logo

Network Security: Protecting the Integrity and Usability of Networking Services and Data

Identify the appropriate components to prevent and detect attacks in a network environment.

25 Pages1420 Words50 Views
   

Added on  2023-01-19

About This Document

This presentation provides an overview of network security, including the importance of protecting networking services and data. It discusses external and internal attacks, preventive, detective, and corrective controls, and key approaches for cyber security. The presentation is relevant for anyone interested in understanding and implementing network security measures.

Network Security: Protecting the Integrity and Usability of Networking Services and Data

Identify the appropriate components to prevent and detect attacks in a network environment.

   Added on 2023-01-19

ShareRelated Documents
NETWORK SECURITY
Network Security: Protecting the Integrity and Usability of Networking Services and Data_1
Table of Content
INTRODUCTION
Overview of security needs of OUM
External network attacks
Types of External Attacks
Internal Attacks
Types of Internal Attack
Control Against Network
Preventive method for Cyber Attack
Detective Control
Corrective Control
Key Approaches for Cyber Security
CONCLUSION
REFERENCES
Network Security: Protecting the Integrity and Usability of Networking Services and Data_2
INTRODUCTION
Network security is defined as the approach used to protect the integrity and
usability of the networking services and data. Cyber attack is one of the most
alarming threat to the network security and thus it is very essential to adopt
suitable measures for providing network security.
Network Security: Protecting the Integrity and Usability of Networking Services and Data_3
Overview of security needs of OUM
The biggest networking threat for the OUM is data breach and
malicious threats. The existing threats make the network system of university
highly vulnerable for the unauthorised access and data breach.
Network Security: Protecting the Integrity and Usability of Networking Services and Data_4
External network attacks
The malicious campaign and threat actions that are conducted form
the outside of the organization and attack the surface that exist outside the
firewall.
Network Security: Protecting the Integrity and Usability of Networking Services and Data_5
Types of External Attacks
There are different type of techniques are used by Attack
hackers and external people from the organization to cause damage
to the data and information (Franck, 2016). That possess by the
organization. Mainly these techniques are- Malware, Phishing and
cross site scripting.
Malware
Phishing Attack
Cross site scripting
Network Security: Protecting the Integrity and Usability of Networking Services and Data_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Threats and Control Measures for Open University Malaysia
|10
|3121
|88

Cyber Threats in Social Media Technologies
|12
|3939
|91

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Cybersecurity Threat Name of the Student
|11
|2321
|49

Information Security Awareness Assignment PDF
|7
|1466
|95