SlideShare a Scribd company logo
3
Most read
7
Most read
10
Most read
Network Security

10/30/2013

A presentation by Nkosinathi Lungu

1
Why Network Security?

We need our networks secured because there are a lot of threats to networks
from hackers and software’s. Our networks hold a lot of data some of which is
confidential and could lead industry sabotage and espionage and so it must be
protected.

10/30/2013

A presentation by Nkosinathi Lungu

2
Common Security Threats
There are several threats to computer networks some of the most common being;
 Viruses Worms and Trojans
 Spyware and Adware
 Hacker Attacks
 Denial of Service Attacks
 Data interception and theft
 Identity Theft

10/30/2013

A presentation by Nkosinathi Lungu

3
Securing the Network
There are several ways in which we can ensure that our networks stay secure like;
 Authentication: All users of the network must enter some credentials to prove
that they have authority to access what’s on the network
 Firewalls: Once a user logs on a firewall can ascertain what rights the user has
on the network and what resources are available to that user.
 Antivirus and Antispyware: Also essential for the network security as this will
be able to block any malicious software that tries to run on your machine
 Password Policies: Users should be prompted to change their passwords at
least every other month.

10/30/2013

A presentation by Nkosinathi Lungu

4
Securing the Network continued
 Network Analyzer: This can be used to monitor who is logged onto the
network and what resources they are accessing
 Network Key: In the case of wireless networks it’s important that users must
enter a network key before being allowed on the network.
 Encryption: encryption software can be installed on the networks so that any
outsider accessing the information won’t be able to read it.
 Physical Access to data areas: All places with terminals on the network must
be secured so that no one can just access them

10/30/2013

A presentation by Nkosinathi Lungu

5
Servers
What is a Server?

 A server is a system either hardware or software that responds to requests
across a network to provide services
 Servers are central to a network as they hold all the data from user access data
to personal and the organizations data.

10/30/2013

A presentation by Nkosinathi Lungu

6
Server Room
What is a Server room?

 A server room is a room where the organizations servers are kept and as such
they need to be secured
 Server Rooms can also be used to keep backups as well as house switches and
routers

10/30/2013

A presentation by Nkosinathi Lungu

7
Securing the Server Room
Some ways to secure server rooms are;
 Isolation: It is important that the server room is isolated and kept away form
human traffic
 Physical Access: Users should authenticate themselves before entering the
server room. There are several ways to do this like keycards, Door access code
locks or biometrics like fingerprint.
 Monitoring: If possible have cameras in and around the server room so that
you can monitor who is accessing the room.
 Server Racks: Keep servers in racks as they are secure and can be locked that
way even if someone breaks into your server room they can’t access the
server.

10/30/2013

A presentation by Nkosinathi Lungu

8
Securing the Server Room Continued
 Smoke Detectors: In case of a fire the smoke detectors will go off and the fire
can be put off before any damage is done.
 Elevation: Make sure that the servers are all off the ground so that in the event
of flooding there is less likelihood of them getting affected.
 Air Conditioning: Servers like other computers produce heat and depending
on the traffic they get they can get really hot so it’s important that the server
room is air conditioned
 Windows: Ensure that there are no windows to the server room or if there are
they should be well secured
 Password Lockouts: It is advisable to set your servers so that they can lock
after a few failed log in attempts.

10/30/2013

A presentation by Nkosinathi Lungu

9
Summary
 We see that it is important to secure our networks for various reasons because
they are used to store sensitive and important data which we want to keep
secure as it might be used for malicious intent in the wrong hands.

10/30/2013

A presentation by Nkosinathi Lungu

10

More Related Content

PDF
What is Network Security?
PPTX
Network-security-ppt.pptx...............
PPTX
Seminar (network security)
PPTX
Fundamentals of Network security
PDF
Network Security Fundamentals
PPTX
Network security
PDF
Network Security Presentation
PPTX
Network Security
What is Network Security?
Network-security-ppt.pptx...............
Seminar (network security)
Fundamentals of Network security
Network Security Fundamentals
Network security
Network Security Presentation
Network Security

What's hot (20)

PPTX
Network security
PPTX
Network security
PPTX
Basics of Network Security
PPTX
Network Security and Firewall
PPTX
NETWORK SECURITY
PPTX
Network security
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
cyber security presentation.pptx
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPT
Cyber Crime and Security
PPTX
Computer Security
PDF
Cyber security training
PPTX
Social engineering
PPT
Keyloggers and Spywares
PPTX
Information security awareness - 101
PPT
Network Security
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cyber security system presentation
PPTX
Security threats and safety measures
PPT
Network Security
Network security
Network security
Basics of Network Security
Network Security and Firewall
NETWORK SECURITY
Network security
Cybersecurity 1. intro to cybersecurity
cyber security presentation.pptx
Intrusion Detection Systems and Intrusion Prevention Systems
Cyber Crime and Security
Computer Security
Cyber security training
Social engineering
Keyloggers and Spywares
Information security awareness - 101
Network Security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber security system presentation
Security threats and safety measures
Network Security
Ad

Viewers also liked (18)

