Answer the questions to reveal the blocks and guess the picture. Guess what is the picture? Answer the questions to reveal the blocks and guess the picture.
Network Security
Network Security Lesson3 : Define Network Security and its objectives Lesson Objectives Define Network Security and its objectives Identify the different types of attacks Use network security tools
Network Security The security provided to a network to prevent unauthorized access and risks
To protect data from attacks Network Security Why is network security very important for companies, organizations and countries? To protect data from attacks
The objectives of network security are: 1. Control of accessibility to computers or network 2. Prevention of accidental deletion, modification or compromise of data 3. Detection and prevention of internal security breaches 4. Detection and prevention of unauthorized external hacking
1- Controlling Physical Access Ensuring a physically secure network environment is the first step in controlling access to your important data and files Control access to network elements Protecting the servers Keeping Workstations Secure Lock server rooms
The objectives of network security are: Activity 1 Develop a security plan to control physical access to the school network Computer Room should be locked Set control camera Staff & students should have username and password Set Password for router.
The objectives of network security are: 2-Preventing Accidental Changes or Loss of Data: A lot of information that gets deleted, changed, or given to the wrong person happens because of mistakes made by people who are in charge of the network or staff who have access to it To prevent this from happening you have to provide users with the following: Password Policies & Rules Access depends on skills
The objectives of network security are: 2-Preventing Accidental Changes or Loss of Data: The objectives of network security are: Activity 2 suppose you are a network administrator. What kinds of rights will you give to network users and what will you not give them? Teachers should be given different rights (add/remove) Students should read only (view) some files Students are should not be given rights to print using shared printers
The objectives of network security are: 3-Preventing Intentional Internal Security Breaches Internal attackers are more dangerous than external attackers. Can you think of some reasons why? They have an access to resources and rights in network more than others
The objectives of network security are: 3-Preventing Intentional Internal Security Breaches 1- Hiring and Human Resource Policies 2-Detecting Internal Breaches Activity 3 Footprint Friends and Colleagues In what ways can we check if a person has good character or not?
The objectives of network security are: 4-Preventing Outsiders Getting Into Your Network People from outside the network viewing or stealing information (hacking into a network) is a big worry for all companies 1-External Intruders with Internal Access 2-Tactical Planning (training plan) Activity 4 Develop a security policy “ if / then “ in case someone hacks your personal computer
Types of Attacks An ‘attack’ is : an attempt to get into a computer or a network without permission.
Types of Attacks 1- Social engineering attacks 2- Denial of Service (DOS) attacks 3- Scanning and Spoofing 4- Software and system exploits 5- Trojans, viruses and worms:
Activity 5 Types of Attacks 1- Social engineering attacks How can we deal with hackers who are good at winning trust and persuading a staff member to give them their password for work computers?
HTTP Error 503. The Service is unavailable Types of Attacks 2- Denial of Service (DOS) attacks Service Unavailable ___________________ HTTP Error 503. The Service is unavailable
The objectives of network security are: 3- Scanning and Spoofing
Types of Attacks 4- Software and system exploits
4- Software and system exploits Types of Attacks 4- Software and system exploits What steps can I take to prevent software and system exploits attacks? By updating the Operating system. Installing anti-virus programs
5- Trojans, viruses and worms Types of Attacks 5- Trojans, viruses and worms Trojan: This is a software program that appears to perform a useful function, but in fact, performs actions that the user of the program did not intend. Trojans can: • Delete or change files. • Send files across the network to the hacker. • Install other programs or viruses.
Types of Attacks 5- Trojans, viruses and worms Viruses: These are any programs installed without the user knowing about them. They can do harmful things or just annoying things.
Types of Attacks 5- Trojans, viruses and worms Worms: These are programs that can travel across the network from one computer to another. Worms make multiple copies of themselves and spread throughout a network. Worms can exploit operating system and software weaknesses and perform harmful actions.
5- Trojans, viruses and worms Types of Attacks 5- Trojans, viruses and worms Search for the best software that can protect your computer from Trojans, viruses and worms.
Types of Attacks Search for the best software that can protect your computer from Trojans, viruses and worms.
Network Security Tools 1.Operating system and applications 2.Firewalls 3. Antivirus 4. Content Filtering 5.Intrusion Detection Systems Search for new tools that protect your home network from hackers
Types of Attacks https://www.avast.com
Types of Attacks