Network Security Mark Creighton GBA 576 6/4/2019.

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
Week-13 (Lecture-1) Data Communication Hardware: 1)Coaxial cable: Widely installed for use in business and corporation Ethernet Used to install LANs. Consists.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Chapter 40 Internet Security.
Securing Information Systems
BUSINESS DRIVEN TECHNOLOGY
Chapter 15: Security.
Working at a Small-to-Medium Business or ISP – Chapter 8
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Backdoor Attacks.
EN Lecture Notes Spring 2016
Network Security Marshall Leitem 11/30/04
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Threats to computers Andrew Cormack UKERNA.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Firewalls.
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Security in Networking
Network Security: IP Spoofing and Firewall
Intrusion Detection & Prevention
برنامج أمن أنظمة الحاسب
Data integrity and security
Security.
Intrusion Detection system
Operating System Concepts
Unit 1 Fundamentals of IT
Protection Mechanisms in Security Management
G061 - Network Security.
Unit 6.10 – L3 Internet Security
Presentation transcript:

Network Security Mark Creighton GBA 576 6/4/2019

Overview Network security includes: physical security electronic security information security. 6/4/2019

Physical Security Extra components, computers and printers Locks on doors, alarm sensors at all entry points into the company, an alarm system and utilization of security companies Steel bars, steel cables and locks Network back-ups stored offsite 6/4/2019

Physical Security: Network Cable Unshielded wiring is susceptible to listening devices due to the electromagnetic radiation it gives off. Shielded wiring gives off less electromagnetic radiation but it may still be susceptible to listening devices Fiber-optic cable does not give off electromagnetic radiation 6/4/2019

Electronic Security Firewalls Antivirus software Passwords Intrusion Detection Systems 6/4/2019

Electronic Security: Firewalls Analyzes data entering and leaving a network and protects the IP addresses of computers located behind the firewall Packet Filtering - uses the packet’s source, destination, port to determine access Proxy Firewalls - utilizes content, authentication and encryption, is more secure but is slower 6/4/2019

Firewall Disadvantages Use of brute force to flood a firewall with too much incoming data will cause it to fail Encrypted traffic can get through a firewall 6/4/2019

Antivirus Software Can detect known viruses, worms, trojans or other malicious code Between 6500 and 8800 new viruses are created each year Most viruses are created to affect only Microsoft Operating systems McAfee and Norton 6/4/2019

Passwords Minimum of eight characters long No dictionary words Contain both letters and numbers (529MARK1971) Automated password generation software from thinknomore.com or softhink.com 6/4/2019

Intrusion Detection System Monitors, detects or identifies and records potential security threats or intrusions Utilize signature scanning - unique data fingerprints -scanning ports Anomaly detection - time of day log in Signature Detection - 3X password wrong Target monitoring - specific files modified 6/4/2019

Network based IDS Sensors are located on network Unauthorized access and denial of service Less effective on high speed networks and encrypted messages 6/4/2019

Host based IDS Monitors activity on specific computers Detects and collects unauthorized insider activity more quickly Disadvantage is that they are large in proportion to the size of the company Can be circumvented by cracker disabling data collection on host computer 6/4/2019

Information Security Public Key Infrastructure encryption: - Symmetrical - same key - Asymmetrical - public and private key - Digital certificates - license credentials - Digital Signatures - cryptographic - Timestamps - mathematical link 6/4/2019

Conclusion Security is a multifacited discipline Keeping current on security is critical There is no such thing as being totally secure Best offense is a good defense Security will fail so make sure it fails in a way that allows for the least amount of damage 6/4/2019