Instructor Materials Chapter 7 Network Security

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Viruses & Destructive Programs
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
 Malicious Code  Hacking  Natural Disaster  Theft.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Understand Malware LESSON Security Fundamentals.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
Network System Security - Task 2. Russell Johnston.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Managing Windows Security
What they are and how to protect against them
Malware and Computer Maintenance
Working at a Small-to-Medium Business or ISP – Chapter 8
IT Security  .
CHAPTER 6 – BASIC SECURITY
Business Risks of Insecure Networks
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
Teaching Computing to GCSE
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
Malware, Phishing and Network Policies
Information Security Session October 24, 2005
Forensics Week 12.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Instructor Materials Chapter 7 Network Security Cisco Networking Academy Program Networking Essentials Chapter 7: Network Security Networking Essentials

Chapter 7: Network Security Cisco Networking Academy Program Networking Essentials Chapter 7: Network Security Networking Essentials

Chapter 7 - Sections & Objectives 7.1 Am I at Risk? Explain network security threats. 7.2 Methods of Attack Explain other types of network security threats. 7.3 How Can I Protect My Network? Explain how software tools can mitigate network security threats. 7.4 How Do Firewalls Protect Networks? Configure a firewall to control network traffic. 9

7.1 Am I at Risk? Cisco Networking Academy Program Networking Essentials Chapter 7: Network Security

Am I at Risk? Hackers and Intruders What Do They Want? When the hacker gains access to the network, four types of threat may arise: Information theft, Identity theft, Data loss / manipulation, and Disruption of service Where Do They Come From? External threats arise from individuals working outside of an organization. Internal threats occur when someone has authorized access to the network through a user account or has physical access to the network equipment.   7.1 – Am I at Risk? 7.1.1 – Hackers and Intruders

Am I at Risk? Social Engineering Attacks In the context of computer and network security, social engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information. 7.1 – Am I at Risk? 7.1.2 – Social Engineering Attacks Types of Social Engineering Three of the most common methods hackers use to obtain information directly from authorized users go by unusual names: pretexting, phishing, and vishing.

Am I at Risk? Virus, Worms, and Trojan Horses Other Types of Attacks Malicious software can damage a system, destroy data, as well as deny access to networks, systems, or services. They can also forward data and personal details from unsuspecting PC users to criminals. 7.1 – Am I at Risk? 7.1.3 – Virus, Worms, and Trojan Horses A Trojan horse is program that is written to appear like a legitimate program, when in fact it is an attack tool.  A worm is similar to a virus, but unlike a virus does not need to attach itself to an existing program.  A virus is a program that spreads by modifying other programs or files.

7.2 Methods of Attack Cisco Networking Academy Program Networking Essentials Chapter 7: Network Security

Methods of Attack Denial of Service and Brute Force Attacks An attacker uses a DoS attack to perform these functions: Flood a system or network with traffic to prevent legitimate network traffic from flowing Disrupt connections between a client and server to prevent access to a service 7.2 – Methods of Attack 7.2.1 – Denial of Service and Brute Force Attacks

Methods of Attack Denial of Service and Brute Force Attacks (Cont.) DDoS DDoS is a more sophisticated and potentially damaging form of the DoS attack. It is designed to saturate and overwhelm network links with useless data.  Brute Force With brute force attacks, a fast computer is used to try to guess passwords or to decipher an encryption code. The attacker tries a large number of possibilities in rapid succession to gain access or crack the code.  7.2 – Methods of Attack 7.2.1 – Denial of Service and Brute Force Attacks (Cont.)

Methods of Attack Other Types of Malware Spyware Spyware is any program that gathers personal information from your computer without your permission or knowledge. This information is sent to advertisers or others on the Internet and can include passwords and account numbers. Adware Adware is a form of spyware used to collect information about a user based on websites the user visits. That information is then used for targeted advertising.  7.2 – Methods of Attack 7.2.2 – Other Types of Malware

Methods of Attack Other Types of Malware (Cont.) Botnets and Zombies When infected, the “zombie” computer contacts servers managed by the botnet creator. These servers act as a command and control (C&C) center for an entire network of compromised devices, or "botnet." 7.2 – Methods of Attack 7.2.2 – Other Types of Malware (Cont.)

