by
utilizing endpoint compliance scanning, multi-factor authentication (MFA), and transmitted data
encryption.
TYPES:
• 5. Zero-Trust Network Access (ZTNA)
• The Zero Trust Network grants specific access to an individual user based on the
exact role they play within the network.
• 6. Email Security
• Email security is set up to prevent users from unknowingly providing sensitive
information or allowing access to the network via a malware-infected email.
• 7. Data Loss Prevention (DLP)
• DLP is a network security technology that aids in preventing sensitive information
from accidentally being leaked outside of the network by users.
ADVANTAGES:
• Protects against cyber attacks
• Access levels
• Keep your data safe
• Updates are now centralized
• Centrally managed
Disadvantages:
• Setup is expensive
• It takes time
• Incompetent administration
CONCLUSION:
• Internet connectivity, email and the web, now vital for small business,
pose many risks to computer system and the privacy of the company’s
data.
• The onslaught of viruses, worms compounded with the increasing
problem of spyware, adware, and blended threats continue to attack an
organization’s network through multiple methods.
networks security networks security cs.pptx

networks security networks security cs.pptx

  • 1.
  • 2.
    CONTENTS: • INTRODUCTION • TYPESOF NETWORK SECURITY • ADVANTAGES • DISADVANTAGES • CONCLUSION
  • 3.
    INTRODUCTION: • Network securityconsists of the polices, procesess and practices adopted to prevent, detect and monitor access, misuse, modification, or denial of a computer network and network-accessible resources. • Network security involves the authorization of access to data in a network, which is controlled by the network administrator. • Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
  • 4.
    TYPES: • 1. Firewall •Firewalls filter the traffic on your network. They work to prevent and block unauthorized internet traffic. • 2. Network Segmentation • Network segmentation divides a network into multiple sections, and each section then acts as their own individual networks • 3. Access Control • Access control gives you the ability to grant or deny access to individual users based on their responsibilities within your network. • 4. Remote Access VPN • A remote access virtual private network (VPN) provides integrity and privacy of information by utilizing endpoint compliance scanning, multi-factor authentication (MFA), and transmitted data encryption.
  • 5.
    TYPES: • 5. Zero-TrustNetwork Access (ZTNA) • The Zero Trust Network grants specific access to an individual user based on the exact role they play within the network. • 6. Email Security • Email security is set up to prevent users from unknowingly providing sensitive information or allowing access to the network via a malware-infected email. • 7. Data Loss Prevention (DLP) • DLP is a network security technology that aids in preventing sensitive information from accidentally being leaked outside of the network by users.
  • 6.
    ADVANTAGES: • Protects againstcyber attacks • Access levels • Keep your data safe • Updates are now centralized • Centrally managed
  • 7.
    Disadvantages: • Setup isexpensive • It takes time • Incompetent administration
  • 8.
    CONCLUSION: • Internet connectivity,email and the web, now vital for small business, pose many risks to computer system and the privacy of the company’s data. • The onslaught of viruses, worms compounded with the increasing problem of spyware, adware, and blended threats continue to attack an organization’s network through multiple methods.