Network Security
Network Security
Network Security
Hardware
Information
data
It is the process of taking preventative measures to keep the network infrastructure from any
unauthorized access, misuse of important information
Network security
Any form of security incident that is not properly handled can and eventually wont turn into a
bigger problem that will lead to a damaging data breach and wont cause large amount of
expense or it will collapse the whole system
It has a vital role in an information system because it is the one that allows a company to link
their computers and its users
Network
Access
network securit
It is the network security solution by an institute to Answer any malicious activity in
a network.
It will help the company to provide a better strategy in keeping a data secured while avoiding
intruders to alter or steal important and confidential information.
Security Trinity
6
System that plays a vital part in Network security since it is the information that an organization
is trying to protect and avoid from any unauthorized access
Information
Availability refers to the ability of a network to protect its information from any unauthorized
access.
System that are intended to manage the computer itself such as the operating system.
Application Software
software
Areas of Security Trinity where they need to have a good security measures to avoid hackers
from getting access to the network.
Prevention
Which of these are not part of the reason why we need to secure our network?
It is a structured procedure for taking care of any security incidents, breaches, and network
threats.
Detection
preventive
Confidentiality
Integrity
Attack
These layers work together to transmit the data from one person to another world wide.
OSI Layer
Adware
Application Layer
It provides data routing paths where data will take for network communication.
Network Layer
Trojan horse
Virus
Transfer Layer
Protocol
Malware
These are what make networks prone to information loss and downtime
Vulnerabilities
Two different devices can communicate with each other regard
It is anything that can disrupt the operation, functioning, integrity, or availability of a network or
system
Threat
Type of malware that may contain an attachment to an email that loads malware onto your
computer system.
Phishing
This layer involves devices such as router, UTP Cables and other networking devices to transfer
data.
Physical Layer