Network System Security - Task 2. Russell Johnston.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Mr C Johnston ICT Teacher
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Computer Networks IGCSE ICT Section 4.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Common Devices Used In Computer Networks
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Lecture 24 Wireless Network Security
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Any criminal action perpetrated primarily through the use of a computer.
Introduction to Networking. What is a Network? Discuss in groups.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Networked Systems Security Security Systems Solutions & Features.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Understand Wireless Security LESSON Security Fundamentals.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Chapter 40 Internet Security.
Managing Windows Security
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Methods of Securing LANs
Wireless Network Security
Cyber Security By: Pratik Gandhi.
Business Risks of Insecure Networks
Firewalls.
Security of a Local Area Network
Security in Networking
What is it? Why do I keep getting from Barracuda? SPAM.
Computer Security.
Fire-wall.
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Network System Security - Task 2. Russell Johnston.

Systems.  Secure MIME: Which stands for secure Multi-Purpose Internet Mail Extensions. It is known as a secure method of sending that uses the Rivest-Shamir- Adleman encryption system.  Spam: Spam is defined as unwanted and unneeded junk mail. Spam usually consists of advertising and it is sent to a large number of people through e- mail. Other purposes of spam can include phishing and spreading malware.  Hoaxing: Hoaxing is known as a type of scam that can be distributed in form. Hoaxing is designed to deceive and defraud recipients and the motivation behind it is usually financial.

and Wireless Systems.  Relay agents are known as a small program that relays DHCP/BOOTP messages between clients and servers on different subnets. Relay agents can be misused and can be dangerous as they are able to redirect users to certain dangerous sites which can be used to make the user input personal and financial information.  A site survey is known as an examination of a location or a place in order to obtain data or information. Secure information which can be required from a site survey can be the cost and required for a certain task to be completed. Site surveys are common with large-scale technology projects such as installing a new network or upgrading an old one

Wireless Systems.  Mac Association: This is where a system associates itself with a router. The router will log the computers MAC address in a table for later reference. A mac filter is used and it can either accept or reject, if a mac filter is enable then when a new computer connects to the router, it will check that the systems mac address to the mac table which is stored.  WPA/WEP: Wifi Protected Access (WPA) is known as a security standard for systems using a wireless Wi-Fi connection. It is known as an improved standard of WEP. It provides a more complex data encryption than WEP and it also has user authentication. WEP was originally designed to provide the same level of security as a wired LAN. But WEP was found not to be as secure as once thought and that is why WPA was created.  TKIP: TKIP is known as an encryption protocol for wireless LANs. It is designed and created to provide more secure encryption than the well-known weaker protocol Wired Equivalent Privacy, WEP also.

Networked Devices.  A router is a device that forwards data packets along networks and is connected to at least two networks. Security features include passwords and access control lists.  Switches are known as a high speed and intelligent devices that receives incoming data packets and redirects them to their destination on a LAN. To keep secure you can close unused ports, use passwords and permit certain mac addresses.

Networked devices and Transmission Media.  Wireless access point is a hardware device or a configured node on a LAN that allows wireless capable devices and wired networks to connect through a wireless standard.  Shielded cable provides much more security in comparison to unshielded cable as an attacker would be able to add a tapping device on that cable and gain access to the data which is going through that exact cable. Shielded cable provides an additional layer of protection.

Intrusion Detection Systems  Firewalls: There are two different types of firewall which include software and hardware. Hardware firewalls are built within the network devices and can shield every single device and are used by most home users who want to protect their system.  Virus Protection: Virus protection software is designed to prevent viruses, worms and Trojan horses from getting into your system as well as remove and delete any malicious software code that has already infected your system.  Spyware Protection: Spyware protection is known as a program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.

Intrusion Detection Systems  File Monitoring and Folder Monitoring: File monitoring is known as the process of ensuring that files have integrity. With folder monitoring software you are able to detect the changes which have occurred with folders and sub-folders.  Use of Honeypots: Honeypots are known as an Internet-attached server that acts as a type of trap, which baits in potential hackers.  Alarms: Alarm software can also be used within a system to prevent and detect hackers and unauthorised users from accessing your system by alarming the user.