SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
What are…
 Data Networks?




                  Image by: JD Hancock/Flickr
WHAT WE’LL COVER:
• Definition
• Types of data networks:
             Private
             Public
• Security:
             Explanation
             Concepts
             Types of attacks on networks

• Compliance and ‘the problem’
• Summary
• Source List
A definition
Data Networks are…




                 Image by: JoshuaDavisPhotography
Data Networks
“A data network is an electronic communications process that allows
for the orderly transmission and receptive of data, such as letters,
spread sheets, and other types of documents.
What sets the data network apart from other forms of communication,
such as an audio network, is that the data network is configured to
transmit data only.
This is in contrast to the audio or voice network, which is often
employed for both voice communications and the transmission of data
such as a facsimile transmission.”
                                                         Wisegeek.com
Types of
Data Networks




                Image by: Lesliewong.us
Types of Data Networks


There are two basic types of data networks in operation today.
1. The private data network
“This is essentially a local network that is designed to allow for the
transmission of data between the various departments within a given entity,
such as a company.
All locations of the company may be included as nodes on the network, and
be able to communicate through a common server that functions as the
repository for any and all data files that are used throughout the business.
There are also examples of a private data network that allows for data
sharing between several companies that are part of the same profession or
industry.
Connections to this type of network can be achieved through the creation of
a virtual private network, or VPN that resides on a master server, or by
provisioning the connections through a communications carrier.”
                                                                   Wisegeek.com
Types of Data Networks

The second is quite different.

2. The public data network
“In contrast to the private data network, the public data network will be widely accessible
to both residential and corporate clients of a given carrier network.
The setup of a public network may involve the utilization of multiple servers and
connection to the network through several different processes.
Often, a public data network will require some type of subscription process, such as a
monthly usage fee.
Upon receipt of the fee, the service provider will allow the creation of access credentials
that will allow the consumer to access authorized portions of the network and engage in
several functions commonly involved with data.
These include the ability to retrieve stores documents, create backups of important data
files, and archiving data such as historical information or other data that is understood to
be valuable for future applications."

                                                                             Wisegeek.com
Network Security
    Data Networks




                    Image by: Freefoto
Network Security
                                      Explanation

 “In the field of networking, the area of network security consists of the provisions and
  policies adopted by the network administrator to prevent and monitor unauthorized
  access, misuse, modification, or denial of the computer network and network-accessible
  resources.
 Network security involves the authorization of access to data in a network, which is
  controlled by the network administrator. Users choose or are assigned an ID and
  password or other authenticating information that allows them access to information
  and programs within their authority.
 Network security covers a variety of computer networks, both public and private, that
  are used in everyday jobs conducting transactions and communications among
  businesses, government agencies and individuals.
 Networks can be private, such as within a company, and others which might be open to
  public access.
 Network security is involved in organizations, enterprises, and other types of institutions.
  It does as its title explains: It secures the network, as well as protecting and overseeing
  operations being done. The most common and simple way of protecting a network
  resource is by assigning it a unique name and a corresponding password.”
                                                                                     Wikipedia
Network Security
                                          Concepts
 “Network security starts with authenticating the user, commonly with a username and a password.
  Since this requires just one detail authenticating the user name —i.e. the password, which is
  something the user 'knows'— this is sometimes termed one-factor authentication. With two-factor
  authentication, something the user 'has' is also used (e.g. a security token or 'dongle', an ATM card,
  or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a
  fingerprint or retinal scan).
 Once authenticated, a firewall enforces access policies such as what services are allowed to be
  accessed by the network users. Though effective to prevent unauthorized access, this component
  may fail to check potentially harmful content such as computer worms or Trojans being transmitted
  over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit
  the action of such malware.
 An anomaly-based intrusion detection system may also monitor the network and traffic for
  unexpected (i.e. suspicious) content or behaviour and other anomalies to protect resources, e.g.
  from denial of service attacks or an employee accessing files at strange times. Individual events
  occurring on the network may be logged for audit purposes and for later high-level analysis.
 Communication between two hosts using a network may be encrypted to maintain privacy.
 Honeypots, essentially decoy network-accessible resources, may be deployed in a network as
  surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate
  purposes.
 Techniques used by the attackers that attempt to compromise these decoy resources are studied
  during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used
  to further tighten security of the actual network being protected by the honeypot.”
                                                                                            Wikipedia
Network Security
                                         Types of attacks
Networks are subject to attacks from malicious sources. Attacks can be from two categories
1.  "Passive" when a network intruder intercepts data traveling through the network
2.  "Active" in which an intruder initiates commands to disrupt the networks normal operation.

