Home Security in the Age of Broadband

Slides:



Advertisements
Similar presentations
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
Advertisements

Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Network security Process in which digital information are protected.
Bullet-Proofing Your Wireless Router By Steve Janss.
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Computer Networks.
Internet safety By Lydia Snowden.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
Internet Computer Security By: Jon Martin. A Note on Security You can never be 100% secure when on the internet.So never think that you are for that is.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Client-Server & Peer-to-Peer Networks
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
Copyright 2007 Jim Martin1 Broadband Internet Access Dr. Jim Martin
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
An Intern’s Guide to basic WMS 2011 setup in just 8 easy steps © 2011 Microsoft Corporation By: Livi Erickson.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
BTEC National Diploma – IT Practitioners Unit 16 - Maintaining Computer Systems.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
DSL-520B. What is a DSL-520B -ADSL2+ MODEM ROUTER -1 RJ-11 ADSL port, 1 RJ-45 10/100BASE-TX Ethernet LAN port with auto MDI/MDIX -Factory reset button.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
12/1/2015Faculty : Trần Thị Ngọc Hoa1 ISA server Overview 1. Introducing ISA Server 2. Deployment Scenario for ISA Server.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Granite Banc, Inc. Maralee Viox. Designing and Implementing a Local Area Network Granite Banc, Inc.
Securing A Wireless Home Network. Simple home wired LAN.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Agenda Last class: Computer Software Today: –Task Manager, Control Panel.
Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Network And Browser Support By 1Akal 1Akal – Technology Services for Home & Business.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Linux Firewalls By Shane Lofgren. Definition from wikipedia.org: A firewall is a security device which is configured to permit, deny or proxy data connections.
Canon Printer Support Phone Number
Dial Canon printer Tech support toll free number to resolve customer technical troubleshooting issues and Install Driver provides 24/7 tech support service.instant solution for all the Canon printer issues through their experts technicians
Managing Windows Security
Three steps to prevent Malware infection
CONNECTING TO THE INTERNET
Client-Server & Peer-to-Peer Networks
CALL FOR EXPERT TECH SUPPORT Need Help ?
Networking & Wireless Routers II Driver Installation
© 2015 Air Force Association
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Malware aka- malicious software By: Ken Fogel
How to Fix Windows 10 Update Error 0x ?.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
Linksys Router Technical Support Number
Information Security Session October 24, 2005
Working With The EPISD Gregory McChesney.
NAT Configuration For ZyXEL ADSL Wireless Router
Introduction to Systems Security
Web Servers / Deployment
Manage Security Settings with Group Policy
Online software and backups
Presentation transcript:

Home Security in the Age of Broadband Keeping Home Users Safe

Overview Routers/ Firewalls Software Firewalls Prevention/ maintenance

Routers/ Firewalls Dedicated hardware Router/Firewall Netgear SMC Dlink Linksys Provide basic Security NAT Some include more complex stateful firewalls Simple Setup Not Always Possible to use

Software Protection Software Firewalls/Routers Provide basic security Microsoft Internet Connection Sharing ZoneAlarm Provide basic security Usually more complex to set up Not necessarily as secure Computer still connected to the internet Available with any type of Broadband

Prevention/Maintenance Always keep software up to date Windows Update Virus Definition files Use Virus Protection Software Keep track of what software is installed Check logs when available

Conclusion Some security is better than none Always keep software up to date Use some form of firewall Be smart