You are on page 1of 12

PRESENTATION

Information Security
Security Technologies
Firewalls

• Firewalls are systems designed to prevent unauthorized access to


and from a private network.
• Firewalls can be implemented in either hardware or software form
or in a combination of both.
• Firewalls prevent unauthorized internet users from accessing
private networks connected to the internet, especially intranets.
Types of firewalls

• Packet filtering: The system examines each packet entering or


leaving the network and accepts or rejects it based on user-
defined rules.
• Circuit-level gateway implementation: This process applies
security mechanisms when a TCP or UCP connection is established.
• Proxy server: A type of gateway that hides the true network
address of the computer(s) connecting through it.
Importance of firewalls

• Monitors all network traffic and identifies and blocks unwanted


traffic.
• Stops virus attacks
• Prevents hacking
• Stops spyware
VPNs

• VPN stands for Virtual Private Network. VPNs establish a protected


network connection when using public networks.
• VPNs encrypt internet traffic and disguises user’s online identity.
• VPN encryption takes place in real time, making it difficult for
third parties to track user’s online activities and steal data.
• VPNs hide IP addresses by letting the network redirect it through a
specially configured remote server run by a VPN host.
Benefits of a VPN

• Secure encryption: with the help of a VPN, online activities are


hidden even on public networks.
• Disguising user’s whereabouts: VPNs do not store logs of user’s
activities, this means that any potential record of user’s online
behavior remains hidden.
• Access to regional content: With VPN location spoofing, users can
switch to a server to another country and effectively change their
location.
Why you should use a VPN connection

• Your ISP usually sets up your connection when you connect to the
internet. It tracks you via an IP address. Your network traffic is
routed through ISP’s servers, which can log and display everything
you do online.
What should a good VPN do?

• Encrypt your IP address


• Encrypt protocol
• Kill switch
• Two-factor authentication
Wireless network security

• Wireless network security is the process of designing, implementing and ensuring


security on wireless computer network.
• It is a subset of network security that adds protection for a wireless computer network.
• Network security primarily protects a wireless network from unauthorized and
malicious access attempts.
• Typically, wireless network security is delivered through wireless devices that encrypts
and secures all wireless communication by default.
• Even if the wireless network security is compromised, the hacker is not able to view
the content of the traffic/packet in transit.
• Moreover, wireless intrusion detection and prevention systems also enable protection
of a wireless network administrator in case of a security breach.
IT risks

• IT risks can either be internal or external. These risks include


hardware and software failure, human error, spam, viruses and
malicious attacks, as well as natural disasters such as fires,
cyclones or floods.
• It risks can negatively impact any business that relies on
information technology systems such as computers and networks
for key business activities.
General IT threats

• Hardware and software failure: such as power loss or data corruption.


• Malware: malicious software designed to disrupt a computer
operation.
• Viruses: computer code that can copy itself and spread from one
computer to another.
• Spam, scams and phishing: unsolicited email that seeks to fool people
into revealing personal details or buying fraudulent goods.
• Human error: incorrect data processing, careless data disposal, or
accidental opening of infected email attachments
IT Risk Management

• IT risk management is the policies, procedures and technology


adapted In order to reduce the threats, vulnerabilities and
consequences that could arise if data is not protected.
• IT Risk Management serves as a guideline for IT security teams to
implement the technical controls they need to help avoid or lessen
the impact of a catastrophic data breach.
• IT risk management is not something that lies with the IT security,
its an imperative that the whole organization must own.

You might also like