Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network & Internet Security Chapter 4. Information Technology Helps to produce, manipulate, store, communicate, and/or disseminate information Consists.

Similar presentations


Presentation on theme: "Network & Internet Security Chapter 4. Information Technology Helps to produce, manipulate, store, communicate, and/or disseminate information Consists."— Presentation transcript:

1 Network & Internet Security Chapter 4

2 Information Technology Helps to produce, manipulate, store, communicate, and/or disseminate information Consists of Computers + Communications Most computers today have Internet access

3 LANS, MANS, and WANS Local area network (LAN) - a network of computers and other devices that is confined to a relatively small space, such as one building or even one office. Metropolitan area network (MAN) - a network that connects clients and servers in multiple buildings in a region. Wide area network (WAN) - a network that connects two or more geographically distinct LANs

4 LAN (Short distance)

5 MAN (Usually within a city)

6 WAN (Large distance) Seattle San Diego Chicago Dallas Washington Boston

7 From the Analog to the Digital Age Tape recorders, voices, and musical instruments are analog. CDs are digital.

8 Going Digital Music CD’s Computers TVs Web TV Telephones Movies (DVD) Newspapers

9 Digital Television Clearer picture Supports HDTV

10 HDTV

11 Plymouth State College Forms of Connectivity Videoconferencing Virtual Private Networks Telecommuting & virtual offices Home networks (WiFi) Cell Phones Bluetooth

12 Plymouth State College Videoconferencing

13 VPNs Virtual Private Networks –Private networks that use a public network, usually the internet, to connect remote sites

14 VPN (Virtual Private Network) Nodenode Nodenode Node Internet

15 Network Concerns and Protection Hackers Viruses Snooping Firewalls

16 Cyberthreats, Hackers, & Safeguards Problem: Initially no security was built into the Internet. The internet is used by some people who are not trustworthy. All it takes is one computer on a LAN that has been compromised for all computers on it to be vulnerable.

17 Cybercrime Crimes committed with or against computers and networks Includes unauthorized access or use Hacking –Individual information –Business information –National security information Plymouth State University

18 Cyberthreats, Hackers, & Safeguards Hackers –People who gain unauthorized access to computers or networks, often for fun or to see if they can (not good) Crackers –Malicious hackers who break into computers for malicious purposes

19 11/2/00 Plymouth State University 19 Threats to Computers & Communications Systems Worms A program that copies itself repeatedly into a computer’s memory or onto a disk drive Viruses A is a “deviant” program, stored on a computer hard drive, that can cause unexpected and undesirable effects.

20 Viruses & Worms How they spread –Via attachments –By infected floppies or CDs –By clicking on infiltrated websites –By downloading from infected files from websites –Through infiltrated Wi-Fi hotspots –From one infected PC on a LAN to another What can you do about it? –Install anti-virus software and subscribe to the automatic anti-virus update service

21 Cyberthreats, Hackers, & Safeguards Trojan Horses –Programs that pretend to be a useful program such as a free game or screensaver. –Carry viruses or malicious instructions that damage your computer or install a backdoor or spyware –Backdoors and spyware allow others to access your computer without your knowledge

22 Backdoor Sometimes installed by a virus Plymouth State University

23 11/2/00 Plymouth State University 23 Disgruntled Employees

24 11/2/00 Plymouth State University 24 Computer Criminals Hackers Crackers Employees

25 Protecting Your Computer Safeguards –Use antivirus software, and keep it current –Install a firewall to filter out undesirable traffic –Use robust passwords – Minimum 8 characters with letters, numbers, characters 4cats is not a good password, but is –Install antispyware software –Encrypt financial and personal records –Back up your data, so if your PC is attacked and must be reformatted, you can restore your data

26 Protecting Your Computer Encryption –The process of altering readable data into unreadable form to prevent unauthorized access –Two forms: Private Key encryption means the same secret key is used by both the sender and receiver to encrypt and decrypt a message Public Key encryption means that two keys are used

27 Encryption Scrambles data before transmission Uses encryption key Plaintext versus cipher text

28 Proof of Authenticity Certificate Authority Entity that issues digital certificatesdigital certificates Digital Certificate –Provided by a Certificate Authority –Has an expiration date Digital Signature –Gives a recipient reason to believe that the message was created by a known sender Plymouth State University

29 Validation Plymouth State University

30 Vulnerable Communication Home WiFi Networks Cellular phones Bluetooth Plymouth State University

31 Cellular Phones Plymouth State University

32 Wireless Communications Media Short-range Wireless Wi-Fi (802.11) networks –Wi-Fi b, a, and g correspond to b, a, and g – is an IEEE wireless technical specification –802.11b is older, transmits 11 megabits per second –802.11a is faster than b but with weaker security than g –802.11g is 54 megabits per second and transmits 50 ft Warning! Security is disabled by default on Wi-Fi

33 Wireless Communications Media Personal Area Wireless Bluetooth –Short-range wireless standard to link cellphones, PDAs, computers, and peripherals at distances up to 30 ft –Named after King Harald Bluetooth, the Viking who unified Denmark and Norway –Transmits 720 kilobits per second –Bluetooth can also be used to eavesdrop on networks –Turn it off on your cell phone unless you need it at that time

34 11/2/00 Plymouth State University 34 Safeguards Identification & Access What you have –Cards, keys, signatures, badges, RFID, USB key What you know –PINs, passwords, personal information Who you are –Physical traits Biometrics – fingerprints, iris, face recognition Joe Smith

35 Stealing Passwords Plymouth State University

36 11/2/00 Plymouth State University 36 Iris Scan

37 11/2/00 Plymouth State University 37 Safeguards Encryption Protection of software & data –Access, audit, & people controls Disaster-recovery plans

38 11/2/00 Plymouth State University 38 Protection of Software & Data Security procedures –Control of access –Audit controls –People controls Disaster-recovery plan What can a business do if there are no disaster-recovery plans in place and a disaster occurs?

39 Attacks on Computers and Networks Botnet Denial-of-Service attack Logic bomb Trojan Horse Malware on cell phones Virus on router iPod infected during manufacturing Plymouth State University

40 Identity / Information Theft Requests for information Phishing (spoof ) Pharming (fake web site) Auction fraud Plymouth State University

41 Real Web Site Plymouth State University

42 Fake Web Site Plymouth State University

43 Protection at Work No floppy / USB use Secure access –Physical –Logical Plymouth State University

44 Recent Problems Cyberbullying Cyberstalking Pornography Child predators Plymouth State University

45 Plymouth State College Internet Predators

46 Legal Protection Laws changing due to changing technology Plymouth State University


Download ppt "Network & Internet Security Chapter 4. Information Technology Helps to produce, manipulate, store, communicate, and/or disseminate information Consists."

Similar presentations


Ads by Google