You are on page 1of 15

Presentation on-

NETWORK SECURITY
Team Members:-

 SURAJIT SINGHA and SUDEEP CH. CHANDA

BCA 5th SEM


CONTENTS-

• Introduction.
• Definition.
INTRODUCTION
Network security consists of the policies and practices adopted
to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-
accessible resources .
Network security covers a variety of computer networks, both
public and private, that are used in everyday jobs; conducting
transactions and communications among businesses,
government agencies and individuals .
Network security is involved in organizations, enterprises, and
other types of institutions. It does as its title explains: It secures
the network, as well as protecting and overseeing operations
being done .
Network security involves the authorization of access to data in
a network, which is controlled by the network administrator .
Network security is an over-arching term
that describes that the policies and
procedures implemented by a network
administrator to avoid and keep track of
unauthorized access, exploitation,
modification, or denial of the network
and network resources.
 This means that a well-implemented
network security blocks viruses,
malware, hackers, etc. from accessing
or altering secure information.
 Antivirus and Antimalware Software.

 Application Security.

 Email Security.

 Firewalls.

 Virtual Private Network (VPN).


ANTIVIRUS AND ANTIMALWARE SOFTWARE
 This software is used for protecting against
malware, which includes spyware, worms,
and viruses.

 This software handles this threat by scanning


for malware entry and regularly tracks files
afterward in order to detect anomalies,
remove malware, and fix damage.
APPLICATION SECURITY.
 Application security thus encompasses the
software, hardware, and processes you select
for closing those holes.

 It is important to have an application security


since no app is created perfectly.
 Email gateways are considered to be the number one threat
vector for a security breach.

 An email security application is capable of blocking


incoming attacks and controlling outbound messages in order
to prevent the loss of sensitive data.
 Firewalls place a barrier between our trusted internal
network and untrusted outside networks, like the Internet.

 A firewall can be software, hardware, or both. The free


firewall efficiently manages traffic on our PC, monitors
in/out connections, and secures all connections when we are
online.
A VPN is another type of network security capable of
encrypting the connection from an endpoint to a network,
mostly over the Internet.

A remote-access VPN typically uses IPsec or Secure Sockets


Layer in order to authenticate the communication
between network and device.
 Cryptography involves creating written or generated
codes that allow information to be kept secret.
 Cryptography converts data into a format that is
unreadable for an unauthorized user, allowing it to be
transmitted without unauthorized entities decoding it
back into a readable format, thus compromising the
data.
 Information security uses cryptography on several
levels. The information cannot be read without a key
to decrypt it.
 The information maintains its integrity during transit
and while being stored.`
 Symmetric key Cryptography.

 Asymmetric key Cryptography.


 An encryption system in which the sender and receiver of a
message share a single, common key that is used to encrypt
and decrypt the message.
 Symmetric-key systems are simpler and faster.
 Symmetric-key cryptography is sometimes called secret-key
cryptography.
 The most popular symmetric-key system is the Data
Encryption Standard (DES).
 Asymmetric cryptography , also known as public key
cryptography , uses public and private keys to encrypt and
decrypt data.
 One key in the pair can be shared with everyone ; it is called the
public key. The other key is kept secret ; it is called the private
key.

You might also like