Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.

Similar presentations


Presentation on theme: "IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes."— Presentation transcript:

1 IT security Are you protected against hackers?

2 Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes are connected to the Internet – they are the potential target  New customers => new hackers

3 Why are we in danger? /2  Anyone can connect to the Internet (Internet Cafes, Hot spots, etc.)  Downloadable hacker tools, articles  New worms and viruses weekly

4 Probable attack types  Attacks against web services  Spyware, adware  Spam  DoS (Denial of Service)  Attacks in the application layer  Portscan  etc.

5 Security rules  The network must be divided into security zones  Each zone has own security rules  Between these zones there must be a device, which is usually the firewall

6 Firewall architectures There are typically three basic firewall architectures:  Basic Border  Basic with DMZ Network  Dual Firewalls with DMZ Network

7 Demilitarized Zone (DMZ)  Demilitarized Zone  It is a firewall configuration for securing local area networks (LANs)  In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.

8 Demilitarized Zone (DMZ) /2  One or more computers also run outside the firewall, in the DMZ  Those computers on the outside intercept traffic and broker requests for the rest of the LAN, adding an extra layer of protection for computers behind the firewall.

9 Basic border firewall  A single-layer solution  Every firewall function on one device  Simple  Cheap  The least secure solution

10 Basic firewall with DMZ Network  We have server(s) providing services to the outside network  The server is the most endangered  We put it into a new network, which is the DMZ  Better security and reliability

11 Dual firewall with DMZ Network  Two firewalls:  Outer  Inner  The network is divided into 3 segments:  Outer network  DMZ  LAN  Different architecture of the firewalls is practical – it’s more safe

12 What can you do?  Use personal firewall  It is a software running on the PC  Protection for home networks  Should be used on every computer  Cheap or free solution  Easy to configure and use  It has limited capabilities


Download ppt "IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes."

Similar presentations


Ads by Google