Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Other useful information about the presentation ECE 6612 Kyle Koza.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Threats To A Computer Network
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Securing Information Systems
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Information Security Phishing Update CTC
BUSINESS B1 Information Security.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
Module 11: Designing Security for Network Perimeters.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Technical Implementation: Security Risks
An Introduction to Phishing and Viruses
Instructor Materials Chapter 7 Network Security
ISYM 540 Current Topics in Information System Management
Secure Software Confidentiality Integrity Data Security Authentication
Computer Data Security & Privacy
I S P S loss Prevention.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Security in Networking
Robert Leonard Information Security Manager Hamilton
Malware, Phishing and Network Policies
Computer Security.
Computer Security By: Muhammed Anwar.
Test 3 review FTP & Cybersecurity
Wireless Spoofing Attacks on Mobile Devices
Cybersecurity Simplified: Phishing
Presentation transcript:

Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.

Everyone & Everything is Connected Radio – 35 years to reach 50 million TV – 15 years to reach 50 million W.W.W. – 5 years to reach 50 million

Risky Business Johns Hopkins Network is appr. 75,000 nodes Approximately 20% are unsecure Approximately 50,000 hits on our top 10 IDS rules

Hackers/Crackers/Script Kiddies ? Script kiddies Less skilled than traditional hackers. These “skiddies” often use tools developed by others without completely understanding the basics. Cracker Computer-savvy programmer creates attack software Hacker A hacker is a person who breaks into computers and computer networks for profit, as a protest or for the challege

Social Engineering I need a password reset. What is the password set to? This is John, the System Admin. What is your password? ABC Bank has noticed a problem with your account… I have come to repair your machine… and have some software patches

Phishing = Fake ! ABC Bank Your account has been compromised. We need you to click the following link and verify your password, pin number and social security number Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity Victim My account was what?!

Pharming = Fake Webpages Pharming Like phishing, malicious users will create web pages that look exactly the same as legitimate ones. The only difference is where your data is going!

Worms Network worms are self-replicating malware which uses the computer network to send copies of itself to other computers Some worms come in the form of a phishing . When the victim clicks the link inside, it begins to infect the victim machine. Then sends the link to all the accounts in the users address book

How are we protecting you? Defense in Depth Border Router Perimeter firewall Internal firewall Intrusion Detection System Policies & Procedures & Audits Authentication Access Controls

Firewalls The good, the bad & the ugly… Filter The bad & the ugly The Good Route Filter: Verifies sources and destination of IP addresses Packet Filter: Scans headers of packets and discards if ruleset failed (e.g., Firewall or router) Content Filter: Scans contents of packets and discards if ruleset failed (e.g., Intrusion Prevention System or firewall)

Intrusion Detection/Prevention Systems Network IDS=NIDS Examines packets for attacks Can find worms, viruses, org-defined attacks Warns administrator of attack

Questions

How to contact us ?