Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Johnson Logistics Solutions Office of Systems and Information Technology.
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Chapter 7 HARDENING SERVERS.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Payment Card Industry (PCI) Data Security Standard
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Information Security Information Technology and Computing Services Information Technology and Computing Services
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet safety By Lydia Snowden.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Human-Computer Interface Course 2. Content The use of IT in everyday life Electronic Commerce Security Computer Viruses Copyright and the Law File Systems.
Protecting ICT Systems
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
1.1 System Performance Security Module 1 Version 5.
Chapter 13 – Network Security
Chapter Fifteen Working with Network Security. Objectives To discover what dangers lurk in that great big world To examine the basic concepts of security.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Types of Electronic Infection
Security Training USAID Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
Module 7: Implementing Security Using Group Policy.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Communications & Networks National 4 & 5 Computing Science.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Peer-to-Peer Vs. Client/Server.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
Lesson 16-Windows NT Security Issues
Presentation transcript:

Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks

2 Network Security Threats Viruses Vandalism Industrial espionage Theft Natural disasters

3 Protecting the Workstation Implement power-on password protection Use screen savers with passwords Turn-off local caching of passwords Educate users to proper password procedures and practices

4 Consider using an Operating System that supports the NTFS file system. Windows NT Workstation Windows 2000 Professional Windows XP Professional

5 Peer-to-peer Security Share-level Security – Shares on the network are protected with individually assigned passwords. Individual User-level Security – The Operating System on each individual workstation can be set up to authenticate the user name and password.

6 Peer-to-peer Security Assign passwords and permissions to individual shares. Individually configure each workstation with multiple User Names and Passwords.

7 Peer-to-peer Security Assign passwords and permissions to individual shares. Individually configure each workstation with multiple User Names and Passwords.

8 User-level Security Used in Client/Server networks. A prime advantage of Client/Server network over peer-to-peer. The server

9 Protecting the Network from Viruses Educate users on common-sense rules for avoiding viruses. Install virus protection software on every server and client workstation. Update virus signatures at least monthly.

10 Virus A program designed to spread itself secretly from one file, computer, or network to another for the purpose of eventually performing some annoying or destructive act.

11 Viruses are contracted from: Disks of unknown origin. Downloads from unknown sources. Attachments to unsolicited messages.

12 Common-sense rules for avoiding viruses. Don’t use disks of unknown origin. Don’t download files from unknown sources. Don’t open attachments to unsolicited e- mail messages. Educate everyone in your organization to follow these common sense rules for avoiding viruses.

13 Use Anti-Virus Software Install anti-virus software on every client workstation and server in the network. Update virus signatures regularly.

14 Protecting the Network from Theft and Natural Disasters Place key equipment in a secure location. Backup data regularly. Keep backup media in a separate location.

15 Protecting the Network from the Internet Enforce Password Policy Use a firewall between the Internet and the local network. Use data encryption when sending sensitive data over the Internet or over phone lines.

16 Password Policy Set the minimum password length to seven characters. Require passwords to use numbers and special characters as well as letters. Do not use passwords that can be found in a dictionary. Insist that user name and password must be different. Change passwords on a regular basis.

17 Internet Firewall

18 Authentication The process of verifying identity. A way to prove to one entity that another entity is who it claims to be. Usually done with User Name and Password.

19 Kerberos Authentication Protocol An industry standard authentication protocol designed by MIT and Cornell University. The default Authentication Protocol used in the Windows 2000 and XP environment. A high-security method of encrypting and authenticating passwords.

20 Now, it’s your turn.