Want to create interactive content? It’s easy in Genially!

Get started free

Network security - Conclusion

Nick Jordan

Created on March 9, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Corporate Christmas Presentation

Snow Presentation

Nature Presentation

Halloween Presentation

Tarot Presentation

Winter Presentation

Vaporwave presentation

Transcript

Conclusion

Authentication & Access

IP Address & Subnet

Encryption & Firewall

Threats

Protocols

IP address uniqely identifies a host with a 32 bit number, while a subnet segments a larger network into smaller networks

Network protocols are standardized rules that define how data is formatted, transmitted, and received across networks. Including TCP, UDP, FTP and more.

Malware - malicious software DDOS - overwhelming a network with multiple sources Phishing - impersonation to trick into releasing data Man in the middle - intercepting and altering data

Authentiation verifies and confirms the identity of a user, device, or system, while access control Access control is a security method that regulates who can access resources, systems, or data based on predefined permissions and user roles.

Encryption converts information into an unreadable format, while firewalls manage the travel of permitted and prohibited web activity in a private network