Download presentation
Presentation is loading. Please wait.
Published byBrendan Evans Modified over 8 years ago
1
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks
2
2 Network Security Threats Viruses Vandalism Industrial espionage Theft Natural disasters
3
3 Protecting the Workstation Implement power-on password protection Use screen savers with passwords Turn-off local caching of passwords Educate users to proper password procedures and practices
4
4 Consider using an Operating System that supports the NTFS file system. Windows NT Workstation Windows 2000 Professional Windows XP Professional
5
5 Peer-to-peer Security Share-level Security – Shares on the network are protected with individually assigned passwords. Individual User-level Security – The Operating System on each individual workstation can be set up to authenticate the user name and password.
6
6 Peer-to-peer Security Assign passwords and permissions to individual shares. Individually configure each workstation with multiple User Names and Passwords.
7
7 Peer-to-peer Security Assign passwords and permissions to individual shares. Individually configure each workstation with multiple User Names and Passwords.
8
8 User-level Security Used in Client/Server networks. A prime advantage of Client/Server network over peer-to-peer. The server
9
9 Protecting the Network from Viruses Educate users on common-sense rules for avoiding viruses. Install virus protection software on every server and client workstation. Update virus signatures at least monthly.
10
10 Virus A program designed to spread itself secretly from one file, computer, or network to another for the purpose of eventually performing some annoying or destructive act.
11
11 Viruses are contracted from: Disks of unknown origin. Downloads from unknown sources. Attachments to unsolicited e-mail messages.
12
12 Common-sense rules for avoiding viruses. Don’t use disks of unknown origin. Don’t download files from unknown sources. Don’t open attachments to unsolicited e- mail messages. Educate everyone in your organization to follow these common sense rules for avoiding viruses.
13
13 Use Anti-Virus Software Install anti-virus software on every client workstation and server in the network. Update virus signatures regularly.
14
14 Protecting the Network from Theft and Natural Disasters Place key equipment in a secure location. Backup data regularly. Keep backup media in a separate location.
15
15 Protecting the Network from the Internet Enforce Password Policy Use a firewall between the Internet and the local network. Use data encryption when sending sensitive data over the Internet or over phone lines.
16
16 Password Policy Set the minimum password length to seven characters. Require passwords to use numbers and special characters as well as letters. Do not use passwords that can be found in a dictionary. Insist that user name and password must be different. Change passwords on a regular basis.
17
17 Internet Firewall
18
18 Authentication The process of verifying identity. A way to prove to one entity that another entity is who it claims to be. Usually done with User Name and Password.
19
19 Kerberos Authentication Protocol An industry standard authentication protocol designed by MIT and Cornell University. The default Authentication Protocol used in the Windows 2000 and XP environment. A high-security method of encrypting and authenticating passwords.
20
20 Now, it’s your turn.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.