Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

Network Security

001
Table of Contents
01 Network and Network Security 02 Firewalls

03 Intrusion Detection and 04 Virtual Private


Prevention Systems Networks

Data Backups and Cloud


05
Computing
002
Networks
Interconnected systems that allow
communication, data sharing, and
resource access between various entities
such as computers, devices, or
individuals

003
Types of Networks
Local Area Network (LAN)
a network that connects devices within a limited area such as a home,
office, or school.

Metropolitan Area Network (MAN)


a network that covers a larger geographical area than a LAN but
smaller than a WAN, typically spanning a city or metropolitan area.

Wide Area Network (wAN)


a network that spans a large geographical area, connecting multiple
LANs and MANs across cities, countries, or continents.
Network Security
measures to protect computer
networks, data, and resources from
unauthorized access, misuse,
modification, or disruption.

005
Key Aspects of Network Security
Confidentiality
Ensuring that only authorized users can access sensitive information.

Integrity
Guaranteeing the accuracy and reliability of data transmitted over the network.

Availability
Ensuring that network resources and services are accessible to authorized users
when needed.
Common Network Security Threats
Malware
- short for malicious software, refers to any software intentionally designed
to cause damage, steal data, or disrupt normal computer operations. Common types of
malware are viruses, worms, trojans, and ransomware.

Phishing Attacks
- is a form of social engineering attack in which attackers use deceptive
techniques to trick individuals into disclosing sensitive information, such as login
credentials, financial details, or personal data.

Denial of Service (DoS) Attacks


- DoS attacks aim to disrupt or degrade the availability of network resources
or services, making them inaccessible to legitimate users. Attackers overwhelm
target systems with excessive traffic or requests, causing them to become
unresponsive or crash.
Network Security Measures

Intrusion Detection and Virtual Private


Firewall Prevention System Networks (VPN)
(IDPS)
Firewall
security devices or software that monitor and control
incoming and outgoing network traffic based on predetermined
security rules.

009
Intrusion Detection and Prevention
Systems (IDPS)
It is a security solution that combines the capabilities of
intrusion detection systems (IDS) and intrusion prevention
systems (IPS) into a single integrated platform. IDPS is designed
to monitor network traffic, analyze system activities, and detect
and respond to security threats in real-time.

00
10
Intrusion Detection Intrusion Prevention
System (IDS) System (IPS)
is a security tool or system is an advanced security tool or
designed to monitor network or system that extends the capabilities
system activities for signs of of IDS by actively blocking or
potential security incidents or preventing detected threats from
unauthorized access attempts. reaching their targets.
Virtual Private Network (VPN)
is a technology that allows users to create a secure and
encrypted connection to another network over the internet. VPNs
are commonly used to protect sensitive data, maintain privacy,
and ensure secure communication, especially when accessing public
or untrusted networks.

00
12
Data Backups and Cloud Computing
are complementary technologies that help organizations manage
and protect their data effectively, ensuring data availability,
security, and resilience in the face of evolving threats.

00
13
Data Backups

process of copying and storing


important data to a secondary location
or medium to protect against data loss
due to accidental deletion, hardware
failure, theft, or other unforeseen
events.

00
14
Types of Data Backups
Full Backup
A complete copy of all data is created at a specific point in time.

Incremental Backup
Only the changes made since the last backup are copied, reducing storage
requirements and backup time.

Differential Backup
Copies all changes made since the last full backup, allowing for faster
restoration compared to incremental backups.
Cloud Computing
is the delivery of computing
services such as servers, storage,
databases, networking, software, and
analytics over the internet ("the
cloud") on a pay-as-you-go basis.

00
16
Service Models
Infrastructure as a Service (IaaS)
Provides virtualized computing resources (servers, storage, networking) as on-
demand services.

Platform as a Service (PaaS)


Offers development platforms and tools for building, deploying, and managing
applications without worrying about underlying infrastructure.

Software as a Service (SaaS)


Delivers software applications over the internet on a subscription basis,
eliminating the need for local installation and maintenance.
THANK YOU
00
18

You might also like