networks security networks security cs.pptx

rahulreddygummadi 6 views 9 slides Jul 21, 2024
Slide 1
Slide 1 of 9
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9

About This Presentation

aaa


Slide Content

NETWORK SECURITY SUBMITTED BY: G.Rahul Reddy 21P61A1250 IT-A

CONTENTS: INTRODUCTION TYPES OF NETWORK SECURITY ADVANTAGES DISADVANTAGES CONCLUSION

INTRODUCTION: Network security consists of the  polices, procesess  and practices adopted to prevent, detect and monitor access,  misuse , modification, or denial of a  computer network  and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the  network administrator . Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. 

TYPES: 1. Firewall Firewalls  filter the traffic on your network. They work to prevent and block unauthorized internet traffic. 2. Network Segmentation Network segmentation divides a network into multiple sections, and each section then acts as their own individual networks 3. Access Control Access control gives you the ability to grant or deny access to individual users based on their responsibilities within your network. 4. Remote Access VPN A remote access virtual private network (VPN) provides integrity and privacy of information by utilizing endpoint compliance scanning,  multi-factor authentication (MFA) , and transmitted  data encryption .

TYPES: 5. Zero-Trust Network Access (ZTNA) The  Zero Trust Network  grants specific access to an individual user based on the exact role they play within the network. 6. Email Security Email security  is set up to prevent users from unknowingly providing sensitive information or allowing access to the network via a malware-infected email. 7. Data Loss Prevention (DLP) DLP  is a network security technology that aids in preventing sensitive information from accidentally being leaked outside of the network by users.

ADVANTAGES: Protects against cyber attacks Access levels Keep your data safe Updates are now centralized Centrally managed

Disadvantages : Setup is expensive It takes time Incompetent administration

CONCLUSION: Internet connectivity, email and the web, now vital for small business, pose many risks to computer system and the privacy of the company’s data. The onslaught of viruses, worms compounded with the increasing problem of spyware, adware, and blended threats continue to attack an organization’s network through multiple methods.
Tags