Want to create interactive content? It’s easy in Genially!
Network security - Title
Nick Jordan
Created on March 8, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Corporate Christmas Presentation
View
Snow Presentation
View
Nature Presentation
View
Halloween Presentation
View
Tarot Presentation
View
Winter Presentation
View
Vaporwave presentation
Transcript
Computer Networks
NEtwork security
Start
Network Encryption
Network encryption applies to network traffic passing across the network edge. It conceals the content of data packets as they pass between internal nodes. Algorithms and secure keys reduce the risk of data breaches. Speed and user experience remain at levels demanded by network users.
Filtering traffic via a firewall makes use of pre-set or dynamically learned rules for allowing and denying attempted connections. These rules are how a firewall regulates the flow of web traffic through your private network and private computer devices. Regardless of type, all firewalls may filter by some combination of the following:
- Source: Where an attempted connection is being made from.
- Destination: Where an attempted connection is intended to go.
- Contents: What an attempted connection is trying to send.
- Packet protocols: What ‘language’ an attempted connection is speaking to carry its message. Among the networking protocols that hosts use to ‘talk’ with each other, TCP/IP protocols are primarily used to communicate across the internet and within intranet/sub-networks.
- Application protocols: Common protocols include HTTP, Telnet, FTP, DNS, and SSH.
Remember
In the last lesson We covered basic network architecture, with a look at WAN and LAN networks. We also looked at devices, topology models and the OSI model. These all play a role in security.
Refresh yourself with the details of last lesson, as this all plays a role in the current lesson.
Watch this video to learn about subnet masks
Watch this video to learn about ip addresses.