Computer Networks And Security
Soorya
Anniruth
VIII-B
Overview Of Computer Networks
• A computer network is a system of interconnected
computers and devices that share resources and
information. Networks are essential for
communication, data exchange, and resource sharing
among devices.
Network Devices and components
• Router:
• Connects multiple networks and directs data
packets.
• Used in both home and enterprise networks.
NETWORKING DEVICES AND COMPONENTS
Hub: Switch:
Basic device that connects Connects devices within a
multiple Ethernet devices. single network.
Operates at the physical layer Operates at the data link layer
(Layer-1) (Layer 2) of the OSI model.
Networking Devices And components
• Modem:
• Modulates and demodulates signals for
Internet access.
• Connects a computer to an ISP.
Networking Components And Device
• Access Point:
• Provides wireless connectivity.
• Used to extend the range of a wireless
network.
Networking Devices And Components
• Firewall:
• Filters incoming and outgoing network traffic.
• Protects against unauthorized access.
Networking Devices And Components
Network Interface Card (NIC):
Hardware component that connects a computer to
a network.
Can be wired or wireless.
Networking Devices And Components
• Cables:
• Ethernet cables (Cat5, Cat6): Used for
wired connections.
• Fiber optic cables: High-speed data
transmission over longer distances.
Network Security
• Network security involves measures to
protect data during transfer and ensure the
integrity and confidentiality of information.
Key components and practices include:
• Firewalls
Network Security
Firewalls:
Monitors and controls incoming and outgoing network traffic.
Can be hardware or software-based.
Antivirus and Anti-Malware:
Protects against malicious software.
Regularly updated to counter new threats.
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS):
Network security
• IPS: Takes action to prevent detected threats.
• Virtual Private Network (VPN):
• Secures a connection over a less secure network.
• Encrypts data for secure transmission.
• Encryption:
• Converts data into a secure format.
•
Network Security
• Access Control:
• Ensures only authorized users can access network resources.
• Utilizes methods like user authentication and role-based access con
• Secure Sockets Layer (SSL)/Transport Layer Security (TLS):
• Encrypts data transmitted over the Internet.
• Used in secure web transactions (HTTPS).
Conclusion
• Conclusion
• Understanding the components and security
measures of computer networks is crucial for
building efficient and secure systems. By leveraging
the right devices and implementing robust security
practices, we can ensure seamless communication
and data protection across networks
Thank you