Types of attacks include:
Passive
        Network
         1.   wiretapping
         2.   Port scanner
         3.   Idle scan
Active
         1.   Denial-of-service attack
         2.   Spoofing
         3.   Man in the middle
         4.   ARP poisoning
         5.   Smurf attack
         6.   Buffer overflow
         7.   Heap overflow
         8.   Format string attack
         9.   SQL injection


   Wikipedia
                                                                     Image by: Gloriamundi.blogsome.com
Compliance
 Data Networks




                 Image by: thewhizzer.blogspot.com
Network Compliance
                        The Problem
“Governments compliance requirements are growing
increasingly complex and federal chief information officers are
tasked with securing data and networks, authenticating users,
and preparing for disasters — all while continually auditing and
reporting on compliance.” Juniper.net

With this problem surrounding the day to day functioning of
security and compliance certain products are needed to ensure
that networks not only abide by government guidelines and rules
but also ensure that networks can still maximise on functionality.
Summary
Data Networks
Summary

 A data network is an electronic communications process
  that allows for the orderly transmission and receptive of
  data and which is defended or made different to another
  network depending on the type of network that it is: Types
  of data networks: private or public
 By understanding network security and the various
  concepts it pertains to, one can try and protect a network
  from various types of attacks on networks that are either
  passive or aggressive
 Compliance and ‘the problem’ can help network owners or
  managers to ensure their network is not only compliant
  with legal rules and guidelines but is safe from attacks and
  can still function to its full capability.
Credits


1. Images: CC from Flickr (click on CC pictures for
   attribution) and Google CC images

2. Information: Please click on source names in
   slideshow for their original source

Más contenido relacionado

La actualidad más candente

Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Dr Rajiv Srivastava
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem Kishan Patel
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Modems
ModemsModems
ModemsBits
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part IHem Pokhrel
 

La actualidad más candente (20)

Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdfNetwork Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
FireWall
FireWallFireWall
FireWall
 
Wide Area Networking
Wide Area NetworkingWide Area Networking
Wide Area Networking
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Modems
ModemsModems
Modems
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 

Destacado

Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1Zafar Ayub
 
SFCC MET1001 D2L Tutorial
SFCC MET1001 D2L TutorialSFCC MET1001 D2L Tutorial
SFCC MET1001 D2L Tutorialnobycane
 
The best webinar etiquette
The best webinar etiquetteThe best webinar etiquette
The best webinar etiquetteBigMarker
 
Summer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected AppsSummer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected AppsSalesforce Developers
 
eMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
eMarketer Webinar: Mobile Marketing Trends, Insights and Best PracticeseMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
eMarketer Webinar: Mobile Marketing Trends, Insights and Best PracticeseMarketer
 
7 Ways to Enrich Email Marketing with Predictive Intelligence
7 Ways to Enrich Email Marketing with Predictive Intelligence7 Ways to Enrich Email Marketing with Predictive Intelligence
7 Ways to Enrich Email Marketing with Predictive IntelligenceSalesforce Marketing Cloud
 
World's top 5 insurance companies
World's top 5 insurance companiesWorld's top 5 insurance companies
World's top 5 insurance companiesAiza Ali
 
Mission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web ServicesMission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web ServicesAmazon Web Services
 
How to Identify and Prevent ESD Failures using PathFinder
How to Identify and Prevent ESD Failures using PathFinderHow to Identify and Prevent ESD Failures using PathFinder
How to Identify and Prevent ESD Failures using PathFinderAnsys
 
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...Association for Project Management
 
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013Amazon Web Services
 
Lead Scoring For B2B Marketers
Lead Scoring For B2B MarketersLead Scoring For B2B Marketers
Lead Scoring For B2B MarketersSilverpop
 
How to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise ArchitectureHow to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise Architecturecccamericas
 
Australian Airline Industry Analysis
Australian Airline Industry AnalysisAustralian Airline Industry Analysis
Australian Airline Industry AnalysisThushara Amaranayaka
 
Sap batch management overview
Sap batch management overviewSap batch management overview
Sap batch management overviewdhl1234
 
Glaucoma & target iop
Glaucoma & target iopGlaucoma & target iop
Glaucoma & target iopdoseiha5
 
Channel Management Best Practices
Channel Management Best PracticesChannel Management Best Practices
Channel Management Best Practicesdreamforce2006
 

Destacado (20)

Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
It Spending 2010
It Spending 2010It Spending 2010
It Spending 2010
 
SFCC MET1001 D2L Tutorial
SFCC MET1001 D2L TutorialSFCC MET1001 D2L Tutorial
SFCC MET1001 D2L Tutorial
 
The best webinar etiquette
The best webinar etiquetteThe best webinar etiquette
The best webinar etiquette
 
Summer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected AppsSummer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected Apps
 
eMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
eMarketer Webinar: Mobile Marketing Trends, Insights and Best PracticeseMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
eMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
 
