T HE I NTERNET AND S ECURITY Chapter 4. 2 SIX MAJOR ROLES AND GOALS OF IT 1.Increase employee productivity by reducing time, errors and costs using 2.Enhance.

Slides:



Advertisements
Similar presentations
Intermediate 2 Computing
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
TECHNOLOGY GUIDE 5 Basics of the Internet and the World Wide Web.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
T HE I NTERNET AND S ECURITY Chapter 4. 2 SIX MAJOR ROLES AND GOALS OF IT 1.Increase employee productivity by reducing time, errors and costs using 2.Enhance.
IS Network and Telecommunications Risks
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Internet & Security Information Systems Today Jessup & Valacich, Chapter.6.
4-1 Chapter 4 The Internet And Security
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 19 Internet Basics.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Lecture 5 Title: Networks and Businesses
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Internet Services -World Wide Web - -Conferencing and Newsgroups -File Transfer & Updating -Chat/Instant Messaging.
Temburong School Proposal. The hardware and software that the school will need to set up the internet  Routers; to form intranet. intranet  Form of.
Chapter 3 The Basics of Networking
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
BUSINESS B1 Information Security.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Networks QUME 185 Introduction to Computer Applications.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey Networks.
Introduction To Internet
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Communication, Networks, The internet and the Worldwide Web.
Information Systems Security
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
The Intranet.
Internet Architecture and Governance
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Security & Accounting
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
1 Lecture 9: The Internet And Security J. S. Chou, P.E., Ph.D.
Internet Technologies Mr. Grimming. Internet Applications File Transfer World Wide Web E-commerce Searches Voice over Internet Protocol Video over.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Wednesday, September 19, 2018 What Is the Internet?
CS222 Web Programming Course Outline
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Lesson 3: Introduction to Internet Technology
Presentation transcript:

T HE I NTERNET AND S ECURITY Chapter 4

2 SIX MAJOR ROLES AND GOALS OF IT 1.Increase employee productivity by reducing time, errors and costs using 2.Enhance decision making 3.Improve team collaboration 4.Create business partnerships and alliances 5.Enable global reach all over the world taking into consideration the culture of each nation or society. 6.Facilitate organizational transformation as the organization evolves and responds to the ever-changing marketplace.

4-3 K EY T ERMS ______________________ Transmission of all forms of communication including digital data, voice, fax, sound, and video from one location to another over some type of network ______________________ Transmission of all forms of communication including digital data, voice, fax, sound, and video from one location to another over some type of network ______________________ A group of computers and peripheral devices connected by a communication channel capable of sharing information and other resources among users ______________________ A group of computers and peripheral devices connected by a communication channel capable of sharing information and other resources among users ______________________ Is the carrying capacity of a telecommunications network. (i.e. the size of the telecommunications channel or pipeline) ______________________ Is the carrying capacity of a telecommunications network. (i.e. the size of the telecommunications channel or pipeline)

4-4 S AMPLE OF I NTERPERSONAL U SE OF T ELECOMMUNICATIONS with teeth

4-5 S AMPLE OF I NTERPERSONAL U SE OF T ELECOMMUNICATIONS

4-6 S AMPLE OF B USINESS U SE OF T ELECOMMUNICATIONS

4-7 S AMPLE OF B USINESS U SE OF T ELECOMMUNICATIONS

4-8 H ISTORY OF THE I NTERNET ARPANET 1960 (Advanced Research Project Agency Network) NSFNET 1986(National Science Foundation Network) Connected to ARPANET and many others (BITNET, CSNET, etc) to become a major component of the Internet Internet Support Ongoing support comes from many universities, federal and state governments, and national international research institutions and industry

4-9 H OW THE I NTERNET W ORKS – P ACKET S WITCHING Packet Switching Allows millions of users to send large and small chucks of data across the Internet concurrently Based on the concept of turn taking, packets from each user are alternated in the shared network (below) Networks connected to the Internet use this concept Packet Switching Allows millions of users to send large and small chucks of data across the Internet concurrently Based on the concept of turn taking, packets from each user are alternated in the shared network (below) Networks connected to the Internet use this concept Warriors

4-10 H OW THE I NTERNET W ORKS – TCP/IP & R OUTERS TCP – Transmission Control Protocol IP – Internet Protocol Routers Connect one network to another Identify each device on a network as unique using IP protocol Serve as the “Traffic Cop” directing packets to their destination TCP/IP Approach

4-11 H OW THE I NTERNET W ORKS – C ONNECTING N ETWORKS (Computer A) TCP - Breaks message into data packets IP - Adds address of destination Computer D Example: Sending a message from Computer A to D (Computer D) TCP - Checks for missing packets, reassembles message, discards duplicate packets (Router) Reads IP Address of packet, routes message to Network 2 and Computer D 1 3 2

4-12 H OW THE I NTERNET W ORKS – W EB A DDRESSES & D OMAINS Domain Identifies the Website (host) Comes in many suffixes such as:.edu(educational institutions).org (organizations; non-profit).mil (military).net (network organizations) Example: microsoft.com (URL) Uniform Resource Locator Identifies particular Web pages within a domain Example: IP Address Each domain is associated with one or more IP addresses Format: a 32-bit address written as 4 numbers (from ) separated by periods Example:

4-13 H OW THE I NTERNET W ORKS – M ANAGING THE I NTERNET Internet Registry Central repository of all Internet-related information Provides central allocation of all network system identifiers Managed by Internet Assigned Numbers Authority (IANA) Domain Name System (DNS) Maintained by the Internet Registry Used to associates hosts or domains with IP addresses Root DNS database is replicated across the Internet InterNic Registration Service Assigns Internet Domains and IP addresses Internet Corp. for Assigned Names and Number (ICANN) has responsibility for managing IP addresses, domain names, and root server system management

