8: Basic Security Networking for Home & Small Business.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Spyware and Adware Rick Carback 9/18/2005
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Viruses.
Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Data Security.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
IT Security  .
Instructor Materials Chapter 7 Network Security
CHAPTER 6 – BASIC SECURITY
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

8: Basic Security Networking for Home & Small Business

Network Intrusion Attacks can be devastating –Cost money, time, theft of files, etc HACKERS –Intruders who gain access by modifying software or exploiting software vulnerabilities

4 Threats from the Hacker Stealing Confidential Info –Credit card #’s –Private Company info such as a project in development –Could be sold

4 Threats from the Hacker Destroy or Alter Records –Send a virus that reformats HD –Changing your grades –Change store prices

4 Threats from the Hacker Identity Theft –Stealing info to take on identity –Applying for credit cards & buying stuff –Obtain DL’s

4 Threats from the Hacker Disrupting Service –Preventing user from accessing services such as Internet

Activity

Where’d He Come From? External Threat –Outside attacker –Internet or Wireless

Where’d He Come From? Internal Threat –Has authorized access Knows people & network Knows what info is valuable –OR someone may have just picked up a virus According to the FBI, internal access and misuse of computers systems account for approximately 70% of reported incidents of security breaches.

Social Engineering Deceiving internal users into performing actions or revealing confidential info –Takes advantage of them –Usually don’t meet them face-to-face

Fight Intrusion

3 Types of Social Engineering Pretexting, Phishing, and Vishing

Phishing

Review

Let’s Try This… Cyber Security Awareness Quiz

Other Attacks Viruses, Worms and Trojan horses –Malicious software put on hosts –Damage system, destroy data, deny access –They can forward data to thieves –Can replicate to other hosts

3 Evil Things Viruses, Worms and Trojan horses –Go to

Simplified Virus Attaches to a program Can reproduceCauses havoc! Worm Self-replicatingSends copies of itself to other comp. w/ security holes Cause harm to network; ties up bandwidth Trojan Horse Computer program disguised Does damage when run Can’t replicate

Let’s See… GCIT Who wants to play… –ID Theft Faceoff?ID Theft –Invasion of the Wireless Hackers?Invasion of the Wireless Hackers –Phishing Scams?Phishing Scams Quiz Time for all! –

Activity Virus, Worm or Trojan Horse???

Just Being Evil! Sometimes the goal is to shut a network down & disrupt the organization –Can cost a business lots of money!!

Denial of Service (DoS) In general, DoS attacks seek to: –Flood a system or network with traffic to prevent legitimate network traffic from flowing –Disrupt connections between a client and server to prevent access to a service –Some are not used much anymore, but can be SYN flooding Ping of Death

DoS- SYN Flooding

DoS- Ping of Death! Sending SO MANY pings, the server can’t respond to anyone else!

DDoS –Attack by multiple systems infected with DDoS code –Sends useless data to server –Overwhelms system & it crashes

Brute Force Fast computer used to guess passwords or decipher encryption code Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts Try

Review Name 3 types of social engineering. –Pretexting, Phishing, Vishing How are you targeted in a pretexting attack? –Over the phone You click on a pop-up window to claim a “prize.” A program was installed w/out you knowing & now an attacker has access to your system. What is this called? –Trojan Horse

Review Which attack doesn’t need activation and copies itself across the network? –Worm A server is busy responding to a SYN with an invalid source IP address. What’s the attack? –SYN Flooding

Other Threats Not all threats do damage –Some collect info Spyware Tracking Cookies Adware Pop-ups

Spyware Program that gathers personal info w/out your permission –Info sent to advertisers Usually installed unknowingly –Downloaded, installing a program, click on pop-up Can slow computer down or make settings changes Can be difficult to remove

Tracking Cookies Form of spyware –Not always bad Records info about user when they visit web sites –Allows personalization –Many sites require them

Adware Form of spyware Records info about user when they visit web sites For advertising purposes –Pop-ups & pop-ups of ads

Pop-Ups (and Pop-Unders) Adware EXCEPT doesn’t collect any info Pop-ups –Open in front of the current browser window Pop-unders –Open behind the current browser window

What’s This?

Spam Unwanted bulk mail from advertisers Spammer sends –Often sent through unsecured servers –Can take control of computers –Then sent from that computer to others On average, how many spam s are sent to a person per year? –3000

Review You visit a web site and see this annoying advertising tactic that appears in a new window. What is it? –Pop-up This type of advertising is sent to many, many people. The advertiser uses no marketing scheme. –Spam This form of spyware is not always bad & can be used for personalization of a site. –Cookies

Security Measures You can’t eliminate security breaches –You can minimize the risks Policy Procedures Tools & Applications

Security Policy Formal statement of rules when using tech –Acceptable use policy –Detailed handbook What should be included?

Activity Let’s review some policies…

More Security Procedures The procedures help implement the policies Some of the security tools and applications used in securing a network include:

Rut Roh! Computer starts acting abnormally Program does not respond to mouse and keystrokes. Programs starting or shutting down on their own. program begins sending out large quantities of CPU usage is very high There are unidentifiable, or a large number of, processes running. Computer slows down significantly or crashes

Anti-Virus Software Preventive & Reactive tool Features – checker –Dynamic Scanning (checks files when accessed) –Scheduled scans –Auto update When a virus is known, they will update it

Anti-Spam Spam sends unwanted s –Code takes over PC to send more The software ID’s it & places it in junk folder or deletes it On PC or on server –ISP may have a spam filter

Other ways to prevent spam Keep anti-virus up to date Don’t forward suspect s Ignore the virus warning Report spam to admin to be blocked Don’t open attachment from people you don’t know

Anti-Spyware Spyware & Adware cause virus-like symptoms –Use computer resources This software can detect & delete them Pop-Up Blockers

Activity

What’s a firewall? Resides between two or more networks and controls the traffic between them as well as helps prevent unauthorized access Packet Filtering –Based on IP or MAC addresses Application / Web Site Filtering –Based on the application. –Websites can be blocked by URL or keywords Stateful Packet Inspection (SPI) –Must be responses from internal host –DoS saver

4 Types of Firewalls

Firewall Placement & DMZ

Firewall & DMZ at home/ Port Forwarding/ Wireless AP internal Let’s say you have a web server It needs to handle web request while you still protect you internal network Create a DMZ with the Linksys

Lab ?? Server CD

Is Your Network Vulnerable? Tools to help identify where attacks can occur –Number of hosts on a network –The services hosts are offering –The OS and update versions on hosts –Packet filters and firewalls in use Lab ? –Vulnerability Analysis

Lab ? Vulnerability Analysis

Review

8: Basic Security Networking for Home & Small Business