Network security Vlasov Illia

Slides:



Advertisements
Similar presentations
Man in the Middle Attack
Advertisements

ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
FIREWALLS Chapter 11.
SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
CSA 223 network and web security Chapter one
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Security Awareness: Applying Practical Security in Your World
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Web server security Dr Jim Briggs WEBP security1.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
What does “secure” mean? Protecting Valuables
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Www. engineersportal.in. OUTLINES Network & Network Security Need of Network Security Methods of Network Security Firewall Firewall’s Works Firewall’s.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Embedded system security
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
CS457 Introduction to Information Security Systems
Chapter 1 : Security Concept
Penetration Testing: Concepts,Attacks and Defence Stratagies
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Port Knocking Benjamin DiYanni.
Chapter 7: Identifying Advanced Attacks
Instructor Materials Chapter 7 Network Security
Lesson Objectives Aims You should be able to:
Security Fundamentals
Security Shmuel Wimer prepared and instructed by
Introduction to Networking
Firewalls.
Security in Networking
Network Security: IP Spoofing and Firewall
Network Security and Monitoring
Wireless LAN Security 4.3 Wireless LAN Security.
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
AbbottLink™ - IP Address Overview
Introduction to Network Security
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
Operating System Concepts
Cloud and Database Security
Presentation transcript:

Network security Vlasov Illia

What is Network security ? Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions.

Information security management Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks. The risks to these assets can be calculated by analysis of the following issues: Threats to your assets: These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets Vulnerabilities: How susceptible your assets are to attack Impact: The magnitude of the potential loss or the seriousness of the event.

Types of Attacks Passive Active Networks are subject to attacks from malicious sources. Attacks can be from two categories: "Passive" when a network intruder intercepts data traveling through the network, and "Active" in which an intruder initiates commands to disrupt the network's normal operation or to conduct reconnaissance and lateral movement to find and gain access to assets available via the network. Passive Wiretapping Port scanner Idle scan Active Denial-of-service attack Buffer overflow Heap overflow Format string attack SQL injection DNS spoofing Man in the middle ARP poisoning VLAN hopping

The most popular Attacks 1. Port Scan A port scanner is an application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scan is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of itself. The majority of uses of a port scan are not attacks, but rather simple probes to determine services available on a remote machine.

The most popular Attacks 2.Man in The Middle (MITM) In computer security, a man-in-the-middle attack (often abbreviated MITM, or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. A man-in-the-middle attack can be used against many protocols. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of wireless access point can insert himself as a man-in-the-middle.

The most popular Attacks 3. Denial-of-service (DoS) In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. A DoS attack is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations.

How to prevent Attack? Use a firewall Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Use an antivirus Don’t open suspicious links, banners, etc. Don’t install suspicious software on your PC Use proxy server or VPN

Thank you for attention