7 Ways to Enrich Email Marketing with Predictive Intelligence
7 Ways to Enrich Email Marketing with Predictive Intelligence7 Ways to Enrich Email Marketing with Predictive Intelligence
7 Ways to Enrich Email Marketing with Predictive Intelligence
 
Physical Features Of Latin America
Physical Features Of Latin AmericaPhysical Features Of Latin America
Physical Features Of Latin America
 
World's top 5 insurance companies
World's top 5 insurance companiesWorld's top 5 insurance companies
World's top 5 insurance companies
 
Mission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web ServicesMission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web Services
 
How to Identify and Prevent ESD Failures using PathFinder
How to Identify and Prevent ESD Failures using PathFinderHow to Identify and Prevent ESD Failures using PathFinder
How to Identify and Prevent ESD Failures using PathFinder
 
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
 
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013
 
Lead Scoring For B2B Marketers
Lead Scoring For B2B MarketersLead Scoring For B2B Marketers
Lead Scoring For B2B Marketers
 
How to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise ArchitectureHow to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise Architecture
 
Australian Airline Industry Analysis
Australian Airline Industry AnalysisAustralian Airline Industry Analysis
Australian Airline Industry Analysis
 
Sap batch management overview
Sap batch management overviewSap batch management overview
Sap batch management overview
 
Glaucoma & target iop
Glaucoma & target iopGlaucoma & target iop
Glaucoma & target iop
 
Channel Management Best Practices
Channel Management Best PracticesChannel Management Best Practices
Channel Management Best Practices
 

Similar a What are data networks?

Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............AkilSayyad2
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And PrivacyTodd Turner
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 

Similar a What are data networks? (20)

Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Network security
Network securityNetwork security
Network security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 
G011123539
G011123539G011123539
G011123539
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
A01450131
A01450131A01450131
A01450131
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

Más de James Steele

Business plan essentials
Business plan essentialsBusiness plan essentials
Business plan essentialsJames Steele
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?James Steele
 
The Most Iconic Vans of All Time
The Most Iconic Vans of All TimeThe Most Iconic Vans of All Time
The Most Iconic Vans of All TimeJames Steele
 
The Green Kitchen Guide
The Green Kitchen GuideThe Green Kitchen Guide
The Green Kitchen GuideJames Steele
 
A Guide to Biryani
A Guide to BiryaniA Guide to Biryani
A Guide to BiryaniJames Steele
 
Dos and don'ts of safe driving
Dos and don'ts of safe drivingDos and don'ts of safe driving
Dos and don'ts of safe drivingJames Steele
 
Guide to the brakes
Guide to the brakesGuide to the brakes
Guide to the brakesJames Steele
 
Halo 4 gaming build up 2012
Halo 4 gaming build up 2012Halo 4 gaming build up 2012
Halo 4 gaming build up 2012James Steele
 
Top 5 greatest inventions
Top 5 greatest inventionsTop 5 greatest inventions
Top 5 greatest inventionsJames Steele
 
Nintendo wii internet connection setup
Nintendo wii internet connection setupNintendo wii internet connection setup
Nintendo wii internet connection setupJames Steele
 
Rf10543 npm9881 q1 sme billing 2012
Rf10543 npm9881 q1 sme billing 2012 Rf10543 npm9881 q1 sme billing 2012
Rf10543 npm9881 q1 sme billing 2012 James Steele
 
Understanding energy
Understanding energyUnderstanding energy
Understanding energyJames Steele
 
Basic Guide to Computers
Basic Guide to ComputersBasic Guide to Computers
Basic Guide to ComputersJames Steele
 

Más de James Steele (13)

Business plan essentials
Business plan essentialsBusiness plan essentials
Business plan essentials
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?
 
The Most Iconic Vans of All Time
The Most Iconic Vans of All TimeThe Most Iconic Vans of All Time
The Most Iconic Vans of All Time
 
The Green Kitchen Guide
The Green Kitchen GuideThe Green Kitchen Guide
The Green Kitchen Guide
 
A Guide to Biryani
A Guide to BiryaniA Guide to Biryani
A Guide to Biryani
 
Dos and don'ts of safe driving
Dos and don'ts of safe drivingDos and don'ts of safe driving
Dos and don'ts of safe driving
 
Guide to the brakes
Guide to the brakesGuide to the brakes
Guide to the brakes
 
Halo 4 gaming build up 2012
Halo 4 gaming build up 2012Halo 4 gaming build up 2012
Halo 4 gaming build up 2012
 
Top 5 greatest inventions
Top 5 greatest inventionsTop 5 greatest inventions
Top 5 greatest inventions
 
Nintendo wii internet connection setup
Nintendo wii internet connection setupNintendo wii internet connection setup
Nintendo wii internet connection setup
 
Rf10543 npm9881 q1 sme billing 2012
Rf10543 npm9881 q1 sme billing 2012 Rf10543 npm9881 q1 sme billing 2012
Rf10543 npm9881 q1 sme billing 2012
 
Understanding energy
Understanding energyUnderstanding energy
Understanding energy
 
Basic Guide to Computers
Basic Guide to ComputersBasic Guide to Computers
Basic Guide to Computers
 

Último

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

What are data networks?