7.3 How Can I Protect My Network? Cisco Networking Academy Program Networking Essentials Chapter 7: Network Security

How Can I Protect My Network? Security Tools Security Practices Security procedures can range from simple, inexpensive tasks such as maintaining up-to-date software releases, to complex implementations of firewalls and intrusion detection systems. Security Tools Many tools are available to network users to protect the devices from attacks and to help remove malicious software from infected machines. 7.3 – How Can I Protect My Network? 7.3.1 – Security Tools

How Can I Protect My Network? Security Tools (Cont.) Patches and Updates A patch is a small piece of code that fixes a specific problem. An update, on the other hand, may include additional functionality to the software package as well as patches for specific issues. 7.3 – How Can I Protect My Network? 7.3.1 – Security Tools (Cont.)

How Can I Protect My Network? Antivirus Software Infection Detection Any device that is connected to a network is susceptible to viruses, worms and Trojan horses. So how do you know if your computer has been infected? Computer starts acting abnormally Program does not respond to mouse and keystrokes Programs starting or shutting down on their own Email program begins sending out large quantities of email CPU usage is very high There are unidentifiable, or a large number of processes running Computer slows down significantly or crashes 7.3 – How Can I Protect My Network? 7.3.2 – Antivirus Software

How Can I Protect My Network? Antivirus Software (Cont.) Antivirus software relies on known “virus signatures” in order to find and prevent new viruses from infecting the computer. Antispam Software Protects hosts by identifying spam and performing an action, such as placing it into a junk folder or deleting it. 7.3 – How Can I Protect My Network? 7.3.2 – Antivirus Software (Cont.) Additional Safeguards Before forwarding virus warning emails, check a trusted source to see if the virus is a hoax.

How Can I Protect My Network? Removing Spyware Antispyware, Adware, and Popup Blockers Antispyware detects and deletes spyware applications. Many antispyware applications also include detection and deletion of cookies and adware. Popup blocking software can be installed to prevent popups and pop-unders. 7.3 – How Can I Protect My Network? 7.3.3 – Removing Spyware

7.4 How Do Firewalls Protect Networks? Cisco Networking Academy Program Networking Essentials Chapter 7: Network Security

How Do Firewalls Protect Networks? Firewall Basics What is a Firewall? A firewall prevents undesirable traffic from entering protected areas of the network. A firewall is usually installed between two or more networks and controls the traffic between them as well as helps prevent unauthorized access.  Firewalls can be implemented in software. Firewalls may also be hardware devices. A hardware firewall is a freestanding unit. Firewalls often perform Network Address Translation. 7.4 – How Do Firewalls Protect Networks? 7.4.1 – Firewall Basics

How Do Firewalls Protect Networks? Firewall Basics (Cont.) DMZ In computer networking, a DMZ refers to an area of the network that is accessible to both internal and external users.  With the wireless router, a simple DMZ can be set up that allows an internal server to be accessible by outside hosts. The wireless router isolates traffic destined to the IP address specified. This traffic is then forwarded only to the switch port where the server is connected. 7.4 – How Do Firewalls Protect Networks? 7.4.1 – Firewall Basics (Cont.)

How Do Firewalls Protect Networks? Configuring Firewalls Port Forwarding Port forwarding is a rule-based method of directing traffic between devices on separate networks. This method of exposing your devices to the Internet is much safer than using a DMZ. The rules that you configure in the firewall settings determine which traffic is permitted on to the LAN. Port Triggering Port triggering allows the router to temporarily forward data through inbound TCP or UDP ports to a specific device. You can use port triggering to forward data to a computer only when a designated port range is used to make an outbound request. 7.4 – How Do Firewalls Protect Networks? 7.4.2 – Configuring Firewalls