Answer the questions to reveal the blocks and guess the picture.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Mr C Johnston ICT Teacher
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 1 This material was developed by Oregon Health & Science University,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Computer Security By Duncan Hall.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Woodland Hills School District Computer Network Acceptable Use Policy.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Sample security policy Dr Alexei Vernitski.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
What they are and how to protect against them
Seminar On Ethical Hacking Submitted To: Submitted By:
BUSINESS DRIVEN TECHNOLOGY
Instructor Materials Chapter 7 Network Security
Network security threats
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risks of Insecure Networks
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Tool Server Workstation Router Universal
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Unit 1.6 Systems security Lesson 3
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
NETWORK SECURITY.
Fire-wall.
Lecture 3: Secure Network Architecture
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
– Communication Technology in a Changing World
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Computer Security (Summary)
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Woodland Hills School District
Presentation transcript:

Answer the questions to reveal the blocks and guess the picture. Guess what is the picture? Answer the questions to reveal the blocks and guess the picture.

Network Security

Network Security Lesson3 : Define Network Security and its objectives Lesson Objectives Define Network Security and its objectives Identify the different types of attacks Use network security tools

Network Security The security provided to a network to prevent unauthorized access and risks

To protect data from attacks Network Security Why is network security very important for companies, organizations and countries? To protect data from attacks

The objectives of network security are: 1. Control of accessibility to computers or network 2. Prevention of accidental deletion, modification or compromise of data 3. Detection and prevention of internal security breaches 4. Detection and prevention of unauthorized external hacking

1- Controlling Physical Access Ensuring a physically secure network environment is the first step in controlling access to your important data and files Control access to network elements Protecting the servers Keeping Workstations Secure Lock server rooms

The objectives of network security are: Activity 1 Develop a security plan to control physical access to the school network Computer Room should be locked Set control camera Staff & students should have username and password Set Password for router.

The objectives of network security are: 2-Preventing Accidental Changes or Loss of Data: A lot of information that gets deleted, changed, or given to the wrong person happens because of mistakes made by people who are in charge of the network or staff who have access to it To prevent this from happening you have to provide users with the following: Password Policies & Rules Access depends on skills

The objectives of network security are: 2-Preventing Accidental Changes or Loss of Data: The objectives of network security are: Activity 2 suppose you are a network administrator. What kinds of rights will you give to network users and what will you not give them? Teachers should be given different rights (add/remove) Students should read only (view) some files Students are should not be given rights to print using shared printers

The objectives of network security are: 3-Preventing Intentional Internal Security Breaches Internal attackers are more dangerous than external attackers. Can you think of some reasons why? They have an access to resources and rights in network more than others

The objectives of network security are: 3-Preventing Intentional Internal Security Breaches 1- Hiring and Human Resource Policies 2-Detecting Internal Breaches Activity 3 Footprint Friends and Colleagues In what ways can we check if a person has good character or not?

The objectives of network security are: 4-Preventing Outsiders Getting Into Your Network People from outside the network viewing or stealing information (hacking into a network) is a big worry for all companies 1-External Intruders with Internal Access 2-Tactical Planning (training plan) Activity 4 Develop a security policy “ if / then “ in case someone hacks your personal computer

Types of Attacks An ‘attack’ is : an attempt to get into a computer or a network without permission.

Types of Attacks 1- Social engineering attacks 2- Denial of Service (DOS) attacks 3- Scanning and Spoofing 4- Software and system exploits 5- Trojans, viruses and worms:

Activity 5 Types of Attacks 1- Social engineering attacks How can we deal with hackers who are good at winning trust and persuading a staff member to give them their password for work computers?

HTTP Error 503. The Service is unavailable Types of Attacks 2- Denial of Service (DOS) attacks Service Unavailable ___________________ HTTP Error 503. The Service is unavailable

The objectives of network security are: 3- Scanning and Spoofing

Types of Attacks 4- Software and system exploits

4- Software and system exploits Types of Attacks 4- Software and system exploits What steps can I take to prevent software and system exploits attacks? By updating the Operating system. Installing anti-virus programs

5- Trojans, viruses and worms Types of Attacks 5- Trojans, viruses and worms Trojan: This is a software program that appears to perform a useful function, but in fact, performs actions that the user of the program did not intend. Trojans can: • Delete or change files. • Send files across the network to the hacker. • Install other programs or viruses.

Types of Attacks 5- Trojans, viruses and worms Viruses: These are any programs installed without the user knowing about them. They can do harmful things or just annoying things.

Types of Attacks 5- Trojans, viruses and worms Worms: These are programs that can travel across the network from one computer to another. Worms make multiple copies of themselves and spread throughout a network. Worms can exploit operating system and software weaknesses and perform harmful actions.

5- Trojans, viruses and worms Types of Attacks 5- Trojans, viruses and worms Search for the best software that can protect your computer from Trojans, viruses and worms.

Types of Attacks Search for the best software that can protect your computer from Trojans, viruses and worms.

Network Security Tools 1.Operating system and applications 2.Firewalls 3. Antivirus 4. Content Filtering 5.Intrusion Detection Systems Search for new tools that protect your home network from hackers

Types of Attacks https://www.avast.com

Types of Attacks