Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security+ Guide to Network Security Fundamentals
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Nasca Internet Networking and Security viruses.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
 a crime committed on a computer network, esp. the Internet.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Module 7: Implementing Security Using Group Policy.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Unit 2 Personal Cyber Security and Social Engineering Part 2.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
Chapter 40 Internet Security.
Network Security Basics: Malware and Attacks
Instructor Materials Chapter 7 Network Security
Firewalls.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security in Networking
Unit 27: Network Operating Systems
Firewalls Purpose of a Firewall Characteristic of a firewall
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
AbbottLink™ - IP Address Overview
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Lesson 10 – SECURING YOUR NETWORK

Security devices Internal security External security Viruses and other malicious software OVERVIEW

Firewall: System enforcing security policy between two Networks. SECURITY DEVICES

Proxy Server: Server acting as a proxy (an anonymous intermediary) for Network users. Security devices

Packet filter: Enables users to set criteria for allowed and disallowed packets. Security devices

Securing Network from internal threats like: Accessing information inappropriately. Accessing other users’ files. Impersonating other users. Performing criminal activities on systems. Packet “sniffing” on the Network. INTERNAL SECURITY

Account security File and directory permissions Practices and user education Internal security

Process of managing the user accounts enabled on the Network. Account security

To manage security: Remove the guest account. Rename the default name for the administrative account. Remove access to Network resources. Work closely with HR/legal departments. Review newly assigned permissions. Account security

To maintain password security: Get users to change their Network password regularly. Set the reuse policy. Have passwords that are at least eight characters long. Establish thresholds. Account security

Control access to files and directories by using built-in permissions. File and directory permissions

Generic directory roles: Create only Read only Change Full control File and directory permissions

Inform users what is expected of them in terms of security. Discuss security issues with new employees. Have users acknowledge their understanding. Periodically audit users’ security actions. Review the NOS’ security logs. Practice and user education

Process of securing the Network from external threats. EXTERNAL SECURITY

Types of threats: Front-door threats Back-door threats Denial of service External security

Arise when a user from outside the company finds a user password and logs on to the Network. Front-door threats

Solutions: Separate Network resources accessed from and outside the LAN. Control users accessing LAN from outside the LAN. Set up a separate remote access account for remote users. Set up user accounts to use dial-back. Change password when employee with broad access resigns. Front-door threats

Software or hardware bugs in the Network’s OS enabling an outsider to crack the Network’s security. Back-door threats

Solutions: Host the company’s web site on an external server. Implement a firewall router. Review security settings for the web server. Place web server for non-employees outside the firewall.

Attacks that deny service to the Network. Denial of service

Solutions: Keep various Network software “current”. Disallow Internet Control Message Protocol (ICMP) traffic service.

Denial of service Demilitarized Zone (DMZ): The area between computers placed between the firewall an connection to an external Network.

VIRUSES AND OTHER MALICIOUS SOFTWARE

Program that spreads by infecting other files with a copy of itself. Files infected by viruses include program files (.COM,.EXE, and.DLL). Virus

Program that propagates by sending copies of itself to other computers. Spreads by attaching to s along with a message. Worm

Program that claims to do something interesting and performs malicious actions in the background. Trojan horse

Malicious piece of programming code inserted into a normal program. Can be timed to erase key files. Logic bomb

Internal security: Account security Account password security File and directory permissions SUMMARY

External security: Front-door threats Back-door threats Denial of service Summary

Viruses and other malicious software: Viruses Worms Trojan horses Logic bombs Summary