Network Security
Network Security
Presented by:
1. Abdullah Younas
(22-ARID-4404)
2. Muhammad Ahsan
(22-ARID-4421)
3. Muhammad Umer
(22-ARID-4425)
Introduction:
• Network security is the practice of protecting networks and their data from
unauthorized access, misuse, and disruption.
• Effective network security measures are critical for businesses to protect
sensitive information and maintain operational continuity.
Difference between network security and information
security:
1. Malware:
• Malware, short for malicious software, includes viruses, worms, trojans, ransomware, and other
harmful programs designed to disrupt, damage, or gain unauthorized access to computer systems.
• Malware can lead to data loss, system malfunctions, unauthorized access, and financial losses.
2. Phishing Attacks:
• Phishing involves tricking individuals into divulging sensitive information such as passwords,
credit card numbers, or other personal data by posing as a trustworthy entity in electronic
communication.
• Examples: Email phishing, spear phishing, and vishing (voice phishing).
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks:
• DoS:
• A DoS attack is an attempt to make a computer resource (such as a website, server, or
network) unavailable to its intended users by overwhelming it with a flood of
illegitimate requests or traffic.
• DDoS:
• A DDoS attack is an extension of a DoS attack where multiple compromised computers
(a botnet) are used to flood a target with a massive volume of traffic, making it difficult
to mitigate and trace the source.
Network security technologies:
1. Firewalls:
• Firewalls are security devices or software that monitor and control incoming and outgoing
network traffic based on predetermined security rules, acting as a barrier between trusted internal
networks and untrusted external networks.
• Use strong and unique passwords for network devices and regularly update them.
• Implement firewalls to control incoming and outgoing network traffic, allowing
only authorized connections.
• Regularly update network devices and software with the latest security patches
and firmware.
Cryptography:
3. Digital Signatures:
• Provides a way to verify the authenticity and integrity of digital messages or
documents.
• Uses a private key to generate a digital signature, which can be verified using the
corresponding public key.
Secure Network Architecture:
4. IoT Security:
• As the number of Internet of Things (IoT) devices continues to grow, securing
these devices and the data they generate has become a significant
concImplementing security measures for IoT ecosystems is an ongoing challenge.
Incident Response and Disaster Recovery:
• Regularly backup critical data and test the restoration process to ensure
data integrity and availability in case of a disaster.