SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Network Security

10/30/2013

A presentation by Nkosinathi Lungu

1
Why Network Security?

We need our networks secured because there are a lot of threats to networks
from hackers and software’s. Our networks hold a lot of data some of which is
confidential and could lead industry sabotage and espionage and so it must be
protected.

10/30/2013

A presentation by Nkosinathi Lungu

2
Common Security Threats
There are several threats to computer networks some of the most common being;
 Viruses Worms and Trojans
 Spyware and Adware
 Hacker Attacks
 Denial of Service Attacks
 Data interception and theft
 Identity Theft

10/30/2013

A presentation by Nkosinathi Lungu

3
Securing the Network
There are several ways in which we can ensure that our networks stay secure like;
 Authentication: All users of the network must enter some credentials to prove
that they have authority to access what’s on the network
 Firewalls: Once a user logs on a firewall can ascertain what rights the user has
on the network and what resources are available to that user.
 Antivirus and Antispyware: Also essential for the network security as this will
be able to block any malicious software that tries to run on your machine
 Password Policies: Users should be prompted to change their passwords at
least every other month.

10/30/2013

A presentation by Nkosinathi Lungu

4
Securing the Network continued
 Network Analyzer: This can be used to monitor who is logged onto the
network and what resources they are accessing
 Network Key: In the case of wireless networks it’s important that users must
enter a network key before being allowed on the network.
 Encryption: encryption software can be installed on the networks so that any
outsider accessing the information won’t be able to read it.
 Physical Access to data areas: All places with terminals on the network must
be secured so that no one can just access them

10/30/2013

A presentation by Nkosinathi Lungu

5
Servers
What is a Server?

 A server is a system either hardware or software that responds to requests
across a network to provide services
 Servers are central to a network as they hold all the data from user access data
to personal and the organizations data.

10/30/2013

A presentation by Nkosinathi Lungu

6
Server Room
What is a Server room?

 A server room is a room where the organizations servers are kept and as such
they need to be secured
 Server Rooms can also be used to keep backups as well as house switches and
routers

10/30/2013

A presentation by Nkosinathi Lungu

7
Securing the Server Room
Some ways to secure server rooms are;
 Isolation: It is important that the server room is isolated and kept away form
human traffic
 Physical Access: Users should authenticate themselves before entering the
server room. There are several ways to do this like keycards, Door access code
locks or biometrics like fingerprint.
 Monitoring: If possible have cameras in and around the server room so that
you can monitor who is accessing the room.
 Server Racks: Keep servers in racks as they are secure and can be locked that
way even if someone breaks into your server room they can’t access the
server.

10/30/2013

A presentation by Nkosinathi Lungu

8
Securing the Server Room Continued
 Smoke Detectors: In case of a fire the smoke detectors will go off and the fire
can be put off before any damage is done.
 Elevation: Make sure that the servers are all off the ground so that in the event
of flooding there is less likelihood of them getting affected.
 Air Conditioning: Servers like other computers produce heat and depending
on the traffic they get they can get really hot so it’s important that the server
room is air conditioned
 Windows: Ensure that there are no windows to the server room or if there are
they should be well secured
 Password Lockouts: It is advisable to set your servers so that they can lock
after a few failed log in attempts.

10/30/2013

A presentation by Nkosinathi Lungu

9
Summary
 We see that it is important to secure our networks for various reasons because
they are used to store sensitive and important data which we want to keep
secure as it might be used for malicious intent in the wrong hands.

