SlideShare a Scribd company logo
4
Most read
6
Most read
9
Most read
NETWORK SECURITY
1
CONTENT
1-Introduction
2-Definition
3-Threats
4-Solution
5-Conclusion
2
Introduction
While computer systems today have some of the best security system
ever,they are more vulnerable than ever before.
This vulnerability stems from the world wide access to computer
system via internet.
Computer and network security comes in many form
1-encryption algorithm
2-access to facilities
3-digital signatures
4-fingerprints and face scans as passwords
3
Definition:
Network security consist of provisions
and policies adopted by network
administrator to prevent and monitor
unauthorized
access,misuse,modification or denial of
computer network and network
accessible resources.
4
Threats
Many network security threats are spread over the internet.The most common
include:
1-Viruses and Worms
2-Trojan horses
3-Spyware
4-Adware
5-Hacker attack
5
1-Viruses
Viruses works and spread by attaching
themselves to other pieces of software
such that during the execution of the
program the viral code is executed.
Corrupt and modifies the system files on
your computer to cause damage
distributed to various storage medium
such as flash drive.
6
2- Worms
Worms are stand-alone software that does
not have to attach itself to a program in
your system like a computer virus
Damage the computer network by causing
increase bandwidth
7
3-Trojan horses
Trojan horses is a very deceptive program
that appear harmless but it is actually one of
the most dangerous type of malware
it may appear as a friendly email attached or
present itself as a useful application on a
website
It does not have the ability to self replicate
but to deliver destructive payloads and
viruses,worms and spyware.
8
4-Spyware
spyware is a software that gathers
information through the user's internet
connection without his or her
knowledge,usually for advertising
purposes.
Another kind of spyware may make
changing in your computer and cause
slowing down of computer or crashing
which can be annoying such as changing
your web page or adding additional
component.
9
5-Adware
Adware is essentially add-
supported software that has the
ability to track your activity.
10
6-HACKER ATTACK
In a computer security a hacker is the
one who seeks and exploits
weaknesses in a computer network.
Hackers may be motivated by
multitudes of reasons such as profit
,protest and challenge.
11
Network security is accomplished through software and hardware.The
software must be constantly updated and manage to protect you from
emerging threats.
network security may consist of many components. ideally all
components work together which minimizes maintenance and improve
security.
Network Security
12
Network security includes following components.
1- Anti - viruses and anti -spyware
2- Firewall -to stop unauthorized access to your computer
3- IPS- intrusion prevention system
4- VPNs- virtual private networks
Components
13
An anti virus software program is a computer program that can be used to
scan files to identify and eliminate computer viruses and other malicious
software.
Anti virus works in two different ways :
1-Examine file to look for unknown virus by mean of virus dictionary
OR
2-Identify suspicious behaviour from any computer program which might
indicate infection.
Anti virus
14
A system or combination of system that support and control access policy
between two networks .
A firewall can limit the type of transactions that enter a system, as well as
all type of transactions that leave the system.
it can also be programmed to stop certain type or ranges of
IP addresses, as well as certain type of TCp port numbers(applications).
Firewall
15
IPS is a network security/prevention technology that examines network
traffic flow to detect and prevent vulnerability exploits.
IPS has number of detection methods for finding exploits,but signature-
based detection and statistical anomaly based detections are two
dominant mechanisms.
IPS-intrusion prevention system
16
VPns are used to establish an encrypted connection across a network
while using internet as its transmission medium.
Two Benefits :
1-It is inexpensive
2-A secure data connection is established.
VPNs-virtual private network
17
CONCLUSION
we see that it is important to secure our network for various reasons because
they are used to store sensitive and important data which we want to keep
secure as it might be used for malicious content in the wrong hands
18
Thank You
19
Saham Fatima
Mehru Nisa
Rabia Hashmat
20

More Related Content

PPTX
Network security
PPTX
Cyber security ppt
PPTX
Network Security ppt
PDF
Network Security Presentation
PPTX
Network Security
PPTX
Cyber Security
PDF
Internet and Email -O/L ICT
PPTX
Database security
Network security
Cyber security ppt
Network Security ppt
Network Security Presentation
Network Security
Cyber Security
Internet and Email -O/L ICT
Database security

What's hot (20)

PPTX
Network security
PPTX
NETWORK SECURITY
PDF
What is Network Security?
PPTX
What is network security and Types
PDF
Network Security Fundamentals
PPTX
Intrusion detection
 
PPTX
Network security
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
DOCX
Network security
PPTX
Network Security and Firewall
PPTX
Network security - Defense in Depth
PPTX
Cybercrime and Security
PPTX
Cyber security
PDF
Cyber security
PPTX
Basics of Network Security
PPTX
Network security
PPTX
Malware & Anti-Malware
PDF
Network Security Tutorial | Introduction to Network Security | Network Securi...
PPTX
Network security presentation
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Network security
NETWORK SECURITY
What is Network Security?
What is network security and Types
Network Security Fundamentals
Intrusion detection
 
Network security
Application Security | Application Security Tutorial | Cyber Security Certifi...
Network security
Network Security and Firewall
Network security - Defense in Depth
Cybercrime and Security
Cyber security
Cyber security
Basics of Network Security
Network security
Malware & Anti-Malware
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network security presentation
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Ad

Viewers also liked (6)

