SlideShare a Scribd company logo
Network Security Omonigho Palmer-Ikuku , Security+, MCSE: Security, CCNA
Outline Introduction Extent of Network security - Types of threats - Types of network security attacks Impact of Network security on companies and organizations Strategies and Solutions Implications and benefits of network security Conclusion
Introduction What is a Network? - a group of computers and devices interconnected by    communication equipments, software, hardware and paths
Introduction (cont’d)  Why Network security? - a survey which shows that 85 percent of organizations that  responded to the survey discovered breaches in their network  security  What is a Network Security? - all activities that organizations, individuals, and institutions takes to protect  computers assets, data and instill integrity and continuity of operations   The CIA abbreviation   - Confidentiality: safeguarding of information from unauthorized disclosure   - Integrity: safeguarding delicate data from alterations without authorization   - Availability: certify that services are available to endorsed users only  The reverse of confidentiality, integrity, and availability is disclosure, alteration, and destruction (D.A.D.).
Extent of Network security  Other Important Concepts - Authenticity: guarantees that data, transactions are unadulterated - Authorization: rights and permission given to individuals to use computers - Identification: Is the way to identify users of a system Larger companies and larger networks are at greater network security risk compared to smaller companies and smaller networks The internet as a medium for doing business and its consequences The effect of breach in information security is usually very horrific
Extent of Network security  (cont’d)  Types of network security threats -  Malware: Gotten from two words malicious and software, it’s a    software that is built to destroy computers  - Social Engineering: a subset of information security is a nontechnical  method of hacking into a system or network  - Malicious Insiders: more delicate data and records are lost when a there is  a network security attack by an insider  - Careless Employees: poor training for employees and lack of knowledge on  the necessary network security policies    Types of network security attacks - Passwords attacks: dictionary attacks and brute-force. The use of strong  passwords is highly recommended - IP Address Spoofing: hackers can change the IP address of computers  during communication and access networks - Denial-of-Service: attackers denies authorized users access to the network  by send unwanted traffic to the network  - Packet Sniffer: analyze, display, capture and read network data exchanges  and packets
Impact of Network security on companies and organizations UK businesses (53%) that suffered security incidents were able to restore normal business operations within a day  The rank of information security in the list of executives meetings is increasing  Whenever there is a breach in internet security on a company, transactions reduces Negative reaction on the price of the stock  Due to the rise of blogs and social technologies, there is more work to secure networks  Improper disposal of computer devices and unused documents can be harmful
Strategies and Solutions Virtual private network (VPN)- links are provided between nodes to provide remote users secured access to their intended network  Cryptography- a subset of encryption, data is transformed into an unreadable format Secure Sockets Layer (SSL)- now known as Transport Layer Security (TLS) is used to provide data integrity and security over the internet  Hypertext Transfer Protocol Secure (HTTPS)- is a combination of http and a network security protocol
Strategies and Solutions  (cont’d)  Computer viruses- ability to spread makes it easy to exploit security vulnerabilities Firewalls- serves as a shield for intruders  Intrusion detection systems (IDS)- used to detect unauthorized access, monitor and audit networks Penetration test- process of testing the security measures of a computer network
Strategies and Solutions  (cont’d) Backup- copy data into another location  Business continuity planning (BCP)- organization wide plan that depicts how an organization will recover from interruptions Disaster recovery plan (DRP)- an IT related infrastructure recovery  Appropriate use of portable storage devices  Physical security- closed-circuit television cameras, access control systems
Implications and benefits of network security With the increase in awareness, there is more persuasion from companies  Security policy- document that states the rules related to security that governs an organization  Even home computer users are a part of the crusade Possessing the right education is also very important - CCIE security, CISSP, Comptia Security+, and CCSP  - courses in universities, information from journals and    magazines
Conclusion Regular auditing of IT infrastructure, regular penetration test and periodic examination of the company’s BCP  Adequate network security enhances its reputation, protects stakeholder’s valuable information Network security starts with actions from individual  It’s not a product, it's a process Network security is the responsibility of everyone. It is better to prevent threats than to get rid of