4-14 H OW THE I NTERNET W ORKS – C ONNECTING TO THE I NTERNET Modem (stands for Modulate/Demodulate) Internet Service Provider (ISP) Network Access Points (NAPs) Internet Backbone

4-15 N ETWORK C ONNECTION T YPES DSL (Digital Subscriber Line) POTS (Plain Old Telephone Service) ISDN (Integrated Services Digital Network) Wireless Fixed wireless Mobile wireless Cable Modem IoS (Internet over Satellite)

4-16 N ETWORK C ONNECTION T YPES SONET (Synchronous Optical Network) T1/T3 (Trunk Level 1 or 3) ATM (Asynchronous Transfer Mode)

4-17 C URRENT S TATE OF THE I NTERNET

4-18 W ORLD W IDE W EB HTTP (Hypertext Transfer Protocol) A _____________ used to process user requests for displaying Web pages from a Web server Web Servers A special computer that is specifically designed to store and “_____________” Web pages This machine contains special _____________ and _____________ to perform its many specialized functions

4-19 I NFORMATION S YSTEM S ECURITY _____________ Precautions taken to keep all aspects of information systems safe from unauthorized access _____________ Precautions taken to keep all aspects of information systems safe from unauthorized access Managerial Methods Several techniques are commonly used to manage information systems security: _____________ Assessment Controlling _____________ Organizational Policies and Procedures Backups and _____________ Managerial Methods Several techniques are commonly used to manage information systems security: _____________ Assessment Controlling _____________ Organizational Policies and Procedures Backups and _____________

4-20 I NFORMATION S YSTEM S ECURITY – M ANAGERIAL T ECHNIQUES Assessing Risk Security Audit Risk Analysis Alternatives based on Risk Analysis: Risk Reduction Risk _____________ Risk Transference – Controlling Access Keeping information safe by only allowing access to those that require it to do their jobs _____________ – Access Control –

4-21 I NFORMATION S YSTEM S ECURITY – M ANAGERIAL T ECHNIQUES _____________ Policies and Procedures Acceptable Use Policies – formally document how systems should be used, for what, and penalties for non-compliance _____________ and _____________ Recovery Backups – taking periodic snapshots of critical systems data and storing in a safe place or system (e.g. backup tape) Disaster Recovery Plans – spell out detailed procedures to be used by the organization to restore access to critical business systems (e.g. viruses or fire) Disaster Recovery – executing Disaster Recovery procedures using backups to restore the system to the last backup if it was totally lost

4-22 S TATE OF IS S ECURITY - S ECURITY T HREATS & T ECHNOLOGIES Security Technologies Companies and research organizations continue to develop and refine technologies to prevent security breaches. Some Include: _____________ _____________ and Encryption Security Threats _____________ Theft – _____________ _____________– Others: Spyware, Spam, Wireless Access, Viruses Identity theft

4-23 IS S ECURITY : T ECHNOLOGY Firewall Techniques Packet Filter – examine each packet entering and leaving network and accept/reject based on rules Application Level Control – Performs certain security measures based on a specific application (e.g. file transfer) Circuit Level Control – detects certain types of connections or circuits on either side of the firewall Proxy Server – acts as, or appears as, an alternative server that hides the true network addresses _____________ A system of software, hardware or both designed to detect intrusion and prevent unauthorized access to or from a private network

24 F IREWALL C APABILITY Firewall can Focus for security _____________ Enforce security _____________ Log internet _____________ Limit _____________ keeps one section of intranet separate from another Firewall can not Protect against malicious _____________ Protect against connections that do not go through it Protect against new _____________ Protect against _____________

4-25 S ECURITY T HREAT : S PYWARE, S PAM, AND C OOKIES _____________ A message passed to a browser from a Web server. Used by legitimate programs to store state and user information _____________ Any software that covertly gathers information about a user through an Internet connection without the user’s knowledge _____________ Electronic junk mail or junk newsgroup postings usually for purpose of advertising some product and/or service

4-26 S ECURITY T ECHNOLOGY : _____________ _____________ A sophisticated authentication technique used to restrict access to systems, data and/or facilities Uses biological characteristics to identify individuals such as fingerprints, retinal patterns in the eye, etc. that are not easily counterfeited Biometrics

4-27 S ECURITY T HREAT : A CCESS TO W IRELESS Unauthorized Access to Wireless Networks With the prevalence in use of wireless networks this threat is increasing Problems - _____________ _____________ - an attacker accesses the network, intercepts data from it, and can use network services and/or send attack instructions without entering the building Prevention - _____________ between network and user devices

28 On 8 February, 1587 Elizabeth I of England

4-29 S ECURITY T ECHNOLOGY : VPN AND _____________ _____________ The process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end _____________ - known and used to scramble messages (SSL) _____________ - not known and used by receiver to descramble _____________– a third party that issues keys

4-30 H OW E NCRYPTION W ORKS

31 V IRTUAL PRIVATE NETWORK Virtual private network (VPN): a secure _____________ between two points across the Internet _____________ : the process by which VPNs transfer information by encapsulating traffic in IP packets over the Internet

4-32 S ECURITY T HREAT : V IRUSES Viruses Programs that can attack a computer and/or a network and delete information, disable software, use up system resources, etc. Prevention Steps: AntiVirus software: No Disk Sharing – Delete Suspicious Messages – Report Viruses –