Presentation is loading. Please wait.

Presentation is loading. Please wait.

NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.

Similar presentations


Presentation on theme: "NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder."— Presentation transcript:

1 NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder

2 Objectives  Types of Networks  Components of Networks  Risks to Networks  Network Security/Controls  Auditing Networks

3 What is a Network?  Two or more connected computers that allow the process of telecommunications to occur  Telecommunications is the transfer of text, audio, video, or other data formats

4 Types of Networks  Characterized in 3 categories:  Distance  Ownership  Client/Server Networks

5 Distance  Local Area Network (LAN)  Connected computers within a short geographical distance of one another  Wide Area Network (WAN)  Connects computer large geographic away from one another

6 Ownership  Intranet  Internal network within a company  Extranet  Connects internal network to outside business partners  Virtual Private Network (VPN)  Uses public internet connection but achieves privacy through encryption and authentication

7 Client/Server Networks  Network servers that manage the networks and host applications that are shared with client computers  Two types:  Two-tiered  Three-tiered

8 Network Security and Controls  Authentication  Process of ensuring users are who they say they are  Encryption  Scrambling or coding data so that anyone who views will not be able to decode it without a decryption key  Firewalls  Hardware and software to control outside access to the network

9 Components of a Network  Computers and terminals  Telecommunication channels  Telecommunication processors  Routers and Switching devices

10 Computers and Terminals  Computers process data in a network and send/receive information to and from terminals  Terminals serve as input/output devices

11 Telecommunications Channels  Transmit data from computer to computer  Physical transmitters  Wireless transmitters

12 Telecommunications Processors  Most common is a modem  Transforms digital communication signals to analog signals for transfer and then back to digital signals  Digital communication networks

13 Routers and Switching Devices  Switches: connect network components and ensure messages are delivered to appropriate destinations  Routers: similar to switches but with more complex features based on protocols  Approaches to switching  Message switching  Packet switching  Circuit switching

14 Risks to Networks  Social Engineering  Physical Infrastructure Threats  Programmed Threats  Denial of Service Threats  Software Vulnerabilities

15 Social Engineering Diversion

16 “Soc-ing”  VoIP Vulnerabilities – Can open channel to network that is not fire-walled  Phishing Scams – i.e. – emails from unknown persons containing malicious links.  Cross Site Scripting (XSS) – leads to account hijacking, changing of user settings, cookie theft/poisoning, or false advertising

17 Network Security  Network manager and network security administration  Authentication  Encryption  Firewalls

18 Auditing Networks  Perform risk assessment procedures to assess vulnerabilities  Evaluate controls and their effectiveness  Auditing Network Security  Network diagrams  Determine what assets, who has access, and understand connections  Penetration testing  Benchmarking

19 Risk Assessment Procedures  Basic vulnerabilities of a network  Interception- transmitted data is intercepted by a third party  Availability- unavailability of the network could result in losses for the firm  Access/Entry points- a weak point in access can make the information assets vulnerable to intruders

20 Evaluate Controls  Physical access controls  Transmitted information should be encrypted  Network should have sufficient management  Controls to limit the type of traffic  Passwords for everyone who has access

21 Auditing Networks  Network diagrams  Determine what assets  Who has access  Understand connections  Penetration testing

22 Questions?


Download ppt "NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder."

Similar presentations


Ads by Google