SlideShare a Scribd company logo
6
Most read
7
Most read
8
Most read
Cyber Security
Chapter One
Network Security
1
Outline
1. Describe the network security
2. Describe the three goals of network security
3. Differentiate between security policies,
standards, guidelines and procedures
2
Learning Outcome
1. Discuss the three goals of network security
2. Discuss the difference between security
policies, standards, guidelines and
procedures
3
What is Security?
• Security
Security is about protection of assets
• Prevention
Take measures that prevent your assets from
being damaged (or stolen)
• Detection
Take measures so that you can detect when,
how, and whom an asset has been damaged
• Reaction
Take measures so that you can recover your
assets
4
What is Security?
5
What is Network Security?
Network security are set of rules and
configurations designed to protect the
integrity, confidentiality and availability of
computer networks and data using both
software and hardware technologies.
6
Goals of Network Security
• Confidentiality
– Prevent the disclosure of sensitive information from unauthorized
people, resources, and processes
• Integrity
– The protection of system information or processes from intentional or
accidental modification
• Availability
– The assurance that systems and data are
accessible by authorized users when needed
7
Tools
• Administrative
• Physical
• Technical
8
Security Administration
• Policies
• Standards
• Guidelines
• Procedures
1. Risk Assessment
2. Security Policy
3. Organization of Information Security
4. Asset Management
5. Human Resources Security
6. Physical and Environmental Security
7. Communications and Operations Management
8. Access Control
9. Information Systems Acquisition, Development
and Maintenance
10. Information Security Incident Management
11. Business Continuity Management
12. Compliance
Domains of Network Security
9
Documents Supporting Policies
• Standards – dictate specific minimum requirements
in our policies
• Guidelines – suggest the best way to accomplish
certain tasks
• Procedures – provide a method by which a policy is
accomplished (the instructions)
10
Example: The Policy
• All users must have a unique user ID and
password that conforms to the company
password standard
• Users must not share their password with
anyone regardless of title or position
• Passwords must not be stored in written or
any readable form
11
Example: The Standards
• Minimum of 8 upper- and lowercase
alphanumeric characters
• Must include a special character
• Must be changed every 30 days
12
Example: The Guideline
• Take a phrase
Up and At ‘em at 7
• Convert to a strong password
Up&atm@7
• To create other passwords from this phrase,
change the number, move the symbol, or
change the punctuation mark
Example: The Procedure
Procedure for changing a password
1. Press Control + Alt+ Delete to bring
up the log in dialog box
2. Click the “change password” button
3. Enter your current password in the
top box
4. …
14
References
• Omar Santos & John Stuppi (2015). CCNA Security
210-260 Official Cert Guide. Pearson Education.
• Kevin Wallace (2012). CompTIA Network+ Authorized
Cert Guide. Pearson Education.
15

More Related Content

PPTX
Cyber Security # Lec 4
PPTX
Network Security Goals
PPTX
Cyber Security # Lec 3
PPTX
Introduction to Network Security
PPTX
Journey from CCNA to Certified Network Defender v2
PPTX
Ics & computer security for nuclear facilities
PPTX
Cyber Security # Lec 5
PPTX
Collaborative defence strategies for network security
Cyber Security # Lec 4
Network Security Goals
Cyber Security # Lec 3
Introduction to Network Security
Journey from CCNA to Certified Network Defender v2
Ics & computer security for nuclear facilities
Cyber Security # Lec 5
Collaborative defence strategies for network security

What's hot (20)

PDF
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
PDF
Network Security Fundamentals
PPT
Ne Course Part Two
PDF
Computer Network Security
PPTX
Network security
PPTX
Data security
PDF
Introduction to security
PPTX
Modern Network Security Issue and Challenge
PDF
Presentation on Network Security
PPTX
Network Security
PDF
Career guide on cyber security
DOCX
Resume Tony Welker
PPTX
Data Security Explained
PPTX
Network security
PPTX
5 Security Tips to Protect Your Login Credentials and More
DOCX
Security Plan for Small Networks/Offices
PPT
Introduction Network security
PPTX
Sweden dell security
PPTX
Network security
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Network Security Fundamentals
Ne Course Part Two
Computer Network Security
Network security
Data security
Introduction to security
Modern Network Security Issue and Challenge
Presentation on Network Security
Network Security
Career guide on cyber security
Resume Tony Welker
Data Security Explained
Network security
5 Security Tips to Protect Your Login Credentials and More
Security Plan for Small Networks/Offices
Introduction Network security
Sweden dell security
Network security
Ad

