Download presentation
Presentation is loading. Please wait.
Published byTimothy Hutchinson Modified over 9 years ago
1
Jaden Terry
2
To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive advantage o Government Protect information from other countries Protect classified information. o Personal Privacy To prevent hackers o Viruses, malware etc. o Could potentially shut down computers or networks.
3
September 2012 banks o Shut down websites for many well known banks by sending outrageous amounts of data to the websites. Sony PlayStation network o Stealing account information and credit card numbers from about 77 million users. o Shut down the PlayStation network for about 2 weeks. RAT (Remote Access Tool) o Stealing government information
4
Passive Wiretapping o Device that plugs into the network and allows someone to listen or see the network traffic. o Another device allows them to read encrypted data. Port Scanning o Identifies open ports on a computer to see if they are accessible. Active Spoofing o Impersonating or concealing the IP address of another computer. Denial of Service o Making a computer or network unavailable. Buffer Overflow o When the buffer is overrun with data, the extra data can be sent elsewhere.
5
Firewall – system that controls the incoming and outgoing traffic and determines whether or not packets should be allowed through. o Network layer: Packet filters that allow packets to pass through if they match a certain rule set. Mac Address Filtering – Security method where MAC addresses are used to determine if the network is accessible. o MAC addresses can be spoofed. WPA/WPA2 (Wireless Protected Access) – Encrypts packets. o WPA2 uses AES (Advanced Encryption Standard) protocol for encrypting packets.
6
Keep your computer updated – Some updates have improved security and reliability. Use a Firewall and Anti-virus. Change passwords frequently and make them strong. Use a network security key for a wireless network, which will turn on encryption.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.