Lesson Objectives Aims You should be able to:

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Mr C Johnston ICT Teacher
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Network Security Testing Techniques Presented By:- Sachin Vador.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
COEN 252: Computer Forensics Router Investigation.
Department Of Computer Engineering
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Troubleshooting Windows Vista Security Chapter 4.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security By Duncan Hall.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Final Project: Advanced Security Blade IPS and DLP blades.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Network security Vlasov Illia
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Final Project: Advanced security blade
CSCE 548 Student Presentation By Manasa Suthram
3.6 Fundamentals of cyber security
Network Security (the Internet Security)
Systems Security Keywords Protecting Systems
Secure Software Confidentiality Integrity Data Security Authentication
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
Teaching Computing to GCSE
Information Security Session November 11, 2004
Unit 1.6 Systems security Lesson 3
LO2: Understand Computer Software
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Malware, Phishing and Network Policies
Information Security Session October 24, 2005
Intrusion Detection & Prevention
Unit 1.6 Systems security Lesson 2
Intrusion detection systems?
Bethesda Cybersecurity Club
Securing Windows 7 Lesson 10.
Network hardening Chapter 14.
FIREWALL.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Protection Mechanisms in Security Management
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Lesson Objectives Aims You should be able to: Describe methods of identifying and preventing attacks, including: Penetration Testing Network Forensics Network Policies Anti-Malware Software Firewalls User Access Levels/Rights User accounts and Passwords Encryption

We discussed common threats to network security Last time… We discussed common threats to network security Now we need to look at what we do to: Prevent attacks Find out what happened Protect users and systems

Penetration testing Penetration testing is quite simply the best job ever. Penetration testing is where a company pays someone to: Deliberately break in to their systems In any way possible Without warning Steal as much as possible (both data and physical objects!) Produce a report afterwards

Penetration Testing It usually involves: Lots of social engineering Lots of observation about working practises, habits of employees and potential targets Collecting data from employees Creating fake credentials Finding a way in to a building or system Running amok.

Penetration Testing Read this: https://www.theregister.co.uk/2016/12/08/inside_hacking_a_business_feature/ If you can handle books, read this:

Penetration Testing The outcome of this is: Real world testing Finding vulnerabilities not only in computer systems but also policies and people! An indication of how secure your data really is

Most forensics involves: Network Forensics If someone breaks your system, you might want to find out how it happened Most forensics involves: Reading through log files Investigating suspicious files Tracing network addresses Finding security holes that have been exploited

Network Policy Network policy is designed to protect your systems in the first place It can cover LOTS of things: Usernames and passwords Permissions Who can see what (shares) Who can do what (access rights, install/execute etc) When people can do things Which machines people can use How servers and machines are configured How security updates are applied and when

Firewall/Anti Malware We’ve looked at firewalls before: Hardware or software Inspects packets Blocks packets based on a set of rules On both incoming and outgoing traffic Anti-Malware: Used to scan files, downloads, websites, usb drives etc Looks for malicious software using signatures and heuristics

User Accounts/Passwords Aren’t they obvious? Provides a level of authentication on a system Provides an audit trail (log) of who used what and when (but you can steal credentials, remember!) Used to set access rights, permissions and shares First line of defence on a network – if you shouldn’t be on there, you shouldn’t be able to log in!

Rights/Access Levels Access rights and levels: What can they do: Administrator Power user Standard user Restricted user What can they do: Just read files? Read/Write but to a certain area Install software Change settings and configs

Encryption We did encryption in a previous lesson: Scrambles data So that it cannot be understood even if intercepted Usually using a key Cannot be decrypted without a key Provides protection for data even if stolen/intercepted