© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Computer Viruses.
Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.
Threats To A Computer Network
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1 Guide to Network Defense and Countermeasures Chapter 2.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
IT security By Tilly Gerlack.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Protecting Students on the School Computer Network Enfield High School.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Malicious Software.
 Malicious Code  Hacking  Natural Disaster  Theft.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network System Security - Task 2. Russell Johnston.
IT Security  .
Instructor Materials Chapter 7 Network Security
CHAPTER 6 – BASIC SECURITY
Protect Your Computer Against Harmful Attacks!
Forensics Week 12.
Computer Security.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8

ITE PC v4.0 Chapter 1 2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats  Information Theft – Obtain confidential information – Gather valuable research data  Data Loss/Manipulation – Destroying or altering data records

ITE PC v4.0 Chapter 1 3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats  Identity Theft – Personal information stolen  Disruption of Service – prevents legitimate users from accessing services

ITE PC v4.0 Chapter 1 4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Networking Threats  External Threats – done by individuals outside of the organization – do no have authorized access  Internal Threats – hacker may have access to equipment – knows what information is valuable or vulnerable – 70% of security breaches are internal

ITE PC v4.0 Chapter 1 5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Social Engineering  The ability of someone or something to influence behavior of a group of people  Used to deceive internal users to get confidential information  Hacker takes advantage of legitimate users

ITE PC v4.0 Chapter 1 6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Forms of Social Engineering  Pretexting – typically accomplished over the phone – scenario used on the victim to get them to release confidential information – gaining access to your social security number  Phishing – typically contacted via – attacker pretends to represent legitimate organization  Vishing/Phone Phising – user sends a voice mail instructing them to call a number which appears to be legitimate – call intercepted by thief

ITE PC v4.0 Chapter 1 7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Methods of Attack  Virus – runs or spreads by modifying other programs or files – needs to be activitated – cannot start by itself  Worms – similar to virus – does not attach itself to an existing program – no human activation needed  Trojan Horse – appears harmless – deceives the victim into initiating the program

ITE PC v4.0 Chapter 1 8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public DoS (Denial of Service) Attacks  Intended to deny services to users – floods network with traffic – disrupts connections between client and server  Types of DoS Attacks – SYN (synchronous) Flooding packets sent with invalid IP addresses server tries to respond – Ping of Death larger packet size sent than allowed leads to system crashing

ITE PC v4.0 Chapter 1 9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public More Attacks  DDoS (Distributed Denial of Service) Attack – more sophisticated than DoS – overwhelms networks with useless data simultaneously  Brute Force – fast PC used to try and guess passwords or decipher data – attacker tries a large number of possibilities rapidly

ITE PC v4.0 Chapter 1 10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Spyware  Program that gathers personal information from your PC without permission  Information sent to advertisers  Usually installed unknowingly when downloading a file  Can slow down performance of the PC

ITE PC v4.0 Chapter 1 11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Cookies, Etc.  Not always bad..  Used to record information about the user when visiting web sites.  Adware – collects information based on sites visited – useful for target advertising  Pop- Ups – additional ads displayed when visiting a site – pop-ups – open in front of browser – pop-under – open behind browser

ITE PC v4.0 Chapter 1 12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Spam  Unwanted bulk  Information sent to as many end users as possible  Can overload servers, ISPs, etc.  Estimated every Internet user receives over per year

ITE PC v4.0 Chapter 1 13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Policy  Statement of rules users must follow when using technology  Identification and Authentication Policies – only authorized persons should have access to network and its resources (including access to physical devices)  Password Policies – must meet minimum requirements – change passwords regularly  Acceptable Use Policies – determine which applications are acceptable

ITE PC v4.0 Chapter 1 14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Security Policy  Remote Access Policies – explanation of how remote users can access the network  Network Maintenance Procedures – explanation of update procedures  Incident Handling Procedures – how incidents involving security will be handled

ITE PC v4.0 Chapter 1 15 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Updates & Patches  Use of updates and patches makes it harder for the hacker to gain access.  Updates – includes additional functionality  Patches – small piece of “code” used to fix the problem

ITE PC v4.0 Chapter 1 16 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Anti-Virus Software  Any device connected to a network is susceptible to viruses  Warning signs of a virus: – computer acts abnormal – sends out large quantities of – high CPU usage  Some Anti-virus programs – checking – Dynamic scanning checks files when accessed – Scheduled scans – Automatic updates

ITE PC v4.0 Chapter 1 17 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public SPAM Prevention  Spam is an annoying problem, can... – overload servers – carry potential viruses  Anti-spam software – identifies the spam and performs an action deletes the file places it into the “junk mail” folder  Common spam occurrence – warning of virus from another user – not always true

ITE PC v4.0 Chapter 1 18 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall  Used to control traffic between networks  Methods of a Firewall – Packet filtering based on IP or MAC address – Application/Web site filtering based on the application or website being used – SPIC (Stateful Packet Inspection) incoming packets must be legitimate responses to requests from hosts

ITE PC v4.0 Chapter 1 19 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Types  Appliance-based firewall – built into the hardware – no peripherals needed  Server-based firewall – firewall run on a NOS (Network Operating System)  Integrated firewall – adds firewall functionality to an existing device  Personal firewall – resides on a host PC

ITE PC v4.0 Chapter 1 20 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack  Use of a DMZ (Demilitarized Zone)  Area of the network which is accessible to both internal and external users  Web servers for public access typically located here

ITE PC v4.0 Chapter 1 21 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Single or Dual Firewalls??  Single Firewall – appropriate for smaller networks – all external traffic sent to firewall  Dual Firewall – appropriate for larger businesses – internal and external firewall

ITE PC v4.0 Chapter 1 22 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Firewall Features and How to Use them to Protect Against an Attack  Vulnerability Analysis – determine what part(s) of your network may be vulnerable to attacks  Security Scanners – helps identify where attack can occur – may help identify missing updates

ITE PC v4.0 Chapter 1 23 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Summary  Networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.  Effective network security is based on a variety of products and services, combined with a thorough security policy.  A firewall controls traffic between networks and helps prevent unauthorized access.

ITE PC v4.0 Chapter 1 24 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public