Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.

Similar presentations


Presentation on theme: "Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW."— Presentation transcript:

1

2 Lesson 10 – SECURING YOUR NETWORK

3 Security devices Internal security External security Viruses and other malicious software OVERVIEW

4 Firewall: System enforcing security policy between two Networks. SECURITY DEVICES

5 Proxy Server: Server acting as a proxy (an anonymous intermediary) for Network users. Security devices

6 Packet filter: Enables users to set criteria for allowed and disallowed packets. Security devices

7 Securing Network from internal threats like: Accessing information inappropriately. Accessing other users’ files. Impersonating other users. Performing criminal activities on systems. Packet “sniffing” on the Network. INTERNAL SECURITY

8 Account security File and directory permissions Practices and user education Internal security

9 Process of managing the user accounts enabled on the Network. Account security

10 To manage security: Remove the guest account. Rename the default name for the administrative account. Remove access to Network resources. Work closely with HR/legal departments. Review newly assigned permissions. Account security

11 To maintain password security: Get users to change their Network password regularly. Set the reuse policy. Have passwords that are at least eight characters long. Establish thresholds. Account security

12 Control access to files and directories by using built-in permissions. File and directory permissions

13 Generic directory roles: Create only Read only Change Full control File and directory permissions

14 Inform users what is expected of them in terms of security. Discuss security issues with new employees. Have users acknowledge their understanding. Periodically audit users’ security actions. Review the NOS’ security logs. Practice and user education

15 Process of securing the Network from external threats. EXTERNAL SECURITY

16 Types of threats: Front-door threats Back-door threats Denial of service External security

17 Arise when a user from outside the company finds a user password and logs on to the Network. Front-door threats

18 Solutions: Separate Network resources accessed from and outside the LAN. Control users accessing LAN from outside the LAN. Set up a separate remote access account for remote users. Set up user accounts to use dial-back. Change password when employee with broad access resigns. Front-door threats

19 Software or hardware bugs in the Network’s OS enabling an outsider to crack the Network’s security. Back-door threats

20 Solutions: Host the company’s web site on an external server. Implement a firewall router. Review security settings for the web server. Place web server for non-employees outside the firewall.

21 Attacks that deny service to the Network. Denial of service

22 Solutions: Keep various Network software “current”. Disallow Internet Control Message Protocol (ICMP) traffic service.

23 Denial of service Demilitarized Zone (DMZ): The area between computers placed between the firewall an connection to an external Network.

24 VIRUSES AND OTHER MALICIOUS SOFTWARE

25 Program that spreads by infecting other files with a copy of itself. Files infected by viruses include program files (.COM,.EXE, and.DLL). Virus

26 Program that propagates by sending copies of itself to other computers. Spreads by attaching to e-mails along with a message. Worm

27 Program that claims to do something interesting and performs malicious actions in the background. Trojan horse

28 Malicious piece of programming code inserted into a normal program. Can be timed to erase key files. Logic bomb

29 Internal security: Account security Account password security File and directory permissions SUMMARY

30 External security: Front-door threats Back-door threats Denial of service Summary

31 Viruses and other malicious software: Viruses Worms Trojan horses Logic bombs Summary


Download ppt "Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW."

Similar presentations


Ads by Google