Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Students: Jacek Czeszewski and Marcos Verdini Rosa Professor: José Manuel Magalhães Cruz.
Trojan Horse Program Presented by : Lori Agrawal.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
Securing a Wireless Network
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How to maintain your computer
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Honeypot and Intrusion Detection System
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Operating system Security By Murtaza K. Madraswala.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Trojan Horses What you need to know about one of the world’s most dangerous forms of malicious code.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Rootkits What are they? What do they do? Where do they come from?
Small Business Security Keith Slagle April 24, 2007.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Building a security strategy By Raef Mchaymech. Our Case of study This is the company that we need to secure its information system.
Port Knocking Benjamin DiYanni.
Instructor Materials Chapter 7 Network Security
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Security By: Muhammed Anwar.
Presentation transcript:

Network Security Peter Behrens Seth Elschlager

Computer Security Preventing unauthorized use of your network and information within that network. Preventing unauthorized use of your network and information within that network. Helps ensure your privacy Helps ensure your privacy Detection of unauthorized access to your network Detection of unauthorized access to your network Trace what they did while on the network Trace what they did while on the network

Security Code Writers Try to improve security all the time. Code Writers Try to improve security all the time. There is no completely secure system. There is no completely secure system. Since programming is math based, if you have the key, you have access to the system. Since programming is math based, if you have the key, you have access to the system.

Reasons They Want Access Hide Their Location Hide Their Location Gain access to your information Gain access to your information Fun Fun Challenge Challenge To Modify, or Destroy your Software To Modify, or Destroy your Software

What is at risk? Confidentiality- Confidentiality- Information should be available only to those who rightfully have access to it. Information should be available only to those who rightfully have access to it. Examples: Examples: Credit Card Numbers Credit Card Numbers Bank Account Information Bank Account Information Passwords Passwords

What is at risk? Integrity- Integrity- The information should be modified only by those who are authorized to do so. The information should be modified only by those who are authorized to do so. Examples: Examples: Database Administrators should be the only ones modifying the database. Database Administrators should be the only ones modifying the database.

What is at risk? Availability- Availability- Information should be accessible to those who need it when they need it. Information should be accessible to those who need it when they need it. Examples Examples Facts Facts Reports Reports Company Data Company Data Personal Data Personal Data

Who do these apply to? These apply to home users as well as professional users… These apply to home users as well as professional users… You don’t let a stranger ruffle through your bank statements. You don’t let a stranger ruffle through your bank statements.

Risk Management Probably can’t plan for every threat Probably can’t plan for every threat Threats may be accidental or intentional Threats may be accidental or intentional

Unfortunately, limited resources can cripple a fully functional system. Unfortunately, limited resources can cripple a fully functional system. Core processes Core processes OS failures OS failures Viruses Viruses By using malicious software, someone can flood your network resources and cripple your system. By using malicious software, someone can flood your network resources and cripple your system.

Denial Of Service Attack Most common attack Most common attack May be part bigger attack, or may stand alone. May be part bigger attack, or may stand alone. Prevents authorized users the use of network services by flooding the network with junk traffic. Prevents authorized users the use of network services by flooding the network with junk traffic.

Cont’d Once a “bad guy” has access to a system, he can then use echo functions and acknowledgement functions to send useless data back and forth across the network. This will use up network capacity and bandwidth, slowing the network to almost unusable. Once a “bad guy” has access to a system, he can then use echo functions and acknowledgement functions to send useless data back and forth across the network. This will use up network capacity and bandwidth, slowing the network to almost unusable.

Connectivity Attacks Some attacks are executed to prevent connections from establishing. Some attacks are executed to prevent connections from establishing. Kernels establish one connection at a time. If a connection is not completed, a new connection will not be created/enabled. Kernels establish one connection at a time. If a connection is not completed, a new connection will not be created/enabled. Example Example SYN Flood Attack SYN Flood Attack

SYN Flood Attack The attacker gains a connection to the victim’s machine. The connection is only half completed, and the kernel is left waiting for a finished connection. The attacker gains a connection to the victim’s machine. The connection is only half completed, and the kernel is left waiting for a finished connection. The user is then prohibited from making a legitimate connection until the “dummy” connection is completed. The user is then prohibited from making a legitimate connection until the “dummy” connection is completed.

Ways to Protect Yourself Antivirus Software Antivirus Software Norton Norton McAfee McAfee Anti-Spyware Software Anti-Spyware Software Crap-Cleaner Crap-Cleaner Ad-Aware Ad-Aware SpyBot SpyBot

Firewalls Firewalls Some software firewalls may be enabled on your machine already. Some software firewalls may be enabled on your machine already. Windows XP uses one for example. Windows XP uses one for example. Routers Routers Better than the Windows firewall Better than the Windows firewall Does not interfere as much with useful programs Does not interfere as much with useful programs

Routers Cont’d Many routers have firewalls enabled on them. Many routers have firewalls enabled on them. Once you open a port for access to a program, you do not have to open it ever again, unlike Windows. Once you open a port for access to a program, you do not have to open it ever again, unlike Windows. Also function as small switches, which is beneficial to the home network. Also function as small switches, which is beneficial to the home network.

VPN’s Virtual Private Networks Virtual Private Networks Good for accessing a network remotely Good for accessing a network remotely Encrypts data so that unauthorized users can’t see the data being transferred. Encrypts data so that unauthorized users can’t see the data being transferred. Functions as a pipeline between your machine and the business network. Functions as a pipeline between your machine and the business network.

System Updates Updating your system and programs is critical. Updating your system and programs is critical. Security Fixes, Driver Updates, Etc… keep your system from being vulnerable after a vulnerability is discovered. Security Fixes, Driver Updates, Etc… keep your system from being vulnerable after a vulnerability is discovered. This is the end user’s responsibility. This is the end user’s responsibility.

Being Cautious is the best network defense. Being Cautious is the best network defense. Monitor your network usage, if you are an administrator. Monitor your network usage, if you are an administrator. Run antiviral and anti-spyware programs to keep your machines clean. Run antiviral and anti-spyware programs to keep your machines clean. If you don’t know what something does, don’t open it. If you don’t know what something does, don’t open it.