0% found this document useful (0 votes)
12 views9 pages

Class 18 Security & VPN

The document covers essential topics related to computer system software, network security, and VPN technology. It emphasizes the importance of protecting networks and devices from unauthorized access and outlines best practices for securing desktop and perimeter security. Additionally, it explains how VPNs work, their uses, and steps for setting them up to enhance privacy and secure data transmission.

Uploaded by

disalfinksunny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

Class 18 Security & VPN

The document covers essential topics related to computer system software, network security, and VPN technology. It emphasizes the importance of protecting networks and devices from unauthorized access and outlines best practices for securing desktop and perimeter security. Additionally, it explains how VPNs work, their uses, and steps for setting them up to enhance privacy and secure data transmission.

Uploaded by

disalfinksunny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Module 2: Computer System Software—Operating Systems,

Basic commands in Linux /Windows, Shell scripting (bash).


Computer Communications—LAN, MAN, WAN, Client/Server
networks, Peer-to-Peer networks, Topologies. Basics of IP
addresses, DHCP, NAT, Network Security (Desktop &
Perimeter), DNS, VPN, Routers, Client-Server, Internet, WWW,
and Web servers
Network Security
 Definition: Network security involves protecting computer networks from unauthorized access, attacks, and
other risks.

 Importance: It ensures confidentiality, integrity, and availability of data.

Desktop Security

Desktop security, or endpoint security, focuses on securing individual devices (like desktops,
laptops, and mobile devices) that connect to the network. Here’s how to secure a desktop:

 Antivirus and Anti-malware Software: Protects against malicious software by detecting,


blocking, and removing viruses, spyware, and other harmful programs.
 Operating System and Software Updates: Regular updates help patch vulnerabilities that
attackers could exploit.
 Firewalls: Desktop firewalls monitor incoming and outgoing network traffic, blocking
potentially harmful connections.
 User Authentication and Access Control:
o Passwords, multi-factor authentication (MFA), and user access levels reduce the risk of
unauthorized access.
o Educate users on creating strong passwords and recognizing phishing attempts.

 Data Encryption: Ensures data on the device and data shared over the network remain
secure. Windows and macOS provide built-in encryption options (e.g., BitLocker, FileVault).
 Physical Security: Involves securing devices against theft and limiting physical access.
Perimeter Security

Perimeter security focuses on protecting the network’s boundary to prevent unauthorized external
access.

 Firewalls: Network firewalls monitor and filter traffic between internal and external networks.
They can be configured to allow or block specific types of traffic.

 Intrusion Detection and Prevention Systems (IDS/IPS): IDS monitors traffic for suspicious
activity, while IPS blocks potentially dangerous traffic in real-time.
• Virtual Private Network (VPN): Encrypts the connection for remote users accessing the
network, protecting sensitive information even over public networks.
 Demilitarized Zone (DMZ): A DMZ is a network segment that separates public-facing servers
(e.g., web servers) from internal resources. It acts as a buffer zone, reducing the risk of direct
attacks on internal systems.

 Network Segmentation: Dividing the network into segments helps isolate sensitive areas and
limits the spread of attacks.

Best Practices for Network Security

 Educate Users: Awareness training on identifying phishing attacks, using secure passwords, and
proper use of devices.

 Regular Audits and Monitoring: Constantly monitor traffic, review security logs, and perform
vulnerability scans.
• Backup and Recovery Plans: Ensure there are regular backups of critical data and a recovery
plan to restore operations quickly after an attack
VPN
• A Virtual Private Network (VPN) is a technology that creates a secure, encrypted connection
over the internet between your device (like a computer or smartphone) and another network.
• This connection acts like a private tunnel, making it seem as if you’re directly connected to the
network you’re accessing, even if you’re actually far away or using a public Wi-Fi network.
• VPNs are used to protect online privacy, secure data, and access restricted or blocked content.
• Without a VPN, any data you send or receive, like browsing or sending emails, is open for others
on the same network to intercept.
• A VPN hides this data by encrypting it—making it unreadable to anyone who doesn’t have the key
to decrypt it.
How VPN Works?

1. Starting the VPN Connection:


o You activate the VPN app on your device. This app creates a “secure tunnel” between your
device and a VPN server located in another part of the world.

2. Encryption:
o Once the tunnel is set up, all data sent between your device and the VPN server is encrypted.
This encryption changes your data into a code that’s unreadable to outsiders, keeping your
information safe from hackers or prying eyes on the same network

3. Data Passing Through the VPN Server:


o Your internet traffic (like website requests or emails) goes through the VPN server. Since this
server has a different IP address (a unique identifier of a device on the internet), your original
IP address is hidden, which makes your activity and location private.

4. Receiving Data Securely:


o Any information coming back from the internet also travels back to the VPN server first,
where it’s encrypted and then sent to your device. This keeps everything secure and private.
Uses of VPN

1. Enhanced Privacy: Hides your IP address and browsing data from trackers and hackers.

2. Accessing Restricted Content: VPNs can allow access to content restricted by region, like certain websites
or streaming services.

3. Security on Public Wi-Fi: Protects your data from being intercepted when using open networks.

4. Remote Work and Secure Access: Allows employees to securely access their company’s network remotely.
Setting Up and Using a VPN

1. Choose a VPN provider (like NordVPN or ExpressVPN) and download their app.

2. Create an account and select a subscription plan.

3. Open the VPN app, log in, and choose a server location.

4. Connect to the VPN server—your internet traffic will now be encrypted.

You might also like