NETWO
RK
SECURIT
Y
Today, hacks, data breaches, and cyberattacks are
more common than ever before. In fact, the
number of data breaches that exposed private
records more than doubled between 2015 and
2017 alone. The increasing number and severity
of these attacks make network security a topic of
utmost importance, especially for current and
prospective certified IT professionals.
what is
network
security?
Network security is the protection of the
underlying networking infrastructure from
unauthorized access, misuse, or theft. It
involves creating a secure infrastructure
for devices, applications, users, and
applications to work in a secure manner.
How does
network
security work?
Network security combines multiple
layers of defenses at the edge and in the
network. Each network security layer
implements policies and controls.
WHY IS SECURITY
IMPORTANT?
How do I benefit from
network security?
HOW CAN WE
ENSURE NETWORK
SECURITY?
What are the different types of Network Security?
Access Control
Application Security
Firewalls
Virtual Private
Networks(VPN)
Behavioral Analytics
Wireless Security
Intrusion Prevention
System
ACCESS CONTROL
Its primary purpose is to
ensure that only
authorized individuals or
entities are granted access
while preventing
unauthorized access or
breaches.
APPLICATION SECURITY
Application security includes
the hardware, software, and
processes that can be used to
track and lock down application
vulnerabilities that attackers can
use to infiltrate your network.
FIREWALLS
A firewall is a device or service
that acts as a gatekeeper,
deciding what enters and exits
the network.
Virtual Private Networks(VPN)
A virtual private network
encrypts the connection from an
endpoint to a network, often
over the Internet.
Behavioral Analytics
Behavioral analytics tools
automatically identify activities
that deviate from the norm.
Wireless Security
Wireless networks are not as
secure as wired ones.
Intrusion Prevention
System
These systems scan network
traffic to identify and block
attacks, often by correlating
network activity signatures with
databases of known attack
techniques.
Assignment
Create a presentation on different protection tips that can
enhance your network.
https://drive.google.com/drive/folders/1W7Mzvx-
492X1N7AT7RfCRXoSGeGK_YXC?usp=sharing