By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Configuration Strategies
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Chapter 12 Network Security.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Computer Networks IGCSE ICT Section 4.
Computer Networking Devices Seven Different Networking Components.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Securing a Wireless Network
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Protecting Students on the School Computer Network Enfield High School.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Networking Components Assignment 3 Corbin Watkins.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Network System Security - Task 2. Russell Johnston.
Computer Networking Devices
Computer Data Security & Privacy
How To Set Up A Wireless Network
Introduction to Networking
Firewalls.
Security of a Local Area Network
Security in Networking
Unit 27: Network Operating Systems
Network Security: IP Spoofing and Firewall
Topic 5: Communication and the Internet
AbbottLink™ - IP Address Overview
Presentation transcript:

By: Brett Belin

Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network Typically involves all activities that an organization, enterprise, or institutions undertake to protect their assets

Consists of two or more computers that are linked together in order to share certain resources They can be linked by cables, wires, waves, or satellites Two basic types of networks LAN WAN

Known as Local Area Network Typically confined to a small area Computers on this network are rarely over a mile a part in distance

WAN stands for Wide Area Networks They are used to connect a much bigger network Involves more extensive wiring since the network is a lot bigger than LAN

Designed to read and process requests sent from one machine to another machine Also known as the host that is deployed to execute one or more programs Usually have more processing power, memory, and hard disk space than clients

Prevent people from gaining access to your network that should not be viewing your files It can lead to Breaches in Confidentiality Data destruction can take place if someone gets into your system In addition, data manipulation can happen where they tamper with your numbers or important information

Technology Weakness Could be a protocol weakness Also a weakness within the operating system Configuration Weakness Wired unsecured Username and passwords are known to various amounts of people Policies Lack of written security policy Sometimes lacks continuity

Denial of Service (DoS) Unauthorized Access Spoofing Eavesdropping

Probably the nastiest and most difficult to address They are easy to launch and usually very difficult to track Basically what it does is sends more information than the machine can handle

Can be done in a variety of different attacks Usually just means that someone or something is trying to gain access or resources from your machine that should not be allowed to

Create a Network Diagram This consists of symbols or pictures that tells you where the computers and things are set up Could also include information such as what brand the products are or how they are connected Understand the Network Who uses the network? What type of hardware? What is the internet connection like? Can regular patrons log onto the system?

Log into the internet and type in the IP address of your router into the address bar Go to the wireless tab and enter the SSID this number should be located on the sticker of the router Next, go to the wireless tab/wireless security and choose enable

Choose either WEP or WEA encryption. WEA is a more secure choice Choose either 64 or 128 bit encryption, once again the 128 bit is the more secure. Next you want to generate a passphrase By doing this, you only people that have the passphrase are able to access the router and use your internet connection

Another great way to secure your network Requires each person who should have access to have a distinct name that he or she may log in with In addition, each name has a password or pin possibly that only they should know This will minimize the chance of an unauthorized user gaining access to your system and getting information

Another great way to protect your network against harmful attacks It is part of a computer system or network that is designed to block unauthorized access while permitting authorized users to communicate still Can be implemented in either hardware or software or even a combination of both

Application Gateways These were the first types of firewalls Sometimes known as proxy gateways Run special Software to act as a proxy server It is run on the Application layer of the ISO/OSI model which is where it gets the name Clients must know how to use the proxy in order to use the Internet services

Packet Filtering Routers by default will pass all traffic sent it, and do so with out and restrictions By implementing this, you now have a restriction on what type of outside things can gain access to your network Must be implemented in layers in order to localize all traffic in order to get to the host itself

Lots of options are out there to choose from It is important to look at your diagram that you made earlier in order to figure out which one is best for you They are good because you can protect a bunch of computers behind the same firewall Also, you can put a firewall on the individual computer as well as put it on the network itself

Network security is a very vital component not only to large business, but also your own home A lot of information that is sent and received across networks is confidential and not everyone should have access to it If the wrong person gets a hold of the data they can tamper it an alter it that may directly or indirectly affect a lot of people

In order to properly protect your network, you may need to use a variety of different things For example, make it so that everyone has to have some sort of code in order to gain access to the system whether it by a username or biometrics Next, incorporate firewalls that make it more difficult for an outside user to gain access to the system

re_your_wireless_network.html re_your_wireless_network.html c200/about_cisco_ipj_archive_article09186a00800c85 ae.html c200/about_cisco_ipj_archive_article09186a00800c85 ae.html