The Current Internet: Connectivity and Processing

Slides:



Advertisements
Similar presentations
Intermediate 2 Computing
Advertisements

Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 6-1 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only be used.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Chapter 9 Using Telephone and Cable Networks for Data Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
WAN Technologies. Objectives WAN Technologies Overview WAN Technologies WAN Design.
Internet Service Providers (ISP) HOW INTERNET SERVICE PROVIDERS WORK.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
INTRODUCING F-SECURE POLICY MANAGER
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
1 Pertemuan 16 WAN Technologies Overview. Discussion Topics WAN technology WAN devices WAN standards WAN encapsulation Packet and circuit switching WAN.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Hubs A Hub is a hardware device that connects many computers of other devices to each other. Some information that is sent to the hub can be send to other.
Topic 5: Basic Security.
CCNA 4 v3.1 Module 2 WAN Technologies
Cybercrime What is it, what does it cost, & how is it regulated?
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
TOPIC 3 DATA TRANSMISSION AND NETWORKING MEDIA. INTERNET SERVICE PROVIDER (ISP) also known as Internet Access Provider (IAP) It is a company that offers.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
By Toby Reed.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 2 WAN Technologies.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Digital Subscriber Line (DSL)
NT1210 Introduction to Networking
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Network System Security - Task 2. Russell Johnston.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Technical Implementation: Security Risks
Internet Service Providers and types of internet connections
Introduction.
Learn how to protect yourself against common attacks
IT Security  .
Wireless Security.
Botnets.
Overview 1. Phishing Scams
Introduction 1 1: Introduction.
Network-based Intrusion Detection, Prevention and Forensics System
Wireless Network Security
Internet Safety Vocabulary
Computers in Society 12/1/2018.
Network Intrusion Detection and Mitigation
Wireless Network Security
Presentation transcript:

The Current Internet: Connectivity and Processing Access Networks Cable Modem LAN Premises- based WLAN Operator- Core Networks Transit Net Private Peering NAP Public Peering H.323 Data RAS Analog DSLAM The ISP likely has banks of many modems multiplexed onto a high capacity telephone cable that transports a large number of phone calls simultaneously (such as a T1, E1, ISDN PRI, etc.). This requires a concentrator or "remote access server" (RAS). PSTN Regional Wireline Voice Cell

The Spread of the Sapphire/Slammer SQL Worm Before January 25th, this talk contains a considerable amount of motivation as to why fast Internet worms are a potential threat. They are now a real threat. In the first 30 minutes of Sapphire’s spread, we recorded nearly 75,000 unique infections. Most of these infections actually occurred within 10 minutes. This graphic is more for effect rather than technical detail: We couldn’t determine a detailed location for all infections, and the diameter of each circle is proportional to the lg() of the number of infections, underrepresenting larger infections. Nevertheless, it gives a good feel for where Sapphire spread. We monitored the spread using several “Network Telescopes”, address ranges where we had sampled or complete packet traces at single sources. We also used the D- shield distributed intrusion detection system to determine IPs of infected machines, but we couldn’t use this data for calculating the scanning rate. 2

eCrime Market Operation Raw Materials Goods (Re)Application Goal Market S Buy, Sell, & Trade Wealth Step back a bit…talk about market enabling specialization, overview of process Miscreants buy, sell, and trade goods procured through hacking, social engineering, etc. Some employ new techniques to perpetrate old crimes Ex: Using form-grabbing trojans to steal online credentials for identity theft and financial fraud Others perpetrate sophisticated electronic crimes Using off-the-shelf goods and services acquired at market Ex: Spear phishing with “store bought” bank email lists, mailers, scam pages, and hosting Goods produced include: online credentials (online banking, payment services) offline credentials (cc nums, SSNs) hosts themselves Applications: Bots Cashiers credentials to funds Send more phish, spam