Firewalls Fighting Spyware, Viruses, and Malware Ch 5.

Slides:



Advertisements
Similar presentations
Internet and WWW CS216. Open System Interconnection (OSI)
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Internet…issues Managing the Internet
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
TCP/IP Web Design & Layout January 23, TCP/IP For Dummies  The guts and the rules of the Internet and World Wide Web. A set of protocols, services,
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Pindaro Demertzoglou Lally School of M&T Internet-Intranets-Extranets.
4-Oct-15 Basic Protocols. 2 Sockets Sockets, or ports, are a very low level software construct that allows computers to talk to one another When you send.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Day16 Protocols. TCP “Transmission Control Protocol” –Connection oriented Very like a phone call, an actual connection is made between the 2 parties.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
The Intranet.
Introduction to Internet. Chapter 1 Objectives Origins of the Internet Packets and Routers TCP/IP DNS HTTP URL Client-Server.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
NetTech Solutions Protecting the Computer Lesson 10.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
How Web Servers and The Internet Work The Basic Process.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
3.1 Types of Servers.
Application layer tcp/ip
The Intranet.
3.1 Types of Servers.
Some bits on how it works
Networking for Home and Small Businesses – Chapter 6
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networking for Home and Small Businesses – Chapter 6
Topic 5: Communication and the Internet
I. Basic Network Concepts
Starting TCP Connection – A High Level View
Hyperlinks and Protocols
Protocols 2 Key Revision Points.
How Our Customers Communicate With Us
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Computer Networks Protocols
Presentation transcript:

Firewalls Fighting Spyware, Viruses, and Malware Ch 5

Phone Numbers You can’t just buy a phone and make phone calls –You also have to pay money to a phone company, and they give you a phone number –Without that number you cannot send or receive phone calls

IP Addresses You can’t just connect a computer to the Internet –You need to pay money to an Internet Service Provider, and they give you an IP Address –Without an IP Address, you cannot send or receive data to the Internet Even if you go to a place with “Free Internet Access,” someone paid for the Internet service

IPv4 Internet Protocol Version 4 –Currently used on the Internet –Each IP address has four numbers in the range separated by periods Ex: Some day we will all switch to IPv6, which has much longer addresses like this: –2001:0db8:85a3:08d3:1319:8a2e:0370:7334 See link Ch 5d

Phone Extensions Sometimes a company has one phone number shared by many people –So a Phone extension is added to the phone number, like 111, 112, 113, etc.

Port Numbers Computers send more than one kind of data to the Internet – , Web pages, music, chat, instant messages, etc. –The traffic is distinguished by Port Numbers that are added to the IP Address

Common TCP Ports See links CNIT 30 Ch 5e & 5f FTP21 Telnet23 SMTP ( ) 25 HTTP (Web) 80 POP3 ( ) 110 HTTPS (Secure Web) 443 IRC194

Professor Packetslinger of the School of Loose Screws –See link Ch 5g isc.sans.org/diary.php?storyid=1155 This guy got in a world of trouble by assigning an illegal Port Scan

Port Scanning If you want to see a Web page, your browser sends a request to Port 80 If you want to send , you send packets to port 25 on a server –But if you want to find out what a server can do, you could just send a lot of packets of all different types

Why do Port Scans? To test your security settings, primarily the firewall To find vulnerabilities, because you are a criminal trying to hack into a system illegally –Therefore, port scans of real network servers can be flagged by intrusion detection systems, and get people all upset

Project 4x: Port Scanning In Project 4x, you download a port scanner called NMAP Use it to scan a computer in S214 to see what the firewall does DO NOT use it to scan other people’s servers without permission –You will get in trouble if you do –You have been warned!