Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

SECURING YOUR NETWORK

BY SHIKHAR BERIWAL
SECURE NETWORK ARCHITECTURE

• Network hardening should be implemented for strong architecture, network


hardening is the process of securing a network by reducing its potential
vulnerabilities through configuration changes, and taking specific steps.
• WEP encryption should be used, Wired Equivalent Privacy is a security
algorithm for IEEE 802.11 wireless networks.
NETWORK MONITORING

• Network monitoring is the use of a system that constantly monitors a


computer network for slow or failing components and that notifies the
network administrator in case of outages or other trouble
• Wireshark is a free and open-source packet analyzer. It is used for network
troubleshooting, analysis, software and communications protocol
development, and education
SYSTEM HARDENING

• Systems hardening is a collection of tools, techniques, and best practices to reduce vulnerability
in technology applications, systems, infrastructure, firmware, and other areas. The goal of
systems hardening is to reduce security risk by eliminating potential attack vectors and
condensing the system's attack surface.
• A host-based firewall is a piece of firewall software that runs on an individual computer or device
connected to a network. These types of firewalls are a granular way to protect the individual hosts
from viruses and malware, and to control the spread of these harmful infections throughout the
network.
• An anti malware is a software that protects the computer from malware such as spyware, adware,
and worms. It scans the system for all types of malicious software that manage to reach the
computer.
APPLICATION HARDENING

• Application hardening is a process of taking a finished application and making it


more difficult to reverse engineer and tamper. Combined with secure coding
practices, application hardening is a best practice for companies to protect their
app's IP and prevent misuse, cheating, and repackaging by bad users.
• Patch management is the process that helps acquire, test and install multiple
patches (code changes) on existing applications and software tools on a computer,
enabling systems to stay updated on existing patches and determining which
patches are the appropriate ones. Managing patches thus becomes easy and simple.
CONGRATULATIONS! YOU HAVE COMPLETED WEEK 4
4

You might also like