Download presentation
Presentation is loading. Please wait.
Published byMelvin Payne Modified over 8 years ago
1
By: Brett Belin
2
Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network Typically involves all activities that an organization, enterprise, or institutions undertake to protect their assets
3
Consists of two or more computers that are linked together in order to share certain resources They can be linked by cables, wires, waves, or satellites Two basic types of networks LAN WAN
4
Known as Local Area Network Typically confined to a small area Computers on this network are rarely over a mile a part in distance
5
WAN stands for Wide Area Networks They are used to connect a much bigger network Involves more extensive wiring since the network is a lot bigger than LAN
6
Designed to read and process requests sent from one machine to another machine Also known as the host that is deployed to execute one or more programs Usually have more processing power, memory, and hard disk space than clients
7
Prevent people from gaining access to your network that should not be viewing your files It can lead to Breaches in Confidentiality Data destruction can take place if someone gets into your system In addition, data manipulation can happen where they tamper with your numbers or important information
8
Technology Weakness Could be a protocol weakness Also a weakness within the operating system Configuration Weakness Wired unsecured Username and passwords are known to various amounts of people Policies Lack of written security policy Sometimes lacks continuity
9
Denial of Service (DoS) Unauthorized Access Spoofing Eavesdropping
10
Probably the nastiest and most difficult to address They are easy to launch and usually very difficult to track Basically what it does is sends more information than the machine can handle
11
Can be done in a variety of different attacks Usually just means that someone or something is trying to gain access or resources from your machine that should not be allowed to
12
Create a Network Diagram This consists of symbols or pictures that tells you where the computers and things are set up Could also include information such as what brand the products are or how they are connected Understand the Network Who uses the network? What type of hardware? What is the internet connection like? Can regular patrons log onto the system?
13
Log into the internet and type in the IP address of your router into the address bar Go to the wireless tab and enter the SSID this number should be located on the sticker of the router Next, go to the wireless tab/wireless security and choose enable
14
Choose either WEP or WEA encryption. WEA is a more secure choice Choose either 64 or 128 bit encryption, once again the 128 bit is the more secure. Next you want to generate a passphrase By doing this, you only people that have the passphrase are able to access the router and use your internet connection
15
Another great way to secure your network Requires each person who should have access to have a distinct name that he or she may log in with In addition, each name has a password or pin possibly that only they should know This will minimize the chance of an unauthorized user gaining access to your system and getting information
16
Another great way to protect your network against harmful attacks It is part of a computer system or network that is designed to block unauthorized access while permitting authorized users to communicate still Can be implemented in either hardware or software or even a combination of both
17
Application Gateways These were the first types of firewalls Sometimes known as proxy gateways Run special Software to act as a proxy server It is run on the Application layer of the ISO/OSI model which is where it gets the name Clients must know how to use the proxy in order to use the Internet services
18
Packet Filtering Routers by default will pass all traffic sent it, and do so with out and restrictions By implementing this, you now have a restriction on what type of outside things can gain access to your network Must be implemented in layers in order to localize all traffic in order to get to the host itself
19
Lots of options are out there to choose from It is important to look at your diagram that you made earlier in order to figure out which one is best for you They are good because you can protect a bunch of computers behind the same firewall Also, you can put a firewall on the individual computer as well as put it on the network itself
20
Network security is a very vital component not only to large business, but also your own home A lot of information that is sent and received across networks is confidential and not everyone should have access to it If the wrong person gets a hold of the data they can tamper it an alter it that may directly or indirectly affect a lot of people
21
In order to properly protect your network, you may need to use a variety of different things For example, make it so that everyone has to have some sort of code in order to gain access to the system whether it by a username or biometrics Next, incorporate firewalls that make it more difficult for an outside user to gain access to the system
22
http://www.interhack.net/pubs/network-security/ http://www.pcworld.com/article/130330/how_to_secu re_your_wireless_network.html http://www.pcworld.com/article/130330/how_to_secu re_your_wireless_network.html http://www.cisco.com/web/about/ac123/ac147/ac174/a c200/about_cisco_ipj_archive_article09186a00800c85 ae.html http://www.cisco.com/web/about/ac123/ac147/ac174/a c200/about_cisco_ipj_archive_article09186a00800c85 ae.html http://fcit.usf.edu/network/
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.