Professional Documents
Culture Documents
NETWORK SECURITY
By:
Miss Ruzanna Ramli
Session December 2017
Student should be able to:
• Identify the important requirements of network
security.
• Describe the need for network security.
• Identify potential risks to network security.
• Describe the goals of network security based on
asset, threat and risk.
• Explain THREE Security Models.
• Identify Legal Issues and Privacy Concerns.
DETECTION:
Identifying events when its occur.
RESPONSE:
Developing strategies and techniques to deal
with an attack or loss
NETWORK SECURITY:
1. Confidentiality
2. Integrity
3. Availability
4. Accountability
CONFIDENTIALITY:
1. Asset Identification
2. Threat Assessment
3. Risk Assessment
ASSETS IDENTIFICATION:
5 min
BREAK
Identify Security Models:
1. Open
2. Restrictive
3. Closed
1.1.5 Explain Open Security
Models:
1.1.5 Explain Open Security
Models:
The easiest to implement.
Simple password and server security becomes
the foundation of this model.
This model assumes that the protected assets
are minimal, user are trusted, and threats are
minimal.
Suitable for LANs / public WANs that are not
connected to the Internet.
If security breaches occurs, the result will be in
great damage or loss.
Example: hardware (router, switch).
5 min
BREAK