Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.

Slides:



Advertisements
Similar presentations
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Web Server Administration TEC 236 Securing the Web Environment.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Web Server Administration Chapter 10 Securing the Web Environment.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Staying Safe Online Keep your Information Secure.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
CERN’s Computer Security Challenge
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Public Key Encryption.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Systems Design and Development Security Precautions Computing Science.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 6 Introduction to Digital Security
Chapter 40 Internet Security.
Chapter 6 Introduction to Digital Security
Information Security Session October 24, 2005
Networking for Home and Small Businesses – Chapter 8
Security.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Network Security Mark Creighton GBA 576 6/4/2019.
INTERNET SECURITY.
Presentation transcript:

Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet security from the viewpoint of the home user…

Profile of the Home internet user. Traditionally, home internet usage has tended to be:- Low bandwidth, billed per minute. Short DHCP lease time. For simple , web access, chat. Increasing trends: Higher bandwidth, always-on, fixed fee. Longer leases. Multimedia , filesharing applications, more complex chat programs, remote assistance, etc.

What do we mean by security? Keep private files private. Prevent damage to/tampering with our operating system and computer. Shop online safely. Send and receive safely. Will not consider high-grade attacks in this talk.

Threats Viruses Backdoor programs Denial of Service (DoS) Interception

More about viruses Some viruses exploit software flaws to run automatically. Infection can come from a variety of sources Damage.

Klez Virus Klez-a detected by Sophos since Oct Top virus in 2002, still going strong. Auto executes Built-in mail engine. Attaches files randomly Attempts to disable AV. Also spreads via network.

Backdoor programs / trojans Program can do anything that a user sitting at the computer could do. Infection. DDOS.

DDOS attack

Methods of protection Anti virus Password discipline Firewalls

Passwords Storing passwords is risky. Passwords are recorded using a one-way function. Brute force attack.

Why firewall? To prevent the exploitation of backdoor programs. Prevent unauthorised connection to services. Prevents an attacker from scanning for a vulnerability

What does a firewall do? A firewall filters the network to allow only certain types of packets. Incoming connections. Obviously forged packets. ICMP danger.

Firewall examples Zone Alarm Smoothwall Iptables “Black box” firewalls.

Introduction to cryptography 2 main forms, symmetric, and asymmetric. Key verification. Session keys.

Shopping online SSL encryption (https) Key verification Cipher strength Weaknesses

Secure Demo weaknesses. Digital signature. Encryption. SSL

Summary Backdoor programs and viruses pose threats Antivirus and firewalls reduce the risk. Traditional protocols may be unsafe. Cryptography can be used to provide secure communication.

Questions?

Server certificate

Basic introduction to Networking IP identifies each computer individually TCP identifies the service being used (www, ftp, etc.) DHCP is used to assign an IP address to a computer upon connection to the internet