Download presentation
Presentation is loading. Please wait.
Published byAlbert Clyde Jordan Modified over 6 years ago
1
Answer the questions to reveal the blocks and guess the picture.
Guess what is the picture? Answer the questions to reveal the blocks and guess the picture.
4
Network Security
5
Network Security Lesson3 : Define Network Security and its objectives
Lesson Objectives Define Network Security and its objectives Identify the different types of attacks Use network security tools
6
Network Security The security provided to a network to prevent unauthorized access and risks
7
To protect data from attacks
Network Security Why is network security very important for companies, organizations and countries? To protect data from attacks
8
The objectives of network security are:
1. Control of accessibility to computers or network 2. Prevention of accidental deletion, modification or compromise of data 3. Detection and prevention of internal security breaches 4. Detection and prevention of unauthorized external hacking
9
1- Controlling Physical Access
Ensuring a physically secure network environment is the first step in controlling access to your important data and files Control access to network elements Protecting the servers Keeping Workstations Secure Lock server rooms
10
The objectives of network security are:
Activity 1 Develop a security plan to control physical access to the school network Computer Room should be locked Set control camera Staff & students should have username and password Set Password for router.
11
The objectives of network security are:
2-Preventing Accidental Changes or Loss of Data: A lot of information that gets deleted, changed, or given to the wrong person happens because of mistakes made by people who are in charge of the network or staff who have access to it To prevent this from happening you have to provide users with the following: Password Policies & Rules Access depends on skills
12
The objectives of network security are:
2-Preventing Accidental Changes or Loss of Data: The objectives of network security are: Activity 2 suppose you are a network administrator. What kinds of rights will you give to network users and what will you not give them? Teachers should be given different rights (add/remove) Students should read only (view) some files Students are should not be given rights to print using shared printers
13
The objectives of network security are:
3-Preventing Intentional Internal Security Breaches Internal attackers are more dangerous than external attackers. Can you think of some reasons why? They have an access to resources and rights in network more than others
14
The objectives of network security are:
3-Preventing Intentional Internal Security Breaches 1- Hiring and Human Resource Policies 2-Detecting Internal Breaches Activity 3 Footprint Friends and Colleagues In what ways can we check if a person has good character or not?
15
The objectives of network security are:
4-Preventing Outsiders Getting Into Your Network People from outside the network viewing or stealing information (hacking into a network) is a big worry for all companies 1-External Intruders with Internal Access 2-Tactical Planning (training plan) Activity 4 Develop a security policy “ if / then “ in case someone hacks your personal computer
16
Types of Attacks An ‘attack’ is :
an attempt to get into a computer or a network without permission.
17
Types of Attacks 1- Social engineering attacks 2- Denial of Service (DOS) attacks 3- Scanning and Spoofing 4- Software and system exploits 5- Trojans, viruses and worms:
18
Activity 5 Types of Attacks 1- Social engineering attacks
How can we deal with hackers who are good at winning trust and persuading a staff member to give them their password for work computers?
19
HTTP Error 503. The Service is unavailable
Types of Attacks 2- Denial of Service (DOS) attacks Service Unavailable ___________________ HTTP Error 503. The Service is unavailable
20
The objectives of network security are:
3- Scanning and Spoofing
21
Types of Attacks 4- Software and system exploits
22
4- Software and system exploits
Types of Attacks 4- Software and system exploits What steps can I take to prevent software and system exploits attacks? By updating the Operating system. Installing anti-virus programs
23
5- Trojans, viruses and worms
Types of Attacks 5- Trojans, viruses and worms Trojan: This is a software program that appears to perform a useful function, but in fact, performs actions that the user of the program did not intend. Trojans can: • Delete or change files. • Send files across the network to the hacker. • Install other programs or viruses.
24
Types of Attacks 5- Trojans, viruses and worms Viruses: These are any programs installed without the user knowing about them. They can do harmful things or just annoying things.
25
Types of Attacks 5- Trojans, viruses and worms Worms: These are programs that can travel across the network from one computer to another. Worms make multiple copies of themselves and spread throughout a network. Worms can exploit operating system and software weaknesses and perform harmful actions.
26
5- Trojans, viruses and worms
Types of Attacks 5- Trojans, viruses and worms Search for the best software that can protect your computer from Trojans, viruses and worms.
27
Types of Attacks Search for the best software that can protect your computer from Trojans, viruses and worms.
28
Network Security Tools
1.Operating system and applications 2.Firewalls 3. Antivirus 4. Content Filtering 5.Intrusion Detection Systems Search for new tools that protect your home network from hackers
29
Types of Attacks
30
Types of Attacks
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.