Download as pdf or txt
Download as pdf or txt
You are on page 1of 40

Ways to protect

the network and


keep privacy of
users
Team 2
Phan Nguyen Quoc Anh
01 04 Vo Minh Phuong

Nguyen Tai Nguyen 02 05 Nguyen Dinh Thang

Pham Hoang Nhon 03 06 Cao Ngoc Quy


CONTENTS

Ways to protect the network


- Firewalls and IDS, IPS
- VPN Encryption
- Regular Software Updates and Patch Management
- Access Control and Strong Authentication
- Regular Security Audits and Penetration Testing
- Backup and Disaster Recovery
CONTENTS

Ways to keep privacy of users


- Data Minimization
- Transparency and Consent
- Psudonymization and Anonymization
- Secure Data Storage
- User Education
Firewalls
and IDS, IPS
DEFINITION

A firewall is a network
security device or
software that monitors
and controls incoming
and outgoing network
traffic based on
predetermined security
rules
FUNCTIONS OF FIREWALL

Packet Filtering Stateful Inspection Proxying


Inspect packets of data keep track of the state act as intermediaries
and determine whether of active connections between clients and
to allow them through and make decisions servers, forwarding
based on predefined based on the context of requests and responses
rules. the traffic. to enhance security.
DEFINITION

An Intrusion Detection
System (IDS) and an
Intrusion Prevention
System (IPS) are security
tools designed to identify
and respond to malicious
activities and security
threats within a network.
FUNCTIONS OF IDS

Alerting Passive

Monitoring Analysis
FUNCTIONS OF IPS

Preventions Automatic Real-time


Responeses Protection
VPN
Encryption
DEFINITION

use various encryption


techniques to secure data
transmitted between a user's
device and the VPN server

ensures that data remains private


and secure as it travels over the
internet
KEY ASPECTS OF VPN ENCRYPTION

Tunneling
Protocols

Authentication Key Exchange


Protocols
Regular
Software
Updates and
Patch
Management
DEFINITION

critical aspects of network


security

involve keeping all


software and systems up-
to-date
Patch Automated
Management Attacks

Security Risk
Vulnerabilities Mitigation
Access Control
and Strong
Authentication
DEFINITION

Access control and strong


authentication are
fundamental to safeguarding
network resources and user
privacy
Access Control and Strong Authentication

Access Control Single Sign-On Regular


Policies Auditing

User Roles and Multi-Factor


Permissions Authentication
Regular
Security Audits
and
Penetration
Testing
Penetration Testing

FREQUENCY BENEFITS

PURPOSE PROCESS
Backup and
Disaster
Recovery
TYPES OF BACKUP

Incremental
Backup

Full Backup Differential


Backup
Disaster Recovery

A broader strategy that includes


processes, policies, and tools for
recovering and restoring IT systems
and data after a disaster or
significant disruption
Components

Recovery Time Disaster


Objective (RTO) Recovery Plan
(DRP)

Recovery Point Testing


Objective (RPO)
Data
Minimization
DEFINITION

involves limiting data collection to


only what is required to fulfill a
specific purpose

a direct way to limit privacy


leakage
Three-pronged approach

Discover Data Control Data Activate Data


Transparency and Consent

A set of technical specifications


and policies to which publishers,
advertisers, technology providers

It is a policy when people using


service of many websites in
internet

It makes sure that user data is used


probably for right purpose
Anonymization and
Pseudonymization
Pseudonymization

Pseudonymization is the process of


removing personal identifiers from
data and replacing those identifiers
with placeholder values

used for protecting


personal privacy or improving
data security
Anonymization

a process of
transforming sensitive
personal information
into anonymous data

This process involves


removing or editing PII
(Personally Identifiable
Information)
Anonymization

Direct identifiers Indirect identifiers


Secure Data
Storage
DEFINITION

used to ensure stored data


security and integrity

applies to data at rest stored in


computer/server hard disks,
portable devices – like external
hard drives or USB drives
SECURE DATA STORAGE
● Data Encryption
● Access control mechanism at each
data storage device/software
● Protection against viruses, worms and
other data corruption threats
● Physical/manned storage device and
infrastructure security

● Enforcement and implementation of


layered/tiered storage security
architecture
USER
EDUCATION
USER EDUCATION

Understanding Mitigating Human Increased


the Risks Error Awareness

Compliance Business
Requirements Continuity
THANKS
FOR
LISTENING!
CREDITS: This presentation template was created
by Slidesgo, including icons by Flaticon,
infographics & images by Freepik and
illustrations by Stories

You might also like