DOCX
[Mercado] Boletim Mensal (agosto) 14-02
PPT
Anak cerdas kreatif berkat musik
PDF
Majestic hotel tower 2012 final
PPTX
СРА-mechanics.
PDF
Anesthetic management of a child with family history of malignant hyperthermia
PPTX
AVITAE Ancient Greek texts
[Mercado] Boletim Mensal (agosto) 14-02
Anak cerdas kreatif berkat musik
Majestic hotel tower 2012 final
СРА-mechanics.
Anesthetic management of a child with family history of malignant hyperthermia
AVITAE Ancient Greek texts
Ad

Similar to Network security (20)

PPT
Chapter 4.ppt
PPTX
Chapter 5.pptx
PPTX
Cyber security
PPTX
PDF
Cscu module 03 protecting systems using antiviruses
DOC
Computer Secutity.
PPT
Chapter1 intro network_security_sunorganised
PDF
Presentation about security i.t.
PDF
Presentation about security I.T.
PPT
Ch # 10 computer security risks and safe guards
PDF
Open port vulnerability
PPTX
Viruses, worms, and trojan horses
PPTX
Viruses, worms, and trojan horses
PPTX
System_security.pptx
PPTX
Network Security & Ethical Hacking
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
internet security
PPTX
Securing E-commerce networks in MIS and E-Commerce
PPT
Lecture 5
PDF
Computer/Cyber/IT Security MCQ Questions
Chapter 4.ppt
Chapter 5.pptx
Cyber security
Cscu module 03 protecting systems using antiviruses
Computer Secutity.
Chapter1 intro network_security_sunorganised
Presentation about security i.t.
Presentation about security I.T.
Ch # 10 computer security risks and safe guards
Open port vulnerability
Viruses, worms, and trojan horses
Viruses, worms, and trojan horses
System_security.pptx
Network Security & Ethical Hacking
RRB JE Stage 2 Computer and Applications Questions Part 5
 
internet security
Securing E-commerce networks in MIS and E-Commerce
Lecture 5
Computer/Cyber/IT Security MCQ Questions

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Network security

  • 3. Introduction While computer systems today have some of the best security system ever,they are more vulnerable than ever before. This vulnerability stems from the world wide access to computer system via internet. Computer and network security comes in many form 1-encryption algorithm 2-access to facilities 3-digital signatures 4-fingerprints and face scans as passwords 3
  • 4. Definition: Network security consist of provisions and policies adopted by network administrator to prevent and monitor unauthorized access,misuse,modification or denial of computer network and network accessible resources. 4
  • 5. Threats Many network security threats are spread over the internet.The most common include: 1-Viruses and Worms 2-Trojan horses 3-Spyware 4-Adware 5-Hacker attack 5
  • 6. 1-Viruses Viruses works and spread by attaching themselves to other pieces of software such that during the execution of the program the viral code is executed. Corrupt and modifies the system files on your computer to cause damage distributed to various storage medium such as flash drive. 6
  • 7. 2- Worms Worms are stand-alone software that does not have to attach itself to a program in your system like a computer virus Damage the computer network by causing increase bandwidth 7
  • 8. 3-Trojan horses Trojan horses is a very deceptive program that appear harmless but it is actually one of the most dangerous type of malware it may appear as a friendly email attached or present itself as a useful application on a website It does not have the ability to self replicate but to deliver destructive payloads and viruses,worms and spyware. 8
  • 9. 4-Spyware spyware is a software that gathers information through the user's internet connection without his or her knowledge,usually for advertising purposes. Another kind of spyware may make changing in your computer and cause slowing down of computer or crashing which can be annoying such as changing your web page or adding additional component. 9
  • 10. 5-Adware Adware is essentially add- supported software that has the ability to track your activity. 10
  • 11. 6-HACKER ATTACK In a computer security a hacker is the one who seeks and exploits weaknesses in a computer network. Hackers may be motivated by multitudes of reasons such as profit ,protest and challenge. 11
  • 12. Network security is accomplished through software and hardware.The software must be constantly updated and manage to protect you from emerging threats. network security may consist of many components. ideally all components work together which minimizes maintenance and improve security. Network Security 12
  • 13. Network security includes following components. 1- Anti - viruses and anti -spyware 2- Firewall -to stop unauthorized access to your computer 3- IPS- intrusion prevention system 4- VPNs- virtual private networks Components 13
  • 14. An anti virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software. Anti virus works in two different ways : 1-Examine file to look for unknown virus by mean of virus dictionary OR 2-Identify suspicious behaviour from any computer program which might indicate infection. Anti virus 14
  • 15. A system or combination of system that support and control access policy between two networks . A firewall can limit the type of transactions that enter a system, as well as all type of transactions that leave the system. it can also be programmed to stop certain type or ranges of IP addresses, as well as certain type of TCp port numbers(applications). Firewall 15
  • 16. IPS is a network security/prevention technology that examines network traffic flow to detect and prevent vulnerability exploits. IPS has number of detection methods for finding exploits,but signature- based detection and statistical anomaly based detections are two dominant mechanisms. IPS-intrusion prevention system 16
  • 17. VPns are used to establish an encrypted connection across a network while using internet as its transmission medium. Two Benefits : 1-It is inexpensive 2-A secure data connection is established. VPNs-virtual private network 17
  • 18. CONCLUSION we see that it is important to secure our network for various reasons because they are used to store sensitive and important data which we want to keep secure as it might be used for malicious content in the wrong hands 18