Network Security PPT
1) Does this video offer information of real value or help facilitate understanding of the topical matter?
2) Is this video technically sound (i.e. Is the sound quality good, does the video cycle too quickly, etc.)
3) Does this video give enough value to warrant a recommendation?
4) Does this video convey the information in plain language, or does it skew too heavily toward jargon?
5) Will the viewer learn something of value/interest/aid to their employer, themselves, or their network?
The answers to these questions were then recorded on a scale from 1-10, and the videos were scored accordingly as an average of the total scores garnered.
Introduction to Network Security PPT Presentation
This PowerPoint includes a great deal of good information about network security, including how it can be compromised and why it matters. The biggest problem with this presentation is that it seems to have initially been an eight to ten-minute presentation with a voiceover, which has now been compressed to less than two minutes. If you decide to use this presentation in your meeting, be prepared to pause frequently so no key points get missed.
Intrusion Detection System PPT Presentation
Created by P. Victer Paul, a PhD candidate at Pondicherry University of India in computer science, this brief introduction to the importance and proper setup of an intrusion detection system as another layer of network security contains a lot of good information in a clearly presented format. However, this network security PPT suffers from the same problem as the one profiled above in that it seems to have been sped up to save bandwidth. As with the Introduction to Network Security PPT Presentation, be prepared to do a lot of manual pausing and be sure to have your own notes from which to work.
WiFi Security – A Practical Solution to Security
Samarth J. Parikh, the president of SamSoft, created this video to give users with a minimal technical background common-sense advice on how to make a wireless network more secure and less vulnerable to intrusion. Some of the topics broached are problems with WEP encryption and why WPA2/WPA AES encryption and enabled devices are necessary to thwart modern computer attacks. He also discusses the four levels of network security: home user, small business, large business network, and military-level security. In each he considers vulnerabilities versus likelihood of successful attack and the methodology underlying each. While there is no narration in this network security PPT, it will serve as a useful visual aid to accompany your own presentation on how to make your company’s network more secure.
Fundamentals of Network Security pt 1
This two-part presentation, produced by PCIS/Boonbox and narrated by Louis Parker, an information systems consultant with PCIS in Vancouver, British Columbia, zeros in on potential network vulnerabilities both from the virtual and the physical standpoints. Topics included are the dangers of social engineering, the threat of electronic intrusion, and countermeasures companies may wish to implement in order to prevent these types of attacks. He also discusses various methods of attack through email, “spoofing” of a legitimate email address, and Trojan horses and viruses. The sound quality leaves a little to be desired, and depending on your speaker quality you may need to turn your system volume all the way up for the narrator to be intelligible, but the information included in this presentation is well worth the listen. It is worth noting, however, that this presentation was designed as part of a proprietary webinar on network security, and your external network security vendor may not appreciate its use.
Fundamentals of Network Security pt 2
In part two of the PCIS/Boonbox presentation, Louis Parker addresses network security policies at the corporate level and physical procedures for preventing intrusion. He speaks of an incident where an individual attempted to gain physical access to PCIS’s server equipment, apparently for the purpose of harvesting information by electronic or physical means. According to Parker, the intruder was thwarted when an alert employee noted that there was no record of scheduled service, maintenance, or inspection of the server area. This chilling story serves as a potent reminder that while remote attacks are the most popular method of attempted intrusion and data harvesting, social engineering is still a very real threat. While these presentations need not be viewed in tandem, they offer a lot of good information about network security threats and safety procedures given in plain, readily understood layman’s terms.
Understanding Extensible Authentication Protocol – CompTIA Network
This video, produced by Professor Messer, explains how the EAP protocol works in adding an additional layer of security to existing authentication protocols. The video explains in simple language how the EAP framework functions, where it is commonly used, and the different kinds of EAP available based upon the type of connection involved. After a brief digression into the history of EAP, including the proprietary LEAP protocol used by Cisco and which was based on the short-lived and highly vulnerable MS-CHAP architecture, the video then explains how PEAP works and what the advantages and shortcomings of each are depending on the security paradigm required. The sound quality on this video isn’t great, but it’s well worth spending the three minutes on for a basic “crash course” in different EAP schemes.
Network Security Presentation
Of all the videos screened here, this one combines some of the best information and most amusing graphics with the worst sound quality. The speaker, presumably D.S. Ariyarathna, the credited creator of the presentation, is standing in a space, possibly a classroom, with horrible acoustics, and his thick accent makes him potentially very difficult to understand.
This video intercuts live video of a lecture with a PowerPoint presentation on the basics of network security. While this video takes things down to a basic level most IT professionals are unlikely to appreciate, it does offer some good information on the difference between a virus and a worm, presented in a way designed specifically to be comprehensible to the technologically challenged. System security and various forms of attacks including “smurfing,” “ping storms,” and “DoS” attacks are explained, and methods of securing a network including limiting access or user privileges are analyzed and discussed.
While each of these presentations has their own merits and shortcomings, all of them include at least some information of real value to IT professionals and their clients or employers. Perhaps the best thing about these videos in sum is that they all break down IT jargon and techese into language designed to be friendly to the IT novice or the computer illiterate. While some people may find more value in these network security PPT presentations than others, they nevertheless form a good basis for initiating a discussion or explaining to the general corporate public why certain protocols need to be in place and what the possible consequences are of violating them.