You are on page 1of 18

Network

Security
• Definition of Network Security

It is any activity designed to protect


the usability and integrity of your
network and data. It includes both
hardware and software technologies.
Effective network security manages
access to the network. It targets a
variety of the threats and stops them
from entering and spreading in your
network.
Information Security which protect
Security which protecting general assets.
information and information
resources

It
or k
s, appl include
t w icat s
n t ne rk ions all net
r e (not /data u work d
d i ffe netwo til ev
on d just
“com izing a ices,
ai nly cols an
es m proto cations pute netw
cu s k
It fo networ appl
i What is rs ” ) ork

Network
It inc
Security? on e s
A’s , MP3
, P D e ts , e t c .
g
.
r
vulne ludes APP l u l a r ph led gad ompute
rabili LICA l ab rc
ties a e s ce w s e r en n d o t h e
lso th TION LAY l u d
Inc rs, bro
satell e E a rds a re.
ites a routes, swi R e
play networ hardwa k c
nd etc tches
. , Even

Network Security which protect data, It is not just also about hackers
hardware, software on a computer attacks
network.
How does Network Security works?

Network Security combines multiple layers


of defenses at edge and in the network. Each
network security layer implements policies
and controls. Authorized users gain access
to network resources, but malicious actors
are blocked form carrying out exploits and
threats.
• How do I benefits from the network security?

Digitization has transformed our world. How we


live, work, play, and learn have all changed. Every
organization that wants to deliver the services that
customers and employees demand must protect its
network. Network security also help you to
protect proprietary information from attack.
Ultimately it protects your reputation.
• The Three D’s of Security

DETERRENCE – ( laws against


Defense - (instinctive and always precedes
violators)
others)
 Reduces frequency of the security
 Reduces likelihood of successful
compromises
security compromises
 E.g., threats of discipline and
 E.g., firewalls ACLs, spam and virus
termination of the employees for
filters, etc.
violation of policies

DETECTION
 Without that a security breach may go
unnoticed for hours, days or even forever
 E.g., auditing and logging, IDs, etc.
• The Types of Network
Security
Not every user should have access to your network. To keep
 Access control out potential attackers, you need to recognize each user and
each device. Then you can enforce your security policies.
You can block noncompliant endpoint devices or give them
only limited access.

“MALWARE” short for “malicious software” includes


 Antivirus and viruses,worms,trojans,ransomware,and spyware. Sometimes
antimalware malware will infect a network but lie dormant for days or even
software weeks. The best antimalware programs not only scan for
malware upon entry but also continuously track files afterward
to find anomalies, remove malware and fix damage.

Any software you use needs to be protected. Unfortunately,


 Application any application may contain holes, or vulnerabilities, that
security attackers can use to infiltrate your network. Application
security encompasses the hardware, software, and
processes you use to close those holes.
 Behavioral To detect abnormal network behavior, you must know
what normal behavior looks like. Behavioral analytics
Security tools automatically discern activities that deviate from
the norm. Your security team can then better identify
indicators of compromise that pose a potential problem
and quickly remediate threats.

 Data Loss Organizations must make sure that their staff does not
Prevention send sensitive information outside the network. Data
loss prevention, or DLP, technologies can stop people
from uploading, forwarding, or even printing critical
information in an unsafe manner.

 Email Security Email gateways are the number one threat vector for a
security breach. Attackers use personal information
and social engineering tactics to build sophisticated
phishing campaigns to deceive recipients and send
them to sites serving up malware. A email security
application blocks incoming attacks and controls
outbound messages to prevent the loss of sensitive data.
Firewalls put up a barrier between your trusted internal and
 Firewalls untrusted outside networks, such as the internet. They use a set of
defined rules to allow or block traffic. A firewalls can be hardware,
software, or both. Cisco offers unified threat management (UTM)
devices and threat focused next-generation firewalls

A web security solution will control your staff’s web use, block web-
 Web Security based threats, and deny access to malicious websites. It will protect
your web gateways on site or in the cloud.
- Also refers to the steps you take to protect your own website.

Wireless networks are not as secure as wired ones. Without


 Wireless stringent security measures, installing a wireless LAN can be like
Security putting Ethernet ports everywhere, including the parking lot. To
prevent an exploit from taking hold, you need products specially
designed to protect a wireless network.
 Network Software- defined segmentation puts network traffic
into different classifications and makes enforcing
Segmentation
security policies easier. Ideally, the classifications
are based on endpoint identity, not mere IP
addresses. You can assign access rights based ion
role, location, and more so that the right level of
access is given to the right people and suspicious
devices are contained and remediated.

 Security SIEM product pull together the information that


Information and your security staff needs to identify and respond to
Event threats. These products come in various forms,
Management including physical and virtual appliances and server
software.
• ATTACKS vs. THREAT
 A threat is a “potential” violation of security
 The violation does not need to actually occur
 The fact that the violation might occur makes it a threat
 It is important to guard against threats and be prepared for
the actual violation

 The actual violation of security is called an attack

 Passive – attempts to learn or make use of information without affecting


system resources
 Active- attempts to alter systems resources affect their operation
• Security Services
 Authentication - Make sure that the communicating entities are the ones who they
claim to be.

- A resources should be accessible and usable by authorized users,


 Availability on demand.

 Data Integrity - Messages/ data are not modified in a n unauthorized way.

 Access Control -Prevention of unauthorized use of resources

-
 Non- repudiation Protection against denial by one of the parties in a
communication
(sender/ reciever cannot deny sending /receiving data

- The contents of a messages/data are not disclosed to


 Data unintended parties
Confidentiality
• Security Mechanisms
 Featured designed to prevent, detect, and recover from a security
attacks.

 No single mechanism that will support all services required

 However one particular element underlies many of the security


mechanism in use.
• Some Components of Network
Security
Assets - some resources that have value.

Risk – What can potentially happen to our assets.

Vulnerability – A weakness that can be exploited.

Threat – Someone or something capable of exploiting a vulnerability/assets.

Protection – Mechanisms that can/will be used to protect assets.


• Some Components of Network Security

Tools – programs/procedures that can be used to verify protections, discover


risks, etc.

Priorities – dictates which tools will be used, how they will be used, and which
assets need to be protected.

Strategy – definition of all the architecture and policy components that make up a
complete plan for security.

Tactics – day-to-day practices of the individuals, and technologies assigned to


the protection of assets.
Thank You For Listening
And Watching

You might also like