Download presentation
Presentation is loading. Please wait.
Published byPrzybysław Marczak Modified over 6 years ago
1
Networks (Public v Private) and Internet Security
© EIT, Author Gay Robertson, 2017
2
Why do we need security? As we rely more and more on the internet, both for work and personal use, our devices are always connected Our devices have also gotten smarter, our smartphones are mini-computers rather then just phone and messaging devices We are using our devices to hold and store more and more data, including our personal data, or confidential data in the workplace when using our devices for BYOD
3
Information may include:
Personal information is worth a lot to scammers and they try many ways to gain your information Information may include: information and contacts Bank details Social Media information and contacts Identify Theft To avoid these situations, security is required to prevent hacker or scammers from gaining access to your personal information or your workplace information and data
4
Public Networks v Private Networks What is the difference?
When you are connecting a device to a network it is important to consider what type of network you are connecting to Many devices offer you the option to say if you are connecting to a private or public network The reason for this is that depending on your choice, your device either allows or disables certain features to protect or enhance the device
5
Private Networks Private networks: the network in your home is a private network that you control and trust a company network where only company devices or authorised approved devices are able to connect to the network is a private network that the company controls – Virtual Private Network Setting a network as a Private Network means that your device will trust other devices on the network This allows devices not only to see each other on the network, but also be able to communicate and transfer information/data to each other
6
Public Networks Setting a Network as public means that your phone or device will recognize that the network is not necessary trustworthy This means that it wont share it’s information with other devices, nor will it allow transfers of data
7
The risks If your device is set to private network when it is actually connected to a public network, this allows your device to be seen and potentially accessed by any other person connected to the public network This is like leaving a handbag on a picnic table at a public pool instead of a locker, anyone can see it, and there is a risk that anyone can access it Even if your network is set up correctly with appropriate security settings in place for public networks, it is still important to consider how much you trust that network Much like how someone can attempt to break into your locker at the public pool This is not to say you can’t trust networks at all, but you do need to consider what is the network, how safe is it, and do I really trust it to connect my device with potentially sensitive data to it So, if you’re accessing something sensitive on public Wi-Fi, try to do it on an encrypted website HTTPS:
8
Security threats On a personal device this might mean the photos, unless backed up, might be lost forever If you have social media apps open anyone will be able to access that social media through your phone Any sensitive information, eg your contacts and any saved files, are also at risk of being lost or stolen Worst case scenario – a thief can use the information on your phone to impersonate you, gain access to your accounts, including and social media, or worse bank account information
9
Malware threats Virus Self replication program, designed to infect a computer by corrupting files and data Worms are a form of virus that spread and grow crippling a network or system A Trojan Horse is a form of malware that pretends to be something else and tricks the user into allowing it access to the computer Spam is unsolicited /Junk mail. Sometimes legitimate like the junk mail in your post-box, however it is also used for scams, and malware Spyware collects information about users without their knowledge. Sometimes spyware is bundled within another program or app
10
Information threats Phishing is a form of scam where an attacker pretends to be an official person or have an official looking website. They trick people into giving personal information This information can be used for identity theft or sold to another illegitimate group or attacker A hoax is generally an letter that tricks or scares people into passing it onto others
11
Security Measures There are a few main ways to ensure both personal or work data is safe and secure Antivirus software Encryption Safe Browsing Practices
12
Antivirus Software Antivirus software is designed to detect and remove malicious software (MALWARE) Antivirus software MUST BE frequently updated to ensure that it is aware of as many known viruses as possible and MUST run automatically That is why it is important to keep your antivirus software up to date
13
Encryption – the history
One of the earliest forms of encryptions was used by the Spartans in ancient Greece, with the use of a Scytale (like a frame) Any secret messages were written on a piece of fabric or leather wrapped around a wooden tube or spear then the fabric was delivered to the required general If the messenger was intercepted or killed when delivering the message, the fabric would simply show a bunch of random letters and the enemy couldn’t tell what the message said However if delivered to the right person then they would know to wrap the fabric/leather in a certain way on a Scytale which was a specific width/ size. The jumbled letters then displayed the message written by the sender
14
Network Encryption Encryption works today much like it did in ancient Greece, and is one of the most effective ways to protect data traveling over networks. When data is encrypted it requires a form of ‘Scytale’ or frame to decipher the data. Today this is a key, password or digital certificate. Only those with the right key are able to read the data This stops illegitimate users who intercept the data from being able to read it
15
Encryption Protocols There are 3 main protocols in Network Encryption
WEP stands for Wired Equivalent Privacy and was the original encryption protocol for wireless networks. It is considered the weakest, and is known to have many security flaws and easily fails WPA, known as Wi-Fi Protected Access, was introduced as an interim security enhancement while a newer security standard was being developed. This protocol involves both the sender and receiver needing to have the right keys or digital certificates to read the information WPA2 is the second version of WPA and is the strongest form of encryption, again like WPA it uses keys and digital certificates that are required to read the information sent over a network, however the way the data is encrypted is far more advanced and difficult to break then WEP or WPA
16
Safe browsing Safe browsing habits is another form of protecting your personal or company data Being aware of the site you are visiting and any uploads or downloads are important Another factor is scamming sites. These can be sites impersonating as a bank or another legitimate organisation. These sites might look almost identical to the proper site, it might be that the URL has one extra character or is spelt slightly differently
17
One way to protect yourself is to check the URL or address of the site you are on - a good sign that a website is legitimate is the use of https This means that the site is on a secure protocol and should be safe to use For example most bank websites should be in the form of an https protocol Also be aware of current scams or illegitimate sites, there are many websites available that share up to date information with you One such site being
18
Videos to watch: Introduction to Cyber Security - Duration 3m 53s The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA’s Cybersecurity Lab.
19
How encryption works - Duration 2m 09s Simple view of how public key crypto works.
20
WiFi Network Security - Duration 3m 28s Locking your wireless network is as important as locking your home. Learn how and why to create strong passwords for your network and router.
21
Okay, let’s go use the workbook
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.