SlideShare ist ein Scribd-Unternehmen logo
1 von 12
NETWORK SECURITY
• It Protect the usability, reliability, integrity,
and safety of your network and data.
• Effective network security targets a variety of
threats and stops them from entering or
spreading on your network.
• Many network security threats today are
spread over the Internet.
• Network Security - measures to protect data
during their transmission
The most common threats include:
• Viruses, worms, and Trojan horses
• Spyware and adware
• Zero-day attacks, also called zero-hour attacks
• Hacker attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
• Network security is accomplished through
hardware and software.
Software must be constantly updated and
managed to protect you from emerging
threats.
Hardware usually consists of many
components. Ideally, all components work
together, which minimizes maintenance and
improves security.
Examples
 SOFTWARE :
• Anti-virus and anti-spyware
• Firewall, to block unauthorized access to your
network
 HARDWARE :
• Intrusion prevention systems (IPS), to identify
fast-spreading threats
• Virtual Private Networks (VPNs), to provide
secure remote access
THREATS
• With an increasing amount of people getting
connected to networks, the security threats that
cause massive harm are also increasing.
• Network security is a major part of a network that
needs to be maintained because information is being
passed between computers,devices,etc and is very
vulnerable to attack..
• Over the past five years people that manage
network security have seen a massive increase
of hackers and criminals creating malicious
threats that have been pumped into networks
across the world.
The biggest network threats:
• Viruses and Worms
• Trojan Horses
• SPAM
• Phishing
• Packet Sniffers
• Maliciously Coded Websites
• Password Attacks
• Hardware Loss and Residual Data Fragments
• Shared Computers
• Zombie Computers and Botnet
Virus & Worm
• A Virus is a program or piece of code that is loaded
onto your computer without your knowledge and
runs against your wishes.
• Viruses can cause a huge amount of damage to
computers.
• A worm is similar to a virus but a worm can run itself
whereas a virus needs a host program to run.
• Solution: Install a security suite, such as Kaspersky
Total Protection, that protects the computer against
threats such as viruses and worms.
Trojan Horse
• A Trojan Horse is “a program in which malicious
or harmful code is contained inside apparently
harmless programming or data in such a way that
it can get control and do its chosen form of
damage, such as ruining the file allocation table
on your hard disk.
• Solution: Security suites, such as Norton Internet
Security, will prevent you from downloading Trojan
Horses
SPAM
• SPAM is “flooding the Internet with many
copies of the same message, in an attempt to
force the message on people who would not
otherwise choose to receive it.
• Solution: SPAM filters are an effective way to
stop SPAM, these filters come with most of
the e-mail providers online.
Phising
• Phishing is “an e-mail fraud method in which
the perpetrator sends out legitimate-looking
emails in an attempt to gather personal and
financial information from recipients.
• Solution: Similar to SPAM use Phishing filters
to filter out this unwanted mail and to prevent
threat.
Password Attackers
• Password attacks are attacks by hackers that are

able to determine passwords or find passwords
to different protected electronic areas.
• Many systems on a network are password
protected and hence it would be easy for a
hacker to hack into the systems and steal data.
This may be the easiest way to obtain private
information because you are able to get software
online that obtains the password for you.

Weitere ähnliche Inhalte

Was ist angesagt?

Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 

Was ist angesagt? (20)

Cyber attack
Cyber attackCyber attack
Cyber attack
 
Network security
Network securityNetwork security
Network security
 
Adware
AdwareAdware
Adware
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security
Network SecurityNetwork Security
Network Security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Spyware
SpywareSpyware
Spyware
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Network Security
Network SecurityNetwork Security
Network Security
 

Andere mochten auch

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)
gmolina200
 

Andere mochten auch (20)

Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Stallings Kurose and Ross
Stallings Kurose and RossStallings Kurose and Ross
Stallings Kurose and Ross
 
network security
network securitynetwork security
network security
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Integrating Reliability into an Asset Integrity Dashboard
Integrating Reliability into an Asset Integrity DashboardIntegrating Reliability into an Asset Integrity Dashboard
Integrating Reliability into an Asset Integrity Dashboard
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Ch05
Ch05Ch05
Ch05
 
Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)
 
data communication
data communicationdata communication
data communication
 
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriyaInformation and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
 
Do you know about cat 8 cable
Do you know about cat 8 cableDo you know about cat 8 cable
Do you know about cat 8 cable
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
 
Ch 1
Ch 1Ch 1
Ch 1
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 

Ähnlich wie Security

Ähnlich wie Security (20)

Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
презентация1
презентация1презентация1
презентация1
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
information about virus
information about virusinformation about virus
information about virus
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Security

  • 1. NETWORK SECURITY • It Protect the usability, reliability, integrity, and safety of your network and data. • Effective network security targets a variety of threats and stops them from entering or spreading on your network. • Many network security threats today are spread over the Internet. • Network Security - measures to protect data during their transmission
  • 2. The most common threats include: • Viruses, worms, and Trojan horses • Spyware and adware • Zero-day attacks, also called zero-hour attacks • Hacker attacks • Denial of service attacks • Data interception and theft • Identity theft
  • 3. • Network security is accomplished through hardware and software. Software must be constantly updated and managed to protect you from emerging threats. Hardware usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.
  • 4. Examples  SOFTWARE : • Anti-virus and anti-spyware • Firewall, to block unauthorized access to your network  HARDWARE : • Intrusion prevention systems (IPS), to identify fast-spreading threats • Virtual Private Networks (VPNs), to provide secure remote access
  • 5. THREATS • With an increasing amount of people getting connected to networks, the security threats that cause massive harm are also increasing. • Network security is a major part of a network that needs to be maintained because information is being passed between computers,devices,etc and is very vulnerable to attack..
  • 6. • Over the past five years people that manage network security have seen a massive increase of hackers and criminals creating malicious threats that have been pumped into networks across the world.
  • 7. The biggest network threats: • Viruses and Worms • Trojan Horses • SPAM • Phishing • Packet Sniffers • Maliciously Coded Websites • Password Attacks • Hardware Loss and Residual Data Fragments • Shared Computers • Zombie Computers and Botnet
  • 8. Virus & Worm • A Virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. • Viruses can cause a huge amount of damage to computers. • A worm is similar to a virus but a worm can run itself whereas a virus needs a host program to run. • Solution: Install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms.
  • 9. Trojan Horse • A Trojan Horse is “a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. • Solution: Security suites, such as Norton Internet Security, will prevent you from downloading Trojan Horses
  • 10. SPAM • SPAM is “flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. • Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of the e-mail providers online.
  • 11. Phising • Phishing is “an e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. • Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent threat.
  • 12. Password Attackers • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas. • Many systems on a network are password protected and hence it would be easy for a hacker to hack into the systems and steal data. This may be the easiest way to obtain private information because you are able to get software online that obtains the password for you.