1 / 11

Network Security - Threats and Techniques to be safe digitally

<br>Network security ranges from protection at personal level via various tools to global ethical regulations that govern cyber security at international levels. Now there are various special tricks and techniques via which we can protect our account, website, etc from these cyber attacks. <br>

meh098
Télécharger la présentation

Network Security - Threats and Techniques to be safe digitally

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETWORK SECURITY A boon for a secured virtual space

  2. INTRODUCTION With more than 4.1 billion users across the world, the internet and digital technology has swapped almost all spheres of human lives and thereby remaining up-to-date with contemporary technology becomes vital. With this great use , scope and span ; the internet also brings with itself black intentions of hackers and thereby network security becomes a major aspect to be considered.

  3. WHAT ARE THESE THREATS? Cyber threats are the threats from various malicious softwares and software attackers which include • Viruses • Trojan horses • Malware • Spyware and Adware • Rogue Security Software • Ransomware • Phishing • Hacking and cracking,etc

  4. The solution to our problem NETWORK SECURITY Prevention , protection and post-attack measures are the three broader approaches that we can employ to remain secure. Security can be achieved at personal level via some simple tools and basic awareness and at global level via strict cyber laws.

  5. Network security techniques : • Antivirus It is an software program that is employed in any system to prevent any malicious activity It can be downloaded or purchased for securing systems against malicious attacks. It detects and removes malware and thereby helps us protect our system.

  6. Firewall These are used to protect internal/private networks. They can also be used to govern activities taking place within the network. • Intrusion Detection System These are another major activity control system that can be used to detect and report any unnecessary activity that takes place over the network.

  7. Setting strong password This technique can be employed at personal level via some basic awareness while setting password which are • Use at least 4 characters • Use special characters along with regular alphabets • Initials from lines from any adage or any saying which is very personal to you can be used to set password • Never share your password with anyone; if done then change your password as early as possible to prevent any misuse.

  8. Virtual Private Networks(VPNs) These involve encryption process to attain security. They are used to obtain privacy and data security over the internet via hiding your IP address and physical location. • Email security application It is an application specific protection technique. A safe mailing environment free of spams can be achieved via this as it blocks phishing, viruses, worms, etc. that may cause email security threats.

  9. IT Security Frameworks They are used by private companies with good employee base to manage security within the entreprise. Various companies depending on their size and security needs use this technique to ensure that things go safe within the organization.

  10. Conclusion Various other techniques like data loss prevention, network segmentation, behavioral analytics, endpoint security, etc. can be used to protect the network. Network security encompasses awareness at personal level much more than regulations; but strict action needs to be taken against any malicious activity if detected in order to obtain a safe virtual world. Regards, Technology Moon

  11. THANK YOU

More Related