More Related Content

PPTX
Network Security ppt
SAIKAT BISWAS
 
PDF
Network security - OSI Security Architecture
BharathiKrishna6
 
PPTX
Network security
quest university nawabshah
 
PPTX
Network security
Nkosinathi Lungu
 
PPTX
Network security
Estiak Khan
 
PPTX
Network Security
Manoj Singh
 
PPTX
Network security
Madhumithah Ilango
 
PPT
Wireless LAN security
Rajan Kumar
 
Network Security ppt
SAIKAT BISWAS
 
Network security - OSI Security Architecture
BharathiKrishna6
 
Network security
quest university nawabshah
 
Network security
Nkosinathi Lungu
 
Network security
Estiak Khan
 
Network Security
Manoj Singh
 
Network security
Madhumithah Ilango
 
Wireless LAN security
Rajan Kumar
 

What's hot (20)

PPTX
Firewall and Types of firewall
Coder Tech
 
PPT
Network Security
Raymond Jose
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PPT
FireWall
rubal_9
 
PPT
Network management and security
Ankit Bhandari
 
PPTX
Network attacks
Manjushree Mashal
 
PPTX
Network security
Simranpreet Singh
 
PPTX
Network Security Goals
Kabul Education University
 
PPTX
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
PPTX
Fundamentals of Network security
APNIC
 
PPTX
Email security
Baliram Yadav
 
PPTX
Network security
fatimasaham
 
PPTX
CYBER SECURITY
Vaishak Chandran
 
PPTX
Network defenses
Prachi Gulihar
 
PPTX
INFORMATION SECURITY
Ahmed Moussa
 
PPTX
Web Security
Dipika Bambhaniya
 
PPTX
IT Security Presentation
elihuwalker
 
Firewall and Types of firewall
Coder Tech
 
Network Security
Raymond Jose
 
Introduction to Cyber Security
Stephen Lahanas
 
FireWall
rubal_9
 
Network management and security
Ankit Bhandari
 
Network attacks
Manjushree Mashal
 
Network security
Simranpreet Singh
 
Network Security Goals
Kabul Education University
 
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
Fundamentals of Network security
APNIC
 
Email security
Baliram Yadav
 
Network security
fatimasaham
 
CYBER SECURITY
Vaishak Chandran
 
Network defenses
Prachi Gulihar
 
INFORMATION SECURITY
Ahmed Moussa
 
Web Security
Dipika Bambhaniya
 
IT Security Presentation
elihuwalker
 
Ad

Viewers also liked (20)

PPT
Network security
Gichelle Amon
 
PDF
Network Security Presentation
Allan Pratt MBA
 
PPT
NetworkSecurity.ppt
DreamMalar
 
PPT
Network Security Threats and Solutions
Colin058
 
PPTX
Types of netwok_ispravlennaya-ispravlennaya
Vlad Demensky
 
PPT
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
Prince Makhija
 
PPT
Digital Signiture
Vikesh Bawane
 
PPT
Cyptography and network security
Priyanka Karancy
 
PPTX
5 Network Security Threats Facing Businesses Today
Velocity Network Solutions
 
PPTX
What's New In CompTIA Security+ - Course Technology Computing Conference
Cengage Learning
 
PPT
7. physical sec
7wounders
 
PPTX
Raid(redundant array of independent disks).
ali torabi
 
PPTX
Beginner talk physical security - manasdeep
Manas Deep
 
PPT
Chapter 5 Presentation
Amy McMullin
 
PPT
Chapter 8 Presentaion
Amy McMullin
 
PPT
Chapter 6 Presentation
Amy McMullin
 
PPT
Transmission modes & medias networking
VINOTHINI DURAIRAJ
 
PPT
Chapter 9 PowerPoint
Amy McMullin
 
PDF
Ethical Hacking Certification Path You Should Follow
Mercury Solutions Limited
 