Similar to Domains of network security (20)

DOCX
Security policy case study
PPTX
Network security
PPTX
Network and system administration Chapter 5.pptx
PPTX
CYBER SECURITY.pptx
PDF
What is Network security, or Securiing your data Through Network,N.pdf
PPTX
CYBER SECURITY.pptx
PDF
Policies people can read
PPTX
ICS_Unit-I_Foundations of Information Security
PPT
Information Security Policies and Standards
PPTX
Networking infrastructure
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Network Security - Advanced Computer Network.pptx
PDF
Dos and Don’ts of Network Security.pdf
PPTX
Computer Security Chapter 1
DOCX
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
PDF
Information security policy how to writing
PPT
Identifying and Using Network Hand Tools
PPTX
Chapter- I introduction
PDF
Chapter-I introduction
PDF
Network Security Certification
Security policy case study
Network security
Network and system administration Chapter 5.pptx
CYBER SECURITY.pptx
What is Network security, or Securiing your data Through Network,N.pdf
CYBER SECURITY.pptx
Policies people can read
ICS_Unit-I_Foundations of Information Security
Information Security Policies and Standards
Networking infrastructure
Unit-1 introduction to cyber security discuss about how to secure a system
Network Security - Advanced Computer Network.pptx
Dos and Don’ts of Network Security.pdf
Computer Security Chapter 1
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
Information security policy how to writing
Identifying and Using Network Hand Tools
Chapter- I introduction
Chapter-I introduction
Network Security Certification
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Digital-Transformation-Roadmap-for-Companies.pptx

Domains of network security

  • 2. Outline 1. Describe the network security 2. Describe the three goals of network security 3. Differentiate between security policies, standards, guidelines and procedures 2
  • 3. Learning Outcome 1. Discuss the three goals of network security 2. Discuss the difference between security policies, standards, guidelines and procedures 3
  • 4. What is Security? • Security Security is about protection of assets • Prevention Take measures that prevent your assets from being damaged (or stolen) • Detection Take measures so that you can detect when, how, and whom an asset has been damaged • Reaction Take measures so that you can recover your assets 4
  • 6. What is Network Security? Network security are set of rules and configurations designed to protect the integrity, confidentiality and availability of computer networks and data using both software and hardware technologies. 6
  • 7. Goals of Network Security • Confidentiality – Prevent the disclosure of sensitive information from unauthorized people, resources, and processes • Integrity – The protection of system information or processes from intentional or accidental modification • Availability – The assurance that systems and data are accessible by authorized users when needed 7
  • 9. Security Administration • Policies • Standards • Guidelines • Procedures 1. Risk Assessment 2. Security Policy 3. Organization of Information Security 4. Asset Management 5. Human Resources Security 6. Physical and Environmental Security 7. Communications and Operations Management 8. Access Control 9. Information Systems Acquisition, Development and Maintenance 10. Information Security Incident Management 11. Business Continuity Management 12. Compliance Domains of Network Security 9
  • 10. Documents Supporting Policies • Standards – dictate specific minimum requirements in our policies • Guidelines – suggest the best way to accomplish certain tasks • Procedures – provide a method by which a policy is accomplished (the instructions) 10
  • 11. Example: The Policy • All users must have a unique user ID and password that conforms to the company password standard • Users must not share their password with anyone regardless of title or position • Passwords must not be stored in written or any readable form 11
  • 12. Example: The Standards • Minimum of 8 upper- and lowercase alphanumeric characters • Must include a special character • Must be changed every 30 days 12
  • 13. Example: The Guideline • Take a phrase Up and At ‘em at 7 • Convert to a strong password Up&atm@7 • To create other passwords from this phrase, change the number, move the symbol, or change the punctuation mark
  • 14. Example: The Procedure Procedure for changing a password 1. Press Control + Alt+ Delete to bring up the log in dialog box 2. Click the “change password” button 3. Enter your current password in the top box 4. … 14
  • 15. References • Omar Santos & John Stuppi (2015). CCNA Security 210-260 Official Cert Guide. Pearson Education. • Kevin Wallace (2012). CompTIA Network+ Authorized Cert Guide. Pearson Education. 15