PPT
Network Security
PPT
Network Security 1st Lecture
PPTX
Windstream Managed Network Security Presentation
PPT
Day3 Backup
PDF
Slideshare cost of ignoring network security presentation v4
PPT
Network Security
PPTX
Network Security & Ethical Hacking
PPT
Network security policies
PPTX
A NETWORK SECURITY APPROACH USING RSA.
PPTX
Presentation network security
PDF
Network Security Lecture
PPTX
Network security - Basic concepts
PPT
CCNA Security 02- fundamentals of network security
PPTX
Network Security Nmap N Nessus
PPTX
Network security
PPT
Network security
PPTX
Slideshare.Com Powerpoint
PPT
Network Security and Cryptography
Network Security
Network Security 1st Lecture
Windstream Managed Network Security Presentation
Day3 Backup
Slideshare cost of ignoring network security presentation v4
Network Security
Network Security & Ethical Hacking
Network security policies
A NETWORK SECURITY APPROACH USING RSA.
Presentation network security
Network Security Lecture
Network security - Basic concepts
CCNA Security 02- fundamentals of network security
Network Security Nmap N Nessus
Network security
Network security
Slideshare.Com Powerpoint
Network Security and Cryptography
Ad

Similar to Network security (20)

PPTX
Network security and firewalls
PPTX
Chapter 12 - Securing a Network CompTIA Network+
PPTX
Network security (syed azam)
PPT
Net essentials6e ch10
PPT
Network security
PPS
Sreerag cs network security
PDF
A Review On Network Security And Privacy
PDF
Lecture26 cc-security1
PPTX
TOPIC7.pptx
PPTX
Network Security
DOCX
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
PDF
10 server security hacks to secure your web servers
PPTX
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
PPT
23 computer security
PPTX
network_security_ppt[1].pptx
PPTX
Network and system administration Chapter 5.pptx
PPT
Chapter1 intro network_security_sunorganised
PDF
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
PDF
Host-based Security
PPTX
network security ppt.pptx
Network security and firewalls
Chapter 12 - Securing a Network CompTIA Network+
Network security (syed azam)
Net essentials6e ch10
Network security
Sreerag cs network security
A Review On Network Security And Privacy
Lecture26 cc-security1
TOPIC7.pptx
Network Security
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
10 server security hacks to secure your web servers
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
23 computer security
network_security_ppt[1].pptx
Network and system administration Chapter 5.pptx
Chapter1 intro network_security_sunorganised
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security
network security ppt.pptx

More from Nkosinathi Lungu (6)

PPTX
NComputing - A brief overview
PPTX
I.T project challenges
PPTX
Peer to-peer networks
PPT
Life of a freelancer
PPT
I.T t shirts
PPTX
Health information systems (his)
NComputing - A brief overview
I.T project challenges
Peer to-peer networks
Life of a freelancer
I.T t shirts
Health information systems (his)

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Network security

  • 2. Why Network Security? We need our networks secured because there are a lot of threats to networks from hackers and software’s. Our networks hold a lot of data some of which is confidential and could lead industry sabotage and espionage and so it must be protected. 10/30/2013 A presentation by Nkosinathi Lungu 2
  • 3. Common Security Threats There are several threats to computer networks some of the most common being;  Viruses Worms and Trojans  Spyware and Adware  Hacker Attacks  Denial of Service Attacks  Data interception and theft  Identity Theft 10/30/2013 A presentation by Nkosinathi Lungu 3
  • 4. Securing the Network There are several ways in which we can ensure that our networks stay secure like;  Authentication: All users of the network must enter some credentials to prove that they have authority to access what’s on the network  Firewalls: Once a user logs on a firewall can ascertain what rights the user has on the network and what resources are available to that user.  Antivirus and Antispyware: Also essential for the network security as this will be able to block any malicious software that tries to run on your machine  Password Policies: Users should be prompted to change their passwords at least every other month. 10/30/2013 A presentation by Nkosinathi Lungu 4
  • 5. Securing the Network continued  Network Analyzer: This can be used to monitor who is logged onto the network and what resources they are accessing  Network Key: In the case of wireless networks it’s important that users must enter a network key before being allowed on the network.  Encryption: encryption software can be installed on the networks so that any outsider accessing the information won’t be able to read it.  Physical Access to data areas: All places with terminals on the network must be secured so that no one can just access them 10/30/2013 A presentation by Nkosinathi Lungu 5
  • 6. Servers What is a Server?  A server is a system either hardware or software that responds to requests across a network to provide services  Servers are central to a network as they hold all the data from user access data to personal and the organizations data. 10/30/2013 A presentation by Nkosinathi Lungu 6
  • 7. Server Room What is a Server room?  A server room is a room where the organizations servers are kept and as such they need to be secured  Server Rooms can also be used to keep backups as well as house switches and routers 10/30/2013 A presentation by Nkosinathi Lungu 7
  • 8. Securing the Server Room Some ways to secure server rooms are;  Isolation: It is important that the server room is isolated and kept away form human traffic  Physical Access: Users should authenticate themselves before entering the server room. There are several ways to do this like keycards, Door access code locks or biometrics like fingerprint.  Monitoring: If possible have cameras in and around the server room so that you can monitor who is accessing the room.  Server Racks: Keep servers in racks as they are secure and can be locked that way even if someone breaks into your server room they can’t access the server. 10/30/2013 A presentation by Nkosinathi Lungu 8
  • 9. Securing the Server Room Continued  Smoke Detectors: In case of a fire the smoke detectors will go off and the fire can be put off before any damage is done.  Elevation: Make sure that the servers are all off the ground so that in the event of flooding there is less likelihood of them getting affected.  Air Conditioning: Servers like other computers produce heat and depending on the traffic they get they can get really hot so it’s important that the server room is air conditioned  Windows: Ensure that there are no windows to the server room or if there are they should be well secured  Password Lockouts: It is advisable to set your servers so that they can lock after a few failed log in attempts. 10/30/2013 A presentation by Nkosinathi Lungu 9
  • 10. Summary  We see that it is important to secure our networks for various reasons because they are used to store sensitive and important data which we want to keep secure as it might be used for malicious intent in the wrong hands. 10/30/2013 A presentation by Nkosinathi Lungu 10