PPTX
Rafał Korszuń: Security in Design of Cloud Applications
AnalyticsConf
 
Network security
Gichelle Amon
 
Network Security Presentation
Allan Pratt MBA
 
NetworkSecurity.ppt
DreamMalar
 
Network Security Threats and Solutions
Colin058
 
Types of netwok_ispravlennaya-ispravlennaya
Vlad Demensky
 
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
Prince Makhija
 
Digital Signiture
Vikesh Bawane
 
Cyptography and network security
Priyanka Karancy
 
5 Network Security Threats Facing Businesses Today
Velocity Network Solutions
 
What's New In CompTIA Security+ - Course Technology Computing Conference
Cengage Learning
 
7. physical sec
7wounders
 
Raid(redundant array of independent disks).
ali torabi
 
Beginner talk physical security - manasdeep
Manas Deep
 
Chapter 5 Presentation
Amy McMullin
 
Chapter 8 Presentaion
Amy McMullin
 
Chapter 6 Presentation
Amy McMullin
 
Transmission modes & medias networking
VINOTHINI DURAIRAJ
 
Chapter 9 PowerPoint
Amy McMullin
 
Ethical Hacking Certification Path You Should Follow
Mercury Solutions Limited
 
Rafał Korszuń: Security in Design of Cloud Applications
AnalyticsConf
 
Ad

Similar to Network Security (20)

PPTX
Unit 1 Network Fundamentals and Security .pptx
Guna Dhondwad
 
PPT
Chapter1 intro network_security_sunorganised
Bule Hora University
 
PDF
Understanding the Need of Network Security.pptx (1).pdf
apurvar399
 
PDF
Understanding the Need of Network Security.pptx.pdf
apurvar399
 
PPTX
Computer Security Essentials.pptx
Guna Dhondwad
 
DOCX
Network security
Madhumithah Ilango
 
PPTX
Wireless Networking
GulshanAra14
 
PDF
Network_Security1.pdf.pdf
ahmed53254
 
PPTX
Information security ist lecture
Zara Nawaz
 
PPTX
information security (network security methods)
Zara Nawaz
 
PDF
network_security.docx_2.pdf
ahmed53254
 
DOC
Network security
Ravikumar Natarajan
 
PPT
Network Security, Change Control, Outsourcing
Nicholas Davis
 
PPTX
Network security
Pooja Dewangan
 
PPTX
Network security
hajra azam
 
PPTX
презентация1
sagidullaa01
 
PDF
Fundamentals of Securing Network Devices.pptx.pdf
apurvar399
 
PPT
Network security, change control, outsourcing
Nicholas Davis
 
PDF
Network Security Research Paper
Pankaj Jha
 
PPT
Lecture 2
Education
 
Unit 1 Network Fundamentals and Security .pptx
Guna Dhondwad
 
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Understanding the Need of Network Security.pptx (1).pdf
apurvar399
 
Understanding the Need of Network Security.pptx.pdf
apurvar399
 
Computer Security Essentials.pptx
Guna Dhondwad
 
Network security
Madhumithah Ilango
 
Wireless Networking
GulshanAra14
 
Network_Security1.pdf.pdf
ahmed53254
 
Information security ist lecture
Zara Nawaz
 
information security (network security methods)
Zara Nawaz
 
network_security.docx_2.pdf
ahmed53254
 
Network security
Ravikumar Natarajan
 
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Network security
Pooja Dewangan
 
