IMPOSTORS & CREWMATES IN THE SPACESHIP. ILHAM DANIAL BIN ROSLI 12DDT20F1024 MUHAMMAD WAN DANIAL BIN WAN MAHADIR 12DDT20F1015 MUHAMMAD AFIQ DANIAL BIN MOHD NORDIN 12DDT20F1039.
DEVICE & SERVICES USED TO ENHANCE NETWORK SECURITY.
1. FIREWALL. What is firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies..
URL filtering. Application filtering. Packet filtering.
2. ADDITIONAL PASSWORD SECURITY. DID YOU KNOW APS?.
An example of a strong password is accompanied by password security best practices that can help protect online accounts from hackers..
3. Endpoint Security. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats..
APPLICATION CONTROL. 01. recognizes only good files and blocks blocklisted or “bad files” passing through any endpoint in an enterprise network ..
4. VIRTUAL PRIVATE NETWORK(VPN). The primary function of a VPN is to conceal your online activity. VPNs are commonly used to protect against hackers and snoops on public networks, but they can also be used to hide your IP address, browsing activity, and personal data on any Wi-Fi network.By encrypting your connection and concealing your location, a VPN allows you to browse safely and securely. We won't go into too much detail here, but you should read our comprehensive guide on what a VPN is to get a full definition and learn more about how VPNs work..
5.WEB SECURITY. Web security refers to the safeguards and protocols that organisations put in place to protect themselves from cyber criminals and threats that use the web channel. Web security is critical for business continuity and the protection of data, users, and businesses.A web security gateway protects organisations from online threats by monitoring and filtering internet traffic in real time and blocking traffic that is deemed suspicious, malicious, or not in accordance with policy. Mimecast Web Security acts as a web security gateway, allowing access to safe websites while blocking access to dangerous ones..
Purpose of (AMS). To protect systems from malicious software, antimalware software employs three strategies: signature-based detection behavior-based detection sandboxing..
6. ANTI MALWARE SOFTWARE. What is Antimalware? Antimalware software is a type of software programme designed to protect information technology (IT) systems and individual computers from malicious software, also known as malware. Antimalware software scans a computer system for malware in order to prevent, detect, and remove it..
7. WIRELESS NETWORK. What is Wireless network? Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network..
What is Wireless network purpose? Wireless network security primarily protects a wireless network from unauthorized and malicious access attempts wireless intrusion detection and prevention systems also enable protection of a wireless network by alerting the wireless network administrator in case of a security breach..
8. EMAIL SECURITY. What is Email Security ? Email security can be defined as the use of various techniques to keep sensitive information in email communication and accounts secure It allows an individual or an organisation to protect the overall access to one or more email addresses or accounts..
EMAIL SECURITY. What is benefits Email Security ? Improve span and phishing protection Protection against zero-day threats maintain communication confidentiality.
9. ACCESS CONTROL. What is Access Control ? Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. Access control policies make sure users are who they say they are and that they have appropriate access to company data..
FOUR ACCES CONTROL MODELS:. Discretionary access control (DAC) Mandatory access control (MAC) Role-based access control (RBAC) Attribute-based access control (ABAC).
NETWORK TOPOLOGIES. 02.
BUS TOPOLOGY. Bus topology is a network setup where each computer and network device is connected to a single cable or backbone..
ADVANTAGE:. It is easy to connect a device to the network. It is cheaper than other network options. No hubs or switches are required.
A mesh topology is a network setup where each computer and network device is interconnected with one another . It is a topology commonly used for wireless networks ..
ADVANTAGE:. messages can be received more quickly if the route to the intended recipient is short. messages should always get through as they have many possible routes on which to travel. multiple connections mean (in theory) that no node should be isolated.
3. STAR TOPOLOGY. Star topology is a network topology in which each network component is physically connected to a central node such as a router, hub or switch.
ADVANTAGE:. It is very reliable – if one cable or device fails then all the others will still work. It is high-performing as no data collisions can occur. Less expensive because each device only need one I/O.
4. RING TOPOLOGY. A ring topology is a network configuration where device connections create a circular data path. Each networked device is connected to two others, like points on a circle..
ADVANTAGE:. All data flows in one direction, reducing the chance of packet collisions. A network server is not needed to control network connectivity between each workstation. Data can transfer between workstations at high speeds.
5. EXTENDED STAR TOPOLOGY. A hierarchical or extended star topology is a star network with an additional networking device connected to the main networking device..
ADVANTAGES DISADVANTAGES Highly efficient Expensive Centralized network management Requires additional equipment Safe to use Immobile systems.
6. HIERARCHICAL TOPOLOGY. arranged in the form of a tree structure in which top level contains parent node (root node), which is connected with the child nodes in the second level of hierarchy with point-to-point link. The second level nodes are connected to the third level nodes, which in turn are connected to the fourth level nodes and so on.
ADVANTAGES DISADVANTAGES The hierarchical topology is generally supported by most hardware and software. When the root node fails, the whole network crashes. Data is received by all the nodes efficiently because of point-to-point link. The hierarchical topology is difficult to configure...
Why You Shouldn't Use a Thank You Slide (And What to Do Instead).