  • 1. What are… Data Networks? Image by: JD Hancock/Flickr
  • 2. WHAT WE’LL COVER: • Definition • Types of data networks:  Private  Public • Security:  Explanation  Concepts  Types of attacks on networks • Compliance and ‘the problem’ • Summary • Source List
  • 3. A definition Data Networks are… Image by: JoshuaDavisPhotography
  • 4. Data Networks “A data network is an electronic communications process that allows for the orderly transmission and receptive of data, such as letters, spread sheets, and other types of documents. What sets the data network apart from other forms of communication, such as an audio network, is that the data network is configured to transmit data only. This is in contrast to the audio or voice network, which is often employed for both voice communications and the transmission of data such as a facsimile transmission.” Wisegeek.com
  • 5. Types of Data Networks Image by: Lesliewong.us
  • 6. Types of Data Networks There are two basic types of data networks in operation today. 1. The private data network “This is essentially a local network that is designed to allow for the transmission of data between the various departments within a given entity, such as a company. All locations of the company may be included as nodes on the network, and be able to communicate through a common server that functions as the repository for any and all data files that are used throughout the business. There are also examples of a private data network that allows for data sharing between several companies that are part of the same profession or industry. Connections to this type of network can be achieved through the creation of a virtual private network, or VPN that resides on a master server, or by provisioning the connections through a communications carrier.” Wisegeek.com
  • 7. Types of Data Networks The second is quite different. 2. The public data network “In contrast to the private data network, the public data network will be widely accessible to both residential and corporate clients of a given carrier network. The setup of a public network may involve the utilization of multiple servers and connection to the network through several different processes. Often, a public data network will require some type of subscription process, such as a monthly usage fee. Upon receipt of the fee, the service provider will allow the creation of access credentials that will allow the consumer to access authorized portions of the network and engage in several functions commonly involved with data. These include the ability to retrieve stores documents, create backups of important data files, and archiving data such as historical information or other data that is understood to be valuable for future applications." Wisegeek.com
  • 8. Network Security Data Networks Image by: Freefoto
  • 9. Network Security Explanation  “In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.  Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.  Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.  Networks can be private, such as within a company, and others which might be open to public access.  Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.”  Wikipedia
  • 10. Network Security Concepts  “Network security starts with authenticating the user, commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e. the password, which is something the user 'knows'— this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g. a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a fingerprint or retinal scan).  Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware.  An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behaviour and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the network may be logged for audit purposes and for later high-level analysis.  Communication between two hosts using a network may be encrypted to maintain privacy.  Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes.  Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot.” Wikipedia
  • 11. Network Security Types of attacks Networks are subject to attacks from malicious sources. Attacks can be from two categories 1. "Passive" when a network intruder intercepts data traveling through the network 2. "Active" in which an intruder initiates commands to disrupt the networks normal operation. Types of attacks include: Passive  Network 1. wiretapping 2. Port scanner 3. Idle scan Active 1. Denial-of-service attack 2. Spoofing 3. Man in the middle 4. ARP poisoning 5. Smurf attack 6. Buffer overflow 7. Heap overflow 8. Format string attack 9. SQL injection Wikipedia Image by: Gloriamundi.blogsome.com
  • 12. Compliance Data Networks Image by: thewhizzer.blogspot.com
  • 13. Network Compliance The Problem “Governments compliance requirements are growing increasingly complex and federal chief information officers are tasked with securing data and networks, authenticating users, and preparing for disasters — all while continually auditing and reporting on compliance.” Juniper.net With this problem surrounding the day to day functioning of security and compliance certain products are needed to ensure that networks not only abide by government guidelines and rules but also ensure that networks can still maximise on functionality.
  • 15. Summary  A data network is an electronic communications process that allows for the orderly transmission and receptive of data and which is defended or made different to another network depending on the type of network that it is: Types of data networks: private or public  By understanding network security and the various concepts it pertains to, one can try and protect a network from various types of attacks on networks that are either passive or aggressive  Compliance and ‘the problem’ can help network owners or managers to ensure their network is not only compliant with legal rules and guidelines but is safe from attacks and can still function to its full capability.
  • 16. Credits 1. Images: CC from Flickr (click on CC pictures for attribution) and Google CC images 2. Information: Please click on source names in slideshow for their original source