Download presentation
Presentation is loading. Please wait.
Published byKerry Holmes Modified over 5 years ago
1
IP Addresses & Ports IP Addresses – identify a device on a network
assigned by router when device connects Ports – identify a service running on your device
2
Firewalls Monitor and control attempts to access to your device over the network Should allow the appropriate requests, block unexpected/potentially malicious requests
3
Simple Firewall Setup sudo apt install ufw sudo ufw enable sudo ufw deny 4711
4
How do hacks happen?
5
How do hacks happen? Hackers find and exploit vulnerabilities in…
The physical network Firewall configuration Software (often outdated)
6
But don’t forget the least secure part of a computer system…
Us!
7
Social Engineering Phishing Viruses
Tricking people into giving up their passwords / security answers over the phone / by
8
Hacking is fun… but be careful!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.