Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.3 EXPLAIN THE CHANGING NETWORK ENVIRONMENT (SECURITY SOLUTION (Antivirus…
1.3 EXPLAIN THE CHANGING NETWORK ENVIRONMENT
NETWORK TREND
Bring Your Own Device (BYOD)
A major global trend requires significant changes to the way devices are used.
Any device, with any ownership, used anywhere.
Online Collaboration
-The act of working with another or others
BENEFITS
Improve customer satisfaction
Increase communications choices
Improve facility management
Video Communication
Used for communication, collaboration and entertainment
Video Calls can be made to and from anywhere
Drivers for Implementing a Video Strategy :
Reducing cost and green IT.
Media Explosion.
Social Networking
Cloud Computing
The use of computing resources.
Company used hardware and software in the cloud
Data Center
-Facility used to house computer system.
Associated components :
Redundant Data Communications Connections
High-speed Virtual Servers
Redundant Storage Systems
Redundant or Backup Power Supplies
Environment Controls
Security Devices
TECHNOLOGY TRENDS IN THE HOME
Powerline Networking
Concept of "No new wires"
Ability to connect a device to the network
An emerging trend for home networking
Wireless Broadband
For the home and small bussiness
To access the internet using smart phone or tablets
NETWORK SECURITY
Networking Threats
EXTERNAL
Arise from individuals working outside of an organization
INTERNAL
Occur when someone has authorized access to the network use a user account or physical access
SECURITY THREATS
THE MOST COMMON EXTERNAL THREATS TO NETWORK
Viruses
Attached itself to a program or file which can't spread without human actions
Worms
Similar to virus but spread without human actions
Trojen Horses
Similar to virus and worms but it doesn't spread or reproduce
THE MOST COMMON EXTERNAL THREATS TO NETWORK
Spyware and adware
software installed on the user device secretly collects information about the user
THE MOST COMMON EXTERNAL THREATS TO NETWORK
Zero-Days Attacks
Occur on the first day
Can strike anywhere, anytime
Hacker Attacks
By a knowledgeable person to user devices or network resources
Denial of Service (DoS) Attacks
to slow or crash applications and processes on a network device
Data Interception and Theft
to capture private information from an organization’s network
Identity Theft
to steal the login credentials of a user in order to access private data
Denial of Service (DoS)
SYN (synchronous) Flooding
Ping of Death
SECURITY SOLUTION
Antivirus and antispyware
to protect user devices from malicious software
Firewall filtering
to block unauthorized access to the network
Dedicated firewall systems
to provide more advanced firewall capability that can filter large amounts of traffic
Intrusion prevention systems (IPS)
to identify fast-spreading threats, such as zero-day or zero-hour attacks
Virtual Private Networks (VPNs)
to provide secure access to remote workers
Access control lists (ACL)
to further filter access and traffic forwarding