Download presentation
Presentation is loading. Please wait.
Published byClifton Hines Modified over 9 years ago
1
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
2
Everyone & Everything is Connected Radio – 35 years to reach 50 million TV – 15 years to reach 50 million W.W.W. – 5 years to reach 50 million
3
Risky Business Johns Hopkins Network is appr. 75,000 nodes Approximately 20% are unsecure Approximately 50,000 hits on our top 10 IDS rules
4
Hackers/Crackers/Script Kiddies ? Script kiddies Less skilled than traditional hackers. These “skiddies” often use tools developed by others without completely understanding the basics. Cracker Computer-savvy programmer creates attack software Hacker A hacker is a person who breaks into computers and computer networks for profit, as a protest or for the challege
5
Social Engineering I need a password reset. What is the password set to? This is John, the System Admin. What is your password? Email: ABC Bank has noticed a problem with your account… I have come to repair your machine… and have some software patches
6
Phishing = Fake Email! ABC Bank Your account has been compromised. We need you to click the following link and verify your password, pin number and social security number Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity Victim My account was what?!
7
Pharming = Fake Webpages Pharming Like phishing, malicious users will create web pages that look exactly the same as legitimate ones. The only difference is where your data is going!
8
Worms Network worms are self-replicating malware which uses the computer network to send copies of itself to other computers Some worms come in the form of a phishing email. When the victim clicks the link inside, it begins to infect the victim machine. Then sends the link to all the accounts in the users address book
9
How are we protecting you? Defense in Depth Border Router Perimeter firewall Internal firewall Intrusion Detection System Policies & Procedures & Audits Authentication Access Controls
10
Firewalls The good, the bad & the ugly… Filter The bad & the ugly The Good Route Filter: Verifies sources and destination of IP addresses Packet Filter: Scans headers of packets and discards if ruleset failed (e.g., Firewall or router) Content Filter: Scans contents of packets and discards if ruleset failed (e.g., Intrusion Prevention System or firewall)
11
Intrusion Detection/Prevention Systems Network IDS=NIDS Examines packets for attacks Can find worms, viruses, org-defined attacks Warns administrator of attack
12
Questions
13
How to contact us ? network.security@jhmi.edu
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.