Want to create interactive content? It’s easy in Genially!

Get started free

Network security - Title

Nick Jordan

Created on March 8, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Corporate Christmas Presentation

Snow Presentation

Nature Presentation

Halloween Presentation

Tarot Presentation

Winter Presentation

Vaporwave presentation

Transcript

Computer Networks

NEtwork security

Start

Network Encryption

Network encryption applies to network traffic passing across the network edge. It conceals the content of data packets as they pass between internal nodes. Algorithms and secure keys reduce the risk of data breaches. Speed and user experience remain at levels demanded by network users.

Filtering traffic via a firewall makes use of pre-set or dynamically learned rules for allowing and denying attempted connections. These rules are how a firewall regulates the flow of web traffic through your private network and private computer devices. Regardless of type, all firewalls may filter by some combination of the following:

  • Source: Where an attempted connection is being made from.
  • Destination: Where an attempted connection is intended to go.
  • Contents: What an attempted connection is trying to send.
  • Packet protocols: What ‘language’ an attempted connection is speaking to carry its message. Among the networking protocols that hosts use to ‘talk’ with each other, TCP/IP protocols are primarily used to communicate across the internet and within intranet/sub-networks.
  • Application protocols: Common protocols include HTTP, Telnet, FTP, DNS, and SSH.
Source and destination are communicated by internet protocol (IP) addresses and ports. IP addresses are unique device names for each host. Ports are a sub-level of any given source and destination host device, similar to office rooms within a larger building. Ports are typically assigned specific purposes, so certain protocols and IP addresses using uncommon ports or disabled ports can be a concern.By using these identifiers, a firewall can decide if a data packet attempting a connection is to be discarded—silently or with an error reply to the sender—or forwarded.

Remember

In the last lesson We covered basic network architecture, with a look at WAN and LAN networks. We also looked at devices, topology models and the OSI model. These all play a role in security.

Refresh yourself with the details of last lesson, as this all plays a role in the current lesson.

Watch this video to learn about subnet masks

Watch this video to learn about ip addresses.