Want to create interactive content? It’s easy in Genially!
Network security - Conclusion
Nick Jordan
Created on March 9, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Women's Presentation
View
Vintage Photo Album
View
Geniaflix Presentation
View
Shadow Presentation
View
Newspaper Presentation
View
Memories Presentation
View
Zen Presentation
Transcript
Conclusion
Authentication & Access
IP Address & Subnet
Encryption & Firewall
Threats
Protocols
IP address uniqely identifies a host with a 32 bit number, while a subnet segments a larger network into smaller networks
Network protocols are standardized rules that define how data is formatted, transmitted, and received across networks. Including TCP, UDP, FTP and more.
Malware - malicious software DDOS - overwhelming a network with multiple sources Phishing - impersonation to trick into releasing data Man in the middle - intercepting and altering data
Authentiation verifies and confirms the identity of a user, device, or system, while access control Access control is a security method that regulates who can access resources, systems, or data based on predefined permissions and user roles.
Encryption converts information into an unreadable format, while firewalls manage the travel of permitted and prohibited web activity in a private network