Network security
hajra azam
 
презентация1
sagidullaa01
 
Fundamentals of Securing Network Devices.pptx.pdf
apurvar399
 
Network security, change control, outsourcing
Nicholas Davis
 
Network Security Research Paper
Pankaj Jha
 
Lecture 2
Education
 

Network Security

  • 1. Network Security Omonigho Palmer-Ikuku , Security+, MCSE: Security, CCNA
  • 2. Outline Introduction Extent of Network security - Types of threats - Types of network security attacks Impact of Network security on companies and organizations Strategies and Solutions Implications and benefits of network security Conclusion
  • 3. Introduction What is a Network? - a group of computers and devices interconnected by communication equipments, software, hardware and paths
  • 4. Introduction (cont’d) Why Network security? - a survey which shows that 85 percent of organizations that responded to the survey discovered breaches in their network security What is a Network Security? - all activities that organizations, individuals, and institutions takes to protect computers assets, data and instill integrity and continuity of operations The CIA abbreviation - Confidentiality: safeguarding of information from unauthorized disclosure - Integrity: safeguarding delicate data from alterations without authorization - Availability: certify that services are available to endorsed users only The reverse of confidentiality, integrity, and availability is disclosure, alteration, and destruction (D.A.D.).
  • 5. Extent of Network security Other Important Concepts - Authenticity: guarantees that data, transactions are unadulterated - Authorization: rights and permission given to individuals to use computers - Identification: Is the way to identify users of a system Larger companies and larger networks are at greater network security risk compared to smaller companies and smaller networks The internet as a medium for doing business and its consequences The effect of breach in information security is usually very horrific
  • 6. Extent of Network security (cont’d) Types of network security threats - Malware: Gotten from two words malicious and software, it’s a software that is built to destroy computers - Social Engineering: a subset of information security is a nontechnical method of hacking into a system or network - Malicious Insiders: more delicate data and records are lost when a there is a network security attack by an insider - Careless Employees: poor training for employees and lack of knowledge on the necessary network security policies Types of network security attacks - Passwords attacks: dictionary attacks and brute-force. The use of strong passwords is highly recommended - IP Address Spoofing: hackers can change the IP address of computers during communication and access networks - Denial-of-Service: attackers denies authorized users access to the network by send unwanted traffic to the network - Packet Sniffer: analyze, display, capture and read network data exchanges and packets
  • 7. Impact of Network security on companies and organizations UK businesses (53%) that suffered security incidents were able to restore normal business operations within a day The rank of information security in the list of executives meetings is increasing Whenever there is a breach in internet security on a company, transactions reduces Negative reaction on the price of the stock Due to the rise of blogs and social technologies, there is more work to secure networks Improper disposal of computer devices and unused documents can be harmful
  • 8. Strategies and Solutions Virtual private network (VPN)- links are provided between nodes to provide remote users secured access to their intended network Cryptography- a subset of encryption, data is transformed into an unreadable format Secure Sockets Layer (SSL)- now known as Transport Layer Security (TLS) is used to provide data integrity and security over the internet Hypertext Transfer Protocol Secure (HTTPS)- is a combination of http and a network security protocol
  • 9. Strategies and Solutions (cont’d) Computer viruses- ability to spread makes it easy to exploit security vulnerabilities Firewalls- serves as a shield for intruders Intrusion detection systems (IDS)- used to detect unauthorized access, monitor and audit networks Penetration test- process of testing the security measures of a computer network
  • 10. Strategies and Solutions (cont’d) Backup- copy data into another location Business continuity planning (BCP)- organization wide plan that depicts how an organization will recover from interruptions Disaster recovery plan (DRP)- an IT related infrastructure recovery Appropriate use of portable storage devices Physical security- closed-circuit television cameras, access control systems
  • 11. Implications and benefits of network security With the increase in awareness, there is more persuasion from companies Security policy- document that states the rules related to security that governs an organization Even home computer users are a part of the crusade Possessing the right education is also very important - CCIE security, CISSP, Comptia Security+, and CCSP - courses in universities, information from journals and magazines
  • 12. Conclusion Regular auditing of IT infrastructure, regular penetration test and periodic examination of the company’s BCP Adequate network security enhances its reputation, protects stakeholder’s valuable information Network security starts with actions from individual It’s not a product, it's a process Network security is the responsibility of everyone. It is better to prevent threats than to get rid of