Test 3 review FTP & Cybersecurity

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Types of Electronic Infection
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Small Business Security Keith Slagle April 24, 2007.
Topic 5: Basic Security.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Malicious Software.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network System Security - Task 2. Russell Johnston.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Security Protecting information data confidentiality
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Securing Network Servers
Chapter 5 Electronic Commerce | Security Threats - Solution
Seminar On Ethical Hacking Submitted To: Submitted By:
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Three Things About Malware
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 5. Security Threats
Chapter 5 Electronic Commerce | Security Threats - Solution
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
FTP - File Transfer Protocol
Business Risks of Insecure Networks
Botnets A collection of compromised machines
Teaching Computing to GCSE
Risk of the Internet At Home
Malware, Phishing and Network Policies
The Internet of Unsecure Things
Security.
Computer Security.
Lecture 3: Secure Network Architecture
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Security.
Securing Windows 7 Lesson 10.
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Cybersecurity and Cyberhygiene
Networking for Home and Small Businesses – Chapter 8
G061 - Network Security.
Presentation transcript:

Test 3 review FTP & Cybersecurity CIS 375 Test 3 review FTP & Cybersecurity

Test 3 Review General Terms The File Transfer Protocol (FTP) is the standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server.[1] FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is sometimes also used instead; it is technologically different. FTP typically uses ports 20/21 (*Must be opened on firewall)

Test 3 Review General Terms (continued) The FTP server is the machine that provides the files to the clients and holds the account(s) – settings and permissions FTP Client Software used to connect to an FTP server and access resources/files (add, delete, modify) FTP Clients can be specialized software, or a web browser (windows explorer can upload files through FTP, Browsers are read only)

Test 3 Review General Terms (continued) The FTP Log file stores the information and IP addresses of what IP/users have accessed/currently connected the FTP and what files they have accessed/added Users with the correct username password will be able to access the FTP (according to the account permissions), unless their IP address is added to the ban list on the FTP server (IP filtering).

Test 3 Review General Terms (continued) *It is important for network admins and programmers to understand hacking/cybersecurity in order to protect their code/network Blackhat - is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".[ Whitehat - hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair. Script Kiddie – A non-elite hacker that uses pre-programmed/configured tools to hack but possesses little detailed knowledge of computer security systems.

Test 3 Review General Terms (continued) Virus - is a specific type of malware by itself. It is a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when software is shared between computers (like a parasite). Malware - is software written specifically to harm and infect the host system. Malware includes viruses along with other types of software such as trojan horses, worms, spyware, and adware. Air Gap - a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. Backdoor - any method that acts as a way to access a computer system without going through normal authentication.

Test 3 Review General Terms (continued) Bot - compromised computer which is part of a botnet. An individual bot may be used for specific purposes in the botnet, but more than likely will just be an additional muscle in the swarm of a distributed denial of service attack or other illicit activity Algorithm - an unambiguous specification of how to solve a class of problems. Algorithms can perform calculation, dataprocessing and automated reasoning tasks. (MD5) Encryption - the process of encoding a message or information in such a way that only authorized parties can access it. (AES - https://en.wikipedia.org/wiki/Advanced_Encryption_Standard)

Test 3 Review General Terms (continued) Firewalls – a system designed to prevent unauthorized access to or from a private network. You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. Network Segmentation - the act or profession of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security.

Test 3 Review General Terms (continued) Phishing - a method of social engineering which relies on deception to fool unsuspecting users into giving account information, financial information, and other information which is useful to the attacker. Root Kit - a software suite, most often malicious in nature, which is designed to allow an unauthorized user to have root privileges on a system. Zero-Day - refers to the length of time that a patch has been available, or zero days, in the case of the zero day exploit (usually pretty major security holes).

Test 3 Review Cyber Security best practices Segment Network and use Firewalls (managed network/dc) Educate users, Establish policies & procedures Change passwords often & Backup! Use VPN Update software and anti-virus/malware. Encrypt Sensitive information (at all times) Scan for exploits/weaknesses and keep up with news (https://googleprojectzero.blogspot.com/)

Test 3 Review Good luck on the test!