Uploaded on Sep 2, 2021
PPT on Network Security.
Network Security
NETWORK SECURITY
What is Network Security?
• Network Security protects your network and data from breaches, intrusions and other threats. This is
a vast and overarching term that describes hardware and software solutions as well as processes or
rules and configurations relating to network use, accessibility, and overall threat protection.
Source: www.checkpoint.com
Why Network Security?
• Network Security involves access control, virus and antivirus software, application security, network
analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and
more.
Source: www.checkpoint.com
Benefits of Network Security
• Network Security is vital in protecting client data and information, keeping shared data secure and
ensuring reliable access and network performance as well as protection from cyber threats.
• A well designed network security solution reduces overhead expenses and safeguards organizations
from costly losses that occur from a data breach or other security incident.
Source: www.checkpoint.com
TYPES OF NETWORK SECURITY DEVICES AND TOOLS
Access control
• This refers to controlling which users have access to the network or especially sensitive sections of
the network.
• Using security policies, you can restrict network access to only recognized users and devices or grant
limited access to noncompliant devices or guest users.
Source: www.n-able.com
Antivirus and anti-malware software
• Malware, or “malicious software,” is a common form of cyberattack that comes in many different
shapes and sizes.
• Some variations work quickly to delete files or corrupt data, while others can lie dormant for long
periods of time and quietly allow hackers a back door into your systems.
Source: www.n-able.com
Application security
• Each device and software product used within your networking environment offers a potential way in
for hackers.
• For this reason, it is important that all programs be kept up-to-date and patched to prevent
cyberattacks from exploiting vulnerabilities to access sensitive data.
Source: www.n-able.com
Behavioral analytics
• In order to identify abnormal behavior, security support personnel need to establish a baseline of
what constitutes normal behavior for a given customer’s users, applications, and network.
Source: www.n-able.com
Data loss prevention
• Data loss prevention (DLP) technologies are those that prevent an organization’s employees from
sharing valuable company information or sensitive data whether unwittingly or with ill intent outside
the network.
Source: www.n-able.com
Distributed denial of service prevention
• Distributed denial of service (DDoS) attacks are becoming increasingly common. They function by
overloading a network with one-sided connection requests that eventually cause the network to
crash.
Source: www.n-able.com
Email security
• Email is an especially important factor to consider when implementing networking security tools.
Numerous threat vectors, like scams, phishing, malware, and suspicious links, can be attached to or
incorporated into emails.
Source: www.n-able.com
Comments