SlideShare a Scribd company logo
Network security
    YUE PING
• Network security consists of the
  provisions made in an underlying
  computer network infrastructure, policies
  adopted by the network administrator to
  protect the network and the network-
  accessible resources from unauthorized
  access.
Network security concepts
• Network security starts from
  authenticating : username , password,
  a fingerprint or retinal scan .
• Intrusion prevention system (IPS).
• Anomaly-based intrusion detection
  system.
• Communication between two hosts using
  the network could be encrypted to
  maintain privacy.
• Security Management for networks is
  different for all kinds of situations. A small
  home or an office would only require basic
  security while large businesses will require
  high maintenance and advanced software
  and hardware to prevent malicious attacks
  from hacking and spamming.

More Related Content

PPT
Security Measures
PDF
CNIT 140: Perimeter Security
PPTX
Network security
PPTX
Network Security and Firewall
PPTX
NETWORK SECURITY
PPSX
Cs tations-pps xversion
PPTX
Cyber security
Security Measures
CNIT 140: Perimeter Security
Network security
Network Security and Firewall
NETWORK SECURITY
Cs tations-pps xversion
Cyber security

What's hot (19)

PPTX
Presentation1 new (1) (1)cf
PPTX
Firewalls in network security
PPTX
презентация1
PPTX
Network security
PPTX
What is network security and Types
PPTX
Network security
PPTX
Cyber security
PPTX
NETWORK SECURITY
PPTX
Introduction to Network Security
PPTX
IT Security Presentation
PPTX
Network Security
PDF
Presentation on Network Security
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PPTX
Ics & computer security for nuclear facilities
PPTX
Network security
PPT
Understanding the need for security measures
PPTX
Modern Network Security Issue and Challenge
PPTX
Cyber security
PPTX
Cyber security issues
Presentation1 new (1) (1)cf
Firewalls in network security
презентация1
Network security
What is network security and Types
Network security
Cyber security
NETWORK SECURITY
Introduction to Network Security
IT Security Presentation
Network Security
Presentation on Network Security
CNIT 123: Ch 1 Ethical Hacking Overview
Ics & computer security for nuclear facilities
Network security
Understanding the need for security measures
Modern Network Security Issue and Challenge
Cyber security
Cyber security issues
Ad

Viewers also liked (18)

PPT
Luminaria Presentation
PDF
Bibliografia apit
PPT
My Roads Less Traveled
PDF
Dogs & Cats: How Product Managers 
can work better with 
UX Designers
PDF
Lavacon: What Is Content Strategy?
PDF
Lavacon: UX for Content Strategists and Technical Writers
PDF
LavaCon: Hunting Unicorns - What Makes an Effective UX Professional
PDF
Hunting Unicorns - What makes an effective UX Professional
PPTX
Certificacion iso
PDF
Career Paths of User Experience
PDF
UX Portfolios: How to tell your story
PDF
What is User Experience, A Primer - U of Washington
PDF
Enterprise UX - The "Next" Last Frontier
PDF
How to get a great UX job, U of Washington Presentation
PDF
SoCal UX Camp -- How To Get A Great UX Job
ZIP
UXSpeakeasy - How To Get A Great UX Job
PDF
General Assembly - How To Get A Great UX Job
PPTX
Agile and UX, July 8 - Scrum Club, Los Angeles, CA
Luminaria Presentation
Bibliografia apit
My Roads Less Traveled
Dogs & Cats: How Product Managers 
can work better with 
UX Designers
Lavacon: What Is Content Strategy?
Lavacon: UX for Content Strategists and Technical Writers
LavaCon: Hunting Unicorns - What Makes an Effective UX Professional
Hunting Unicorns - What makes an effective UX Professional
Certificacion iso
Career Paths of User Experience
UX Portfolios: How to tell your story
What is User Experience, A Primer - U of Washington
Enterprise UX - The "Next" Last Frontier
How to get a great UX job, U of Washington Presentation
SoCal UX Camp -- How To Get A Great UX Job
UXSpeakeasy - How To Get A Great UX Job
General Assembly - How To Get A Great UX Job
Agile and UX, July 8 - Scrum Club, Los Angeles, CA
Ad

Similar to Homework0703 (20)

PPTX
Computer Security Essentials.pptx
PPTX
Security and control in mis
PPTX
network security.001.pptx................
PDF
Presentation 10 (1).pdf
PPTX
introduction of the cyber security PPT.pptx
DOC
Network Security Essentials for IT Professionals.doc
PPT
Development of security architecture
PPTX
Security Basics
PPTX
Network security and firewalls
PPTX
Protecting Your Data Privacy with Cyber Security Services
PPTX
Security & control in mis
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Internet security
PPTX
Computer security
PPTX
Presentation on Cyber Security
PPTX
Endpoint_Security_Presentation_DEFENSE.pptx
PPTX
Cyber Security: A Hands on review
PPT
IM Unit 4 Security and its a control.ppt
DOCX
CyberCore – Security Essentials_ Protecting Your Digital World.docx
PPTX
IBM2202E_Network Security_Group Work_General Security.pptx
Computer Security Essentials.pptx
Security and control in mis
network security.001.pptx................
Presentation 10 (1).pdf
introduction of the cyber security PPT.pptx
Network Security Essentials for IT Professionals.doc
Development of security architecture
Security Basics
Network security and firewalls
Protecting Your Data Privacy with Cyber Security Services
Security & control in mis
Unit 1 Network Fundamentals and Security .pptx
Internet security
Computer security
Presentation on Cyber Security
Endpoint_Security_Presentation_DEFENSE.pptx
Cyber Security: A Hands on review
IM Unit 4 Security and its a control.ppt
CyberCore – Security Essentials_ Protecting Your Digital World.docx
IBM2202E_Network Security_Group Work_General Security.pptx

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development

Homework0703

  • 1. Network security YUE PING
  • 2. • Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network- accessible resources from unauthorized access.
  • 3. Network security concepts • Network security starts from authenticating : username , password, a fingerprint or retinal scan . • Intrusion prevention system (IPS). • Anomaly-based intrusion detection system. • Communication between two hosts using the network could be encrypted to maintain privacy.
  • 4. • Security Management for networks is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.