Net301 LECTURE 11 11/23/2015 Lect13 NET301.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
CSA 223 network and web security Chapter one
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Week-13 (Lecture-1) Data Communication Hardware: 1)Coaxial cable: Widely installed for use in business and corporation Ethernet Used to install LANs. Consists.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
UNIT V Security Management of Information Technology.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Technical Implementation: Security Risks
Information Systems Security
Network security Vlasov Illia
Securing Information Systems
BUSINESS DRIVEN TECHNOLOGY
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Working at a Small-to-Medium Business or ISP – Chapter 8
(A CORPORATE NETWORK APPROACH)
Systems Security Keywords Protecting Systems
Secure Software Confidentiality Integrity Data Security Authentication
Computer Data Security & Privacy
Cyber Security By: Pratik Gandhi.
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Answer the questions to reveal the blocks and guess the picture.
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Security of a Local Area Network
Securing Information Systems
Security in Networking
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
NETWORK SECURITY.
Identity & Access Management
Operating Systems Security
INFORMATION SYSTEMS SECURITY and CONTROL
Encryption and Hacking
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
– Communication Technology in a Changing World
Intrusion Detection system
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Chapter Goals Discuss the CIA triad
Computer Security (Summary)
Introduction to Course
An overview over Botnets
Presentation transcript:

net301 LECTURE 11 11/23/2015 Lect13 NET301

The Problem of Network Security The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability: a security analyst need to close every vulnerability. 11/23/2015 Lect13 NET301

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources 11/23/2015 Lect13 NET301

Network security Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority 11/23/2015 Lect13 NET301

authenticating commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e., the password— this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g. an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan). 11/23/2015 Lect13 NET301

firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access 11/23/2015 Lect13 NET301

Anti-virus software help detect and inhibit the action of malware(harmful content such as computer worms or Trojans )being transmitted over the network. 11/23/2015 Lect13 NET301

Security management Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. 11/23/2015 Lect13 NET301

Types of Attacks Networks are subject to attacks from malicious sources. Attacks can be from two categories: "Passive" when a network intruder intercepts data traveling through the network "Active" in which an intruder initiates commands to disrupt the network's normal operation 11/23/2015 Lect13 NET301