topics NETWORK AND INTERNET CONCEPTS OF LAN + STORAGE CYBERSECURITY FUNDAMENTALS ( firewalls, encryption and basic threats) 2
Networking and internet
4 networking Network involves connecting two or more computing devices, such as computers, smartphones, or servers, to share resources and information. The components of networking includes: IP address- a unique identifier for each device on a network. Nodes- Connection points like computers, printers or switches that can send receive or store data. Routers- devices that can direct data packets between networks. Switches- device that manage data flow within a network.
INTERNET INTERNET- Is a global system of interconnected networks that use the Internet Protocol (IP) suite to communication. It enables a vast range of services such as: - World Wide Web (WWW) - Email - File sharing - VoIP 5
LAN Is a group of devices that are connected in a single physical location, such as home, office, or buildings. The concept of a LAN is to allow devices to share resources, connect to other devices and access restricted information. Concepts of LAN can be wireless, wired LANS use ethernet cables and a network switch while wireless LANS use Wi-Fi. STORAGE – LANs store files on a server, which is similar to hard drive but is kept in a secure location. The server manages file storage, network traffic, and device application access. 6
CYBERSECURITY FUNDAMENTALS 7 CYBERSECURITY - Is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.
FIREWALLS FIREWALLS - are security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules. FIREWALLS can be hardware-based, software-based or a combination of both that helps prevent unauthorized access to or form private network and can block malicious traffic. 8 Types of wirewalls - Packet-Filtering Firewalls - Stateful Inspection Firewalls - Proxy Firewalls
ENCRYPTION Encryption is the process of converting data into a coded format to prevent unauthorized access. It is essential for protecting sensitive data, both in transit and at rest. 9 Types of encryption -Symmetric Encryption- it is fast and suitable for encrypting large amounts of data -Asymmetric Encyption - it is more secure but slower, often used for securing small amounts of data
COMMON CYBERSECURITY THREATS 10 MALWARE – Malicious software design to damage, disrupt or gain unauthorized access to computer systems. PHISHING – A technique used to trick individuals into providing sensitive information by pretending to be a trustworthy entity. SOCIAL ENGINEERING – Manipulates individuals into divulging confidential information or performing actions that compromise security. MAN-IN-THE-MIDDLE(MitM) ATTACKS – Intercepting and altering communication between two parties without their knowledge. DENIAL-OF-SERVICE-(DoS) ATTACKS – overwhelming a system or network with traffic to make it unavailable to users.
THANK YOU REYNANT MORALES JHON VERGO MILCA RICHMONDE SULTAN MARY KRISTINE SANTIAGO MARGARETTE CASIPONG JUNRIC CAMACHO BENJ THIMOTY VALONZO SHANE STEVEN PALOMA JOSHUA GARCIA BARON 11