Introduction to Networking Security

Slides:



Advertisements
Similar presentations
ITGS: MUST KNOW TERMS NETWORK. Internet Global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve.
Advertisements

IS Network and Telecommunications Risks
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Chapter 5 Networks Communicating and Sharing Resources
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Securing Wired Local Area Networks(LANs)
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
NETWORKING & SYSTEM UPDATES
TCP/IP. The idea behind TCP/IP is exactly the same we explained about the OSI reference model: when transmitting data, programs talk to the Application.
Transmission Control Protocol (TCP) Internet Protocol (IP)
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Networks The Big Picture. Three Great Leaps of Civilization.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Securing Interconnect Networks By: Bryan Roberts.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Cisco I Introduction to Networks Semester 1 Chapter 3 JEOPADY.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Chapter 1: Explore the Network
Chapter Objectives In this chapter, you will learn:
Chapter 12 – Networks, Network Software, and the Internet
Networking Using the OSI Model.
CompTIA Security+ Study Guide (SY0-401)
Introduction to Technology Infrastructure
Network Security (the Internet Security)
NETWORK Unit 1 Module: 2 Objective: 7.
Slides taken from: Computer Networking by Kurose and Ross
Protocols.
Planning & System Installation
OSI Protocol Stack Given the post man exemple.
FTP - File Transfer Protocol
Introduction to Technology Infrastructure
Teaching Computing to GCSE
Lectures Computer networking تمرین 3 نمره. پژوهش عملیاتی 2 نمره.
Welcome To : Group 1 VC Presentation
CompTIA Security+ Study Guide (SY0-401)
Computer Technology Notes #4
TASK 4 Guideline.
Understanding Network Security
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Topic 5: Communication and the Internet
I. Basic Network Concepts
ECEN “Internet Protocols and Modeling”
Firewalls Routers, Switches, Hubs VPNs
Web Servers / Deployment
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Network Models CCNA Instructor Training Course October 12-17, 2009
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Internet Basics Videos
Protocol Application TCP/IP Layer Model
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
WJEC GCSE Computer Science
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
IS 4506 Configuring the FTP Service
Presentation transcript:

Introduction to Networking Security GenCyber 2019

Purpose of Computer Networks Resource Availability Networking Basics Purpose of Computer Networks Provide access to shared resources, like printers, applications, and services Resource Availability Physical and virtual infrastructure strives to provide 24x7 access to networked resources

Physical and Virtual Infrastructure TCP/IP Stack Application How a pair of applications interact Examples: HTTP, FTP, SMTP Transport Communication between applications on separate computers Specs: Maximum data rates, congestion control Internet Fundamental basis of the Internet – multiple interconnected networks Network Interface Communication between hardware and software protocols Specs: network addresses, packet sizes Physical Underlying transmission media and hardware Examples: Wiring, radio, satellite

Only as strong as the weakest link… APPLICATION TRANSPORT Without strong security at each TCP/IP layer, the entire system is vulnerable INTERNET NETWORK INTERFACE Understanding each step of data communications is crucial for networking security PHYSICAL

What’s the worst that could happen? What was breached? Sensitive personal information for 145 million Americans What caused it? Web application vulnerability (which they knew about two months before the breach) What was breached? Account details for more than 3 billion users What caused it? Phishing link clicked resulting in installation of database backdoor What was breached? Travel and other details for 500 million customers What caused it? Still unknown – though it has been uncovered hackers had long-term access https://www.wired.com/story/equifax-breach-no-excuse/ https://arstechnica.com/tech-policy/2019/04/yahoo-tries-to-settle-3-billion-account-data-breach-with-118-million-payout/ https://techcrunch.com/2019/01/04/marriott-five-million-passport-numbers-stolen-starwood/

How a pair of applications interact Application Layer APPLICATION TRANSPORT INTERNET How a pair of applications interact Common Security Issues Protocol configuration Security policies Firewall implementation NETWORK INTERFACE Examples HTTP FTP SMTP PHYSICAL Attack Prevention User education Policy enforcement

Communication between applications on separate computers Transport Layer APPLICATION TRANSPORT INTERNET Communication between applications on separate computers Common Security Issues Encryption methods Replay attacks NETWORK INTERFACE Examples TCP UDP SSL SSH PHYSICAL Attack Prevention Authentication Data integrity assurance SSL/TLS

Fundamental basis for the Internet – interconnected networks Internet Layer APPLICATION TRANSPORT INTERNET Fundamental basis for the Internet – interconnected networks Common Security Issues Router configuration IP spoofing NETWORK INTERFACE Examples Routers PHYSICAL Attack Prevention VPNs Secure passwords Firewalls

Understanding HTTP Packets Download the HTTP Packets Lab from https://soitsummer.com Follow the instructions, and complete the questions on the last page

Network Interface Layer APPLICATION TRANSPORT INTERNET Communication between hardware and software protocols Common Security Issues Wireless security protocol (e.g., WEP) NETWORK INTERFACE Examples Switches WPA2 PHYSICAL Attack Prevention VLANs

Underlying transmission media and hardware Physical Layer APPLICATION TRANSPORT INTERNET Underlying transmission media and hardware Common Security Issues Internal threats Eavesdropping NETWORK INTERFACE Examples Ethernet Fiber cabling PHYSICAL Attack Prevention Physical access control

Know Your Attack Take an Attack Card from the whiteboard in the back of the room. Research and prepare brief answers to the following questions. Describe how this attack occurs from a technology perspective. Identify the layer(s) of the TCP/IP stack affected. What security flaws enable this attack to happen? What should people know to protect themselves from this attack? Man In The Middle

Questions?