NSintroduction

Download Report

Transcript NSintroduction

Chapter 01:
Introduction to Network Security
Introduction to Network Security
 Network

A Network is the inter-connection of communications
media, connectivity equipment, and electronic devices for
the purpose of sharing data and resources.
 Security:
 As the word security means safety or safekeeping or
protection.
Introduction to Network Security
 Why do we have to protect or "Secure" the network?
 We need to protect the network because there are
constant threats against the "resources" we share in
the network. These could be valuable information or
data about our employees and clients, or more
importantly about our products or businesses. Most
of these threats come in the form of:



Viruses, worms, and Trojan horses
Spyware and adware
Hacker attacks
Introduction to Network Security
 Network Security Systems are usually composed of many
components of both software and hardware which are
designed to work together to improve security and
minimize maintenance. The software must be relentlessly
updated to prevent from new threats.
 These components include:
* Anti-virus and anti-spyware
* Firewall, to block unauthorized access to your network
* Intrusion prevention systems (IPS), to detect and block
attacks
* Virtual Private Networks (VPNs), to provide secure
remote access
Introduction to Network Security
 Three main objective of Network Security:



Confidentiality
Data integrity
Availability
Introduction to Network Security
 Confidentiality: This term covers two related
concepts:


Data confidentiality: Assures that private or confidential
information is not made available or disclosed to
unauthorized individuals.
Privacy: Assures that individuals control or influence what
information related to them may be collected and stored
and by whom and to whom that Information may be
disclosed.
Introduction to Network Security
 Integrity: This term covers two related concepts:
 Data integrity: Assures that information and programs are
changed only in a specified and authorized manner.
 System integrity: Assures that a system performs its intended
function in perfect manner
 A loss of integrity is the unauthorized modification or destruction of
information
 Availability: Assures that systems work promptly and
service is not denied to authorized users.