IP Addresses & Ports IP Addresses – identify a device on a network

Slides:



Advertisements
Similar presentations
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Threats to I.T Internet security By Cameron Mundy.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Port Forwarding NeCrOs © 2008 Linksys® Routers Edition 1.What is Port Forwarding? 2.How to Port Forward? 3.How to Port Trigger? (Alternative Way) 4.How.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
CIS 450 – Network Security Chapter 3 – Information Gathering.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
INTERNET: The Good, The Bad and The Ugly
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
Internet Security and Your Computer Welcome to Boot Camp.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
A Network Security -Firewall Bruce Turin.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Case study: Data Provider setup Sergey Sukhonosov National Oceanographic Data Centre, Russia Expert training on the Ocean Data Portal technology, Buenos.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
3.6 Fundamentals of cyber security
FIREWALL configuration in linux
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Network security threats
Cyber Security By: Pratik Gandhi.
Cyber Security Awareness Workshop
Firewalls.
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
LINKSYS SUPPORT NUMBER. Linksys Support Number for upgrading firewall, Installation and Repair and Connecting Device and Fix Error Messages by Linksys.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Information Technology Services Education and Awareness Team
Spear Phishing Ways to Minimize its Risks
Digital Pacman: Firewall Edition
Cases in Subnetting.
Information Security Session October 24, 2005
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Firewalls Routers, Switches, Hubs VPNs
Information Technology Services Education and Awareness Team
WJEC GCSE Computer Science
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

IP Addresses & Ports IP Addresses – identify a device on a network assigned by router when device connects Ports – identify a service running on your device

Firewalls Monitor and control attempts to access to your device over the network Should allow the appropriate requests, block unexpected/potentially malicious requests

Simple Firewall Setup sudo apt install ufw sudo ufw enable sudo ufw deny 4711

How do hacks happen?

How do hacks happen? Hackers find and exploit vulnerabilities in… The physical network Firewall configuration Software (often outdated)

But don’t forget the least secure part of a computer system… Us!

Social Engineering Phishing Viruses Tricking people into giving up their passwords / security answers over the phone / by email

Hacking is fun… but be careful!