Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Securing a Wireless Network
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
eScan Total Security Suite with Cloud Security
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Unit 19 INTERNET SECURITY
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Android Mobile Security Krystal Salerno. Introductions.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Windows Administration How to protect your computer.
Securing a Wireless Home Network BY: ARGA PRIBADI.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Port Knocking Benjamin DiYanni.
What is a Firewall?.
Instructor Materials Chapter 7 Network Security
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Lesson Objectives Aims You should be able to:
Cyber Security By: Pratik Gandhi.
Answer the questions to reveal the blocks and guess the picture.
Security in Networking
Risk of the Internet At Home
Digital Pacman: Firewall Edition
Information Security Session October 24, 2005
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Network hardening Chapter 14.
FIREWALL.
Test 3 review FTP & Cybersecurity
Marcial Quinones-Cardona
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Guanjong High School Group 2

Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect their own device to the network. By having simple but secure access to the closet, this could easily be avoided. Plan: o Door with key lock o Security camera

Network Attacks from outside users Have an unsecure network could cause attacks from the outside world. Implementing security measures would increase the safety to the network. Plan: o Add Whitelist o Add Firewall protections

Bring your own device attack/LAN Connected Computer Infection ●Allowing people to download/install software onto a school computer would increase the vulnerability of the network. ●Adding accounts and restrictions on school computers would boost the networks security. ●Plan: ○Student Accounts (Student Accountability) ○Teacher/Administrator Password ○Infection Detection (Virus/Malware Scanner)

Browser Based Attacks Different levels of security are needed to ensure that malicious programs are not downloaded Plan: Level 1: Teacher Accounts Level 2: Student Accounts Level 3: Guest Accounts

Isolation Isolate an infected computer o Block IP Based on high levels of or suspicious outgoing traffic Prevents viruses from spreading to other computers