100% found this document useful (1 vote)
64 views17 pages

Introduction To Network Security

The document discusses network security and common network security threats. It defines network security and why it is important. It then describes types of network attacks, network security analysis, and six common network security threats. The document also provides ways to protect an organization's IT infrastructure and discusses network attack detection and protection using Cynet 360.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
64 views17 pages

Introduction To Network Security

The document discusses network security and common network security threats. It defines network security and why it is important. It then describes types of network attacks, network security analysis, and six common network security threats. The document also provides ways to protect an organization's IT infrastructure and discusses network attack detection and protection using Cynet 360.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

NETWORK SECURITY

Suzanne Samuela-Causapin
Instructor
CONTENT
1. Introduction
2. Types of Network Security Devices
3. What Is Network Security Analysis and Attacks?
4. Six (6) Common Network Security Threats
5. How To Protect Your Organisation's IT Infrastructure
6. Network Attack Detection And Protection With Cynet 360

2
INTRODUCTION
• Network security is the security provided to a
network from unauthorized access and risks. It is
the duty of network administrators to adopt
preventive measures to protect their networks from
potential security threats.

• Computer networks that are involved in regular


transactions and communication within the
government, individuals, or business require
security. The most common and simple way of
protecting a network resource is by assigning it a
unique name and a corresponding password.

• Network security is important because it keeps


sensitive data safe from cyber attacks and ensures
the network is usable and trustworthy.

3
20XX Pitch deck title 4
WHAT IS NETWORK
ATTACK?
A network attack is an attempt to gain unauthorized access to an
organization’s network, with the objective of stealing data or
perform other malicious activity. There are two main types of
network attacks

•Passive: Attackers gain access to a network and can monitor or


steal sensitive information, but without making any change to the
data, leaving it intact.
•Active: Attackers not only gain unauthorized access but also
modify data, either deleting, encrypting or otherwise harming it.

5
NETWORK SECURITY
ANALYSIS
• Network analysis is a powerful tool for understanding the
structure and function of complex systems.
• involves the close inspection of a network's structure,
data, and traffic in order to observe, detect, and eliminate
potential vulnerabilities.
• protects your network and data from breaches, intrusions
and other threats.

20XX Pitch deck title 6


WE DISTINGUISH NETWORK ATTACKS FROM SEVERAL
OTHER TYPES OF ATTACKS:

1. Endpoint attacks—gaining unauthorized access to user devices, servers


or other endpoints, typically compromising them by infecting them with
malware.
2. Malware attacks—infecting IT resources with malware, allowing attackers
to compromise systems, steal data and do damage. These also include
ransomware attacks.
3. Vulnerabilities, exploits and attacks—exploiting vulnerabilities in software
used in the organization, to gain unauthorized access, compromise or
sabotage systems.
4. Advanced persistent threats—these are complex multilayered threats,
which include network attacks but also other attack types.

20XX Pitch deck title 7


MALWARE ATTACKS

20XX Pitch deck title 8


7 COMMON NETWORK
SECURITY ISSUES
1) Internal Security Threats
Over 90% of cyberattacks are caused by human error. This can take the form
of phishing attacks, careless decision-making, weak passwords, and more.
Insider actions that negatively impact your business's network and sensitive
data can result in downtime, loss of revenue, and disgruntled customers.

2) Distributed Denial-Of-Service (DDoS) Attacks


A DDoS attack causes websites to crash, malfunction, or experience slow
loading times. In these cases, cybercriminals infect internet-connected
devices (mobile phones, computers, etc.) and convert them into bots.
Hackers send the bots to a victim's IP address.
This results in a high volume of internet traffic bombarding the website with
requests and causing it to go offline. These attacks make it difficult to
9
separate legitimate and compromised traffic.
7 COMMON NETWORK SECURITY
ISSUES
3) Rogue Security Software

Rogue security software tricks businesses into believing their IT


infrastructure is not operational due to a virus. It usually appears as a
warning message sent by a legitimate anti-malware solution.

Once a device is infected with a rogue program, the malware spams


the victim with messages, forcing them to pay for a non-existent
security solution, which is often malware. Rogue security software can
also corrupt your pre-existing cyber security programs to prolong
their attack.

4) Malware

Malware are malicious software programs used to gather information


about victims through compromised devices. After successful
deployments, hackers can mine devices for classified information
(email addresses, bank accounts, passwords, etc.) and use them to
commit identity theft, blackmail, or other business-damaging actions. 10
MALWARE INCLUDES:

1. Worms – exploits weaknesses in computer systems to


spread to other devices.
2. Rootkits – grants unauthorised access to systems in
the form of fraudulent access privilege without the
victim's knowledge.
3. Trojan viruses – slips under a network's radar by
hitchhiking on other software and provides hackers
with unprecedented access to systems.
4. Spyware – gathers information on how devices are
used by their owners.

20XX Pitch deck title 11


5) Ransomware

Ransomware is a type of malware that encrypts files within infected systems and
holds them for ransom, forcing victims to pay for a decryption key to unlock the
data. This can take the form of ransomware-as-a-service (RaaS).

RaaS is like software-as-a-service (SaaS), specifically for ransomware. RaaS


dealers develop codes that buyers can use to develop their own malware and
launch cyberattacks. Some common RaaS examples include BlackMatter, LockBit,
DarkSide, and REvil.

6) Phishing Attacks

Phishing attacks are scams where hackers disguise themselves as a trusted entity
and attempt to gain access to networks and steal personal information, such as
credit card details. Phishing scams take the form of emails, text messages, or
phone calls.

Similar to rogue security software, phishing attacks are designed to appear


legitimate. This encourages victims to click on malicious links or download
malware-laden attachments.
12
7) Viruses
Computer viruses are commonly attached to downloadable
files from emails or websites. Once you open the file, the virus
exploits vulnerabilities in your software to infect your
computer with malicious code to disrupt network traffic, steal
data, and more.
Viruses are not to be confused with worms. Though they both
are a type of malware, the difference is in how they penetrate
networks. Simply put, computer viruses cannot infect systems
until their host (the file) is opened. Worms can infect networks
as soon as they enter a business's IT infrastructure.

20XX Pitch deck title 13


HOW TO PROTECT YOUR ORGANISATION'S
IT INFRASTRUCTURE
There are various ways companies can protect their data and networks from malicious
hackers and disasters. While many of these measures can be
outsourced to a managed service provider (MSP), they also require you and your staff to
remain alert and responsive to potential threats.

You can safeguard your networks by:

1. Backing up data and files.


2. Investing in comprehensive cyber security awareness training for you and your team.
3. Promoting a work environment that values application security and safe practices.
4. Installing anti-malware solutions, such as next-generation firewalls.
5. Restrict access to your network's security controls for authorised personnel only.
6. Upgrade devices and secure your endpoints with multi-factor authentication, strong
passwords, etc.
7. Taking cyber security seriously can help mitigate the chances of your company
becoming a victim of data breaches and losing money and time.

14
Network Attack Detection And
Protection With Cynet 360
• Cynet 360 is a holistic security solution that protects against threats
across the entire network. Cynet uses intelligent technologies to help
detect network security threats, correlating data from endpoints,
network analytics and behavioral analytics to present findings with
near-zero false positives.

• Cynet 360 is a cloud-based endpoint security solution that gives


allows IT professionals to mointor and control, prevent and detect and
orchestrate responses for security breaches.

• Cynet AutoPilot Protector natively detects threats across endpoints,


networks and users and also uses deception technology to provide a
true layered security approach out of the box.

20XX Pitch deck title 15


20XX Pitch deck title 16
THANK YOU

You might also like