Uploaded on Sep 2, 2021
PPT on Network Security.
Network Security
NETWORK SECURITY What is Network Security? • Network Security protects your network and data from breaches, intrusions and other threats. This is a vast and overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility, and overall threat protection. Source: www.checkpoint.com Why Network Security? • Network Security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more. Source: www.checkpoint.com Benefits of Network Security • Network Security is vital in protecting client data and information, keeping shared data secure and ensuring reliable access and network performance as well as protection from cyber threats. • A well designed network security solution reduces overhead expenses and safeguards organizations from costly losses that occur from a data breach or other security incident. Source: www.checkpoint.com TYPES OF NETWORK SECURITY DEVICES AND TOOLS Access control • This refers to controlling which users have access to the network or especially sensitive sections of the network. • Using security policies, you can restrict network access to only recognized users and devices or grant limited access to noncompliant devices or guest users. Source: www.n-able.com Antivirus and anti-malware software • Malware, or “malicious software,” is a common form of cyberattack that comes in many different shapes and sizes. • Some variations work quickly to delete files or corrupt data, while others can lie dormant for long periods of time and quietly allow hackers a back door into your systems. Source: www.n-able.com Application security • Each device and software product used within your networking environment offers a potential way in for hackers. • For this reason, it is important that all programs be kept up-to-date and patched to prevent cyberattacks from exploiting vulnerabilities to access sensitive data. Source: www.n-able.com Behavioral analytics • In order to identify abnormal behavior, security support personnel need to establish a baseline of what constitutes normal behavior for a given customer’s users, applications, and network. Source: www.n-able.com Data loss prevention • Data loss prevention (DLP) technologies are those that prevent an organization’s employees from sharing valuable company information or sensitive data whether unwittingly or with ill intent outside the network. Source: www.n-able.com Distributed denial of service prevention • Distributed denial of service (DDoS) attacks are becoming increasingly common. They function by overloading a network with one-sided connection requests that eventually cause the network to crash. Source: www.n-able.com Email security • Email is an especially important factor to consider when implementing networking security tools. Numerous threat vectors, like scams, phishing, malware, and suspicious links, can be attached to or incorporated into emails. Source: www.n-able.com
Comments