10/30/2013

A presentation by Nkosinathi Lungu

10

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Was ist angesagt? (20)

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network security
Network securityNetwork security
Network security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Information security
Information securityInformation security
Information security
 
Information security
Information securityInformation security
Information security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Network security
Network security Network security
Network security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber security
cyber securitycyber security
cyber security
 

Andere mochten auch

Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 

Andere mochten auch (18)

Network Security
Network SecurityNetwork Security
Network Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Ähnlich wie Network security

2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
vickeryr87
 

Ähnlich wie Network security (20)

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
01
01 01
01
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
03 cia
03 cia03 cia
03 cia
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
secued cloud
 secued cloud secued cloud
secued cloud
 
What is fire wall and how it works
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it works
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 

Mehr von Nkosinathi Lungu (6)

NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overview
 
I.T project challenges
I.T project challengesI.T project challenges
I.T project challenges
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Life of a freelancer
Life of a freelancerLife of a freelancer
Life of a freelancer
 
I.T t shirts
I.T t shirtsI.T t shirts
I.T t shirts
 
Health information systems (his)
Health information systems (his)Health information systems (his)
Health information systems (his)
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Network security

  • 2. Why Network Security? We need our networks secured because there are a lot of threats to networks from hackers and software’s. Our networks hold a lot of data some of which is confidential and could lead industry sabotage and espionage and so it must be protected. 10/30/2013 A presentation by Nkosinathi Lungu 2
  • 3. Common Security Threats There are several threats to computer networks some of the most common being;  Viruses Worms and Trojans  Spyware and Adware  Hacker Attacks  Denial of Service Attacks  Data interception and theft  Identity Theft 10/30/2013 A presentation by Nkosinathi Lungu 3
  • 4. Securing the Network There are several ways in which we can ensure that our networks stay secure like;  Authentication: All users of the network must enter some credentials to prove that they have authority to access what’s on the network  Firewalls: Once a user logs on a firewall can ascertain what rights the user has on the network and what resources are available to that user.  Antivirus and Antispyware: Also essential for the network security as this will be able to block any malicious software that tries to run on your machine  Password Policies: Users should be prompted to change their passwords at least every other month. 10/30/2013 A presentation by Nkosinathi Lungu 4
  • 5. Securing the Network continued  Network Analyzer: This can be used to monitor who is logged onto the network and what resources they are accessing  Network Key: In the case of wireless networks it’s important that users must enter a network key before being allowed on the network.  Encryption: encryption software can be installed on the networks so that any outsider accessing the information won’t be able to read it.  Physical Access to data areas: All places with terminals on the network must be secured so that no one can just access them 10/30/2013 A presentation by Nkosinathi Lungu 5
  • 6. Servers What is a Server?  A server is a system either hardware or software that responds to requests across a network to provide services  Servers are central to a network as they hold all the data from user access data to personal and the organizations data. 10/30/2013 A presentation by Nkosinathi Lungu 6
  • 7. Server Room What is a Server room?  A server room is a room where the organizations servers are kept and as such they need to be secured  Server Rooms can also be used to keep backups as well as house switches and routers 10/30/2013 A presentation by Nkosinathi Lungu 7
  • 8. Securing the Server Room Some ways to secure server rooms are;  Isolation: It is important that the server room is isolated and kept away form human traffic  Physical Access: Users should authenticate themselves before entering the server room. There are several ways to do this like keycards, Door access code locks or biometrics like fingerprint.  Monitoring: If possible have cameras in and around the server room so that you can monitor who is accessing the room.  Server Racks: Keep servers in racks as they are secure and can be locked that way even if someone breaks into your server room they can’t access the server. 10/30/2013 A presentation by Nkosinathi Lungu 8
  • 9. Securing the Server Room Continued  Smoke Detectors: In case of a fire the smoke detectors will go off and the fire can be put off before any damage is done.  Elevation: Make sure that the servers are all off the ground so that in the event of flooding there is less likelihood of them getting affected.  Air Conditioning: Servers like other computers produce heat and depending on the traffic they get they can get really hot so it’s important that the server room is air conditioned  Windows: Ensure that there are no windows to the server room or if there are they should be well secured  Password Lockouts: It is advisable to set your servers so that they can lock after a few failed log in attempts. 10/30/2013 A presentation by Nkosinathi Lungu 9
  • 10. Summary  We see that it is important to secure our networks for various reasons because they are used to store sensitive and important data which we want to keep secure as it might be used for malicious intent in the wrong hands. 10/30/2013 A presentation by Nkosinathi Lungu 10