AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.

Slides:



Advertisements
Similar presentations
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 19: Configuring Windows Firewall
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Windows 7 Firewall.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Lesson 11: Configuring and Maintaining Network Security
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
A Network Security -Firewall Bruce Turin.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Top 5 Open Source Firewall Software for Linux User
CONNECTING TO THE INTERNET
Instructor Materials Chapter 7 Network Security
Systems Security Keywords Protecting Systems
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewalls.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Network Security: IP Spoofing and Firewall
Malware, Phishing and Network Policies
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
Networking for Home and Small Businesses – Chapter 8
Securing Windows 7 Lesson 10.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

AQA A2 COMP 3: Internet Security

Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques to minimise them. Describe different security issues and recommend tools/techniques to minimise them. Explain the role of a firewall in the context of security. Explain the role of a firewall in the context of security. Use simple encryption techniques. Use simple encryption techniques.

Starter: (8) Find a news article published in the last 5 years about malware security. Find a news article published in the last 5 years about malware security. Identify the type of malware that was involved in the attack. Identify the type of malware that was involved in the attack. Identify the method that was used to access data or cause damage to. Identify the method that was used to access data or cause damage to. Find out what could have been done to prevent it. Find out what could have been done to prevent it.

Types of security issues (15) Virus, Trojan, Worm, Spyware, SPAM, Phishing, Pharming. Virus, Trojan, Worm, Spyware, SPAM, Phishing, Pharming. 1. Pick a security issue from the list. 1. Create a short user guide that will inform the reader about that particular security issue as well as what they can do to prevent it. 2. Note: recommend some software as well.

Firewall Hardware or software Hardware or software Controls traffic between different networks (Internet and private network) Controls traffic between different networks (Internet and private network) Uses rules to control inbound and outbound connections Uses rules to control inbound and outbound connections Traffic is blocked using IP address, domain, port or applications Traffic is blocked using IP address, domain, port or applications Firewalls can also search data packets for exact keywords: where do you think this is used? Firewalls can also search data packets for exact keywords: where do you think this is used?

Outbound connections. Inbound connections. Application process.

Packet filtering TBzAr2Tu0o TBzAr2Tu0o TBzAr2Tu0o TBzAr2Tu0o We set rules. Rules define whether packets are allowed or denied. We set rules. Rules define whether packets are allowed or denied. Proxy server: intermediary device. (middle man). Proxy server: intermediary device. (middle man).

Activity(10) Compare the firewall that comes pre- installed with Windows and the firewall that can be downloaded (third party). Compare the firewall that comes pre- installed with Windows and the firewall that can be downloaded (third party). Which one is better? What features do they offer? Which one is better? What features do they offer? Which one would you use and why? Which one would you use and why?

Encryption Old technique. Old technique. Used on the Internet due to the nature of sensitive data. Used on the Internet due to the nature of sensitive data. encryption: securely transferring data by making the plain text scrambled. encryption: securely transferring data by making the plain text scrambled. Encryption uses algorithm and relies on a key to encrypt and decrypt Encryption uses algorithm and relies on a key to encrypt and decrypt Just like a key for a lock. Just like a key for a lock. (54) (54)

Activity (12)

Recap By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques to minimise them. Describe different security issues and recommend tools/techniques to minimise them. Explain the role of a firewall in the context of security. Explain the role of a firewall in the context of security. Use simple encryption techniques. Use simple encryption techniques.

Starter for next lesson Public and private key encryption Public and private key encryption

Interacting with OS Malware software