Download presentation
Presentation is loading. Please wait.
2
Lesson 10 – SECURING YOUR NETWORK
3
Security devices Internal security External security Viruses and other malicious software OVERVIEW
4
Firewall: System enforcing security policy between two Networks. SECURITY DEVICES
5
Proxy Server: Server acting as a proxy (an anonymous intermediary) for Network users. Security devices
6
Packet filter: Enables users to set criteria for allowed and disallowed packets. Security devices
7
Securing Network from internal threats like: Accessing information inappropriately. Accessing other users’ files. Impersonating other users. Performing criminal activities on systems. Packet “sniffing” on the Network. INTERNAL SECURITY
8
Account security File and directory permissions Practices and user education Internal security
9
Process of managing the user accounts enabled on the Network. Account security
10
To manage security: Remove the guest account. Rename the default name for the administrative account. Remove access to Network resources. Work closely with HR/legal departments. Review newly assigned permissions. Account security
11
To maintain password security: Get users to change their Network password regularly. Set the reuse policy. Have passwords that are at least eight characters long. Establish thresholds. Account security
12
Control access to files and directories by using built-in permissions. File and directory permissions
13
Generic directory roles: Create only Read only Change Full control File and directory permissions
14
Inform users what is expected of them in terms of security. Discuss security issues with new employees. Have users acknowledge their understanding. Periodically audit users’ security actions. Review the NOS’ security logs. Practice and user education
15
Process of securing the Network from external threats. EXTERNAL SECURITY
16
Types of threats: Front-door threats Back-door threats Denial of service External security
17
Arise when a user from outside the company finds a user password and logs on to the Network. Front-door threats
18
Solutions: Separate Network resources accessed from and outside the LAN. Control users accessing LAN from outside the LAN. Set up a separate remote access account for remote users. Set up user accounts to use dial-back. Change password when employee with broad access resigns. Front-door threats
19
Software or hardware bugs in the Network’s OS enabling an outsider to crack the Network’s security. Back-door threats
20
Solutions: Host the company’s web site on an external server. Implement a firewall router. Review security settings for the web server. Place web server for non-employees outside the firewall.
21
Attacks that deny service to the Network. Denial of service
22
Solutions: Keep various Network software “current”. Disallow Internet Control Message Protocol (ICMP) traffic service.
23
Denial of service Demilitarized Zone (DMZ): The area between computers placed between the firewall an connection to an external Network.
24
VIRUSES AND OTHER MALICIOUS SOFTWARE
25
Program that spreads by infecting other files with a copy of itself. Files infected by viruses include program files (.COM,.EXE, and.DLL). Virus
26
Program that propagates by sending copies of itself to other computers. Spreads by attaching to e-mails along with a message. Worm
27
Program that claims to do something interesting and performs malicious actions in the background. Trojan horse
28
Malicious piece of programming code inserted into a normal program. Can be timed to erase key files. Logic bomb
29
Internal security: Account security Account password security File and directory permissions SUMMARY
30
External security: Front-door threats Back-door threats Denial of service Summary
31
Viruses and other malicious software: Viruses Worms Trojan horses Logic bombs Summary
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.