IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Network Diagram with International Standard
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
NW Security and Firewalls Network Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 19 INTERNET SECURITY
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Jamel Callands Austin Chaet Carson Gallimore. Downloading
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Small Business Security Keith Slagle April 24, 2007.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Page 1 Internet POP Design Lecture 4B Hassan Shuja 03/28/2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Instructor Materials Chapter 1: Explore the Network
Top 5 Open Source Firewall Software for Linux User
Instructor Materials Chapter 7 Network Security
Firewall Configuration and Administration
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Chapter 1: Explore the Network
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
Securing Information Systems
Chapter 26: Network Security
Forensics Week 12.
Firewalls Purpose of a Firewall Characteristic of a firewall
Networking for Home and Small Businesses – Chapter 8
FIREWALL.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Implementing Firewalls
Presentation transcript:

IT security Are you protected against hackers?

Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes are connected to the Internet – they are the potential target  New customers => new hackers

Why are we in danger? /2  Anyone can connect to the Internet (Internet Cafes, Hot spots, etc.)  Downloadable hacker tools, articles  New worms and viruses weekly

Probable attack types  Attacks against web services  Spyware, adware  Spam  DoS (Denial of Service)  Attacks in the application layer  Portscan  etc.

Security rules  The network must be divided into security zones  Each zone has own security rules  Between these zones there must be a device, which is usually the firewall

Firewall architectures There are typically three basic firewall architectures:  Basic Border  Basic with DMZ Network  Dual Firewalls with DMZ Network

Demilitarized Zone (DMZ)  Demilitarized Zone  It is a firewall configuration for securing local area networks (LANs)  In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.

Demilitarized Zone (DMZ) /2  One or more computers also run outside the firewall, in the DMZ  Those computers on the outside intercept traffic and broker requests for the rest of the LAN, adding an extra layer of protection for computers behind the firewall.

Basic border firewall  A single-layer solution  Every firewall function on one device  Simple  Cheap  The least secure solution

Basic firewall with DMZ Network  We have server(s) providing services to the outside network  The server is the most endangered  We put it into a new network, which is the DMZ  Better security and reliability

Dual firewall with DMZ Network  Two firewalls:  Outer  Inner  The network is divided into 3 segments:  Outer network  DMZ  LAN  Different architecture of the firewalls is practical – it’s more safe

What can you do?  Use personal firewall  It is a software running on the PC  Protection for home networks  Should be used on every computer  Cheap or free solution  Easy to configure and use  It has limited capabilities