Networking Network Classification, by there: 3 Security And Communications software.

Slides:



Advertisements
Similar presentations
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Advertisements

1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Wi-Fi Structures.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
DVG-N5402SP.
Internet Architecture Two computers, anywhere in the world, following certain hardware, software, protocol specifications, can communicate, reliably even.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Hardware & Software Needed For LAN and WAN
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Securing a Wireless Network
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Chapter 31 File Transfer & Remote File Access (NFS)
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 10: Authentication Guide to Computer Network Security.
Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
© 2009 Prentice-Hall, Inc.1. 2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Network Security & Accounting
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Physical security By Ola Abd el-latif Abbass Hassan.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
An Introduction to Biometrics
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
FTP - File Transfer Protocol
Firewalls Routers, Switches, Hubs VPNs
Operating Systems Security
Biometric technology.
Web Servers / Deployment
Module 2 OBJECTIVE 14: Compare various security mechanisms.
G061 - Network Security.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Networking Network Classification, by there: 3 Security And Communications software

Network Security 1Usernames & passwords Characteristics of good usernames & passwords At least 8 characters and mixed case with combination of letters, digits, words Don’t share passwords Don’t write passwords down & change frequently

Network Security, Firewalls Firewall, hardware and/or software restricting access to data and information on a network Because internet is a public network anyone with connection can access internet Firewall separates the internet & other external networks from internal LAN To implement a firewall, a proxy server is used to control which communication passes into the company’s network. A server can use one of 1024 ports available

Network Security, Biometrics Biometric device: Authenticates a person’s identity by verifying personal characteristics Eg. fingerprints, hand geometry, facial features, voice and retinal or iris patterns Advantages: People are unique and therefore high level of security Depending on type of device can be costly

Network Security, Wireless Wireless networks provide additional risk allowing free internet access or to steal data War driving, technique to locate vulnerable Wi-Fi networks Strategies Wi-Fi network should include a firewall and use wireless security standards WAP configured so it does not broadcast network name & only allow access to specified devices Use WEP, (Wireless Equivalent Privacy)

Communications Software Software to support file transfer, File Transfer Protocol, (FTP); allows uploading and downloading of files to and from webserver