Computer Networks. Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception.

Slides:



Advertisements
Similar presentations
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Advertisements

Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 3: Where are programs and data stored?. What kinds of memory are there? The main memory The main memory –ROM: Read-only memory Store permanently.
Computer Networks IGCSE ICT Section 4.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Internet Basics مهندس / محمد العنزي
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Chapter X When can I consider my personal data secure?
THE INTERNET Chapter 13. Internet- Interconnection and Networks “the Net” Computers have played a significant role in our everyday life Growth in popularity.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Communication, Networks, The internet and the Worldwide Web.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
A global, public network of computer networks. Computer Network A collection of computing devices connected to share resources such as: Files Software.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
W elcome to our Presentation. Presentation Topic Virus.
science/internet-intro
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
How Does the Internet Work? Chapter 11. What is the Internet? The Internet involves millions of computers, connected in complex ways to a maze of local.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
Chapter 11 How Does the Internet Work?. How Important is this Chapter to Understanding How to Use a Computer? 7 or 8 on a scale of 1 to 10.
Using MIS 2e Chapter 6 Appendix
The Internet.
Information Technology Ms. Abeer Helwa
Web Servers / Deployment
A worldwide system of interconnected computer networks.
AbbottLink™ - IP Address Overview
When can I consider my personal data secure?
Presentation transcript:

Computer Networks

Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception /monitoring of wireless traffic: The network traffic across a WLAN is intercepted and monitored without authorization. Mis-configuration: Many access points ship in an unsecured configuration

WLAN Security WEP: Wired Equivalent Privacy WPA: Wi-Fi Protected Access WPA2: Best protection for home WLAN.

WEP: Wired Equivalent Privacy Purpose: – Protect wireless network from eavesdropping. – Prevent unauthorized access to the network How Does It Work – A secret key between laptop and access point – The secret key to encrypt packets Length of Key – 64-bit encryption – 128-bit encryption

WPA: Wi-Fi Protected Access Two types of WPA – WPA-PSK (WPA Personal) - Home &Small Offices – WPA-RADIUS (WPA Enterprise) – Large Organizations WPA-PSK: Pre-Shared Key – Extra-strong encryption – Encryption keys are automatically changed after a specified period of time after a specified number of packets Implements a subset of IEEE i.

WPA2: Wi-Fi Protected Access WPA2: Best protection for home WLAN. – Fully compatible with IEEE i security standard. – Stronger encryption protocol – Not all wireless cards and access points support – WPA2 certification is mandatory for all new devices wishing to be Wi-Fi certified.

The Internet

What is the Internet? The Internet involves millions of computers, connected in complex ways to a maze of local and regional networks

Origins of the Internet 1969 Department of Defense established experimental network connecting 4 research computers (UCLA, Stanford Research Institute (SRI), Barbara and U. of Utah. Called ARPANET 1980s National Science Foundation involved – Only scientific, research and academic institutions (no commercial traffic)

Other Developments… connectivity thru CompuServe and MCI Mail 1991 – move towards private sector – National Access Points (NAPs) – Internet Service Providers (ISPs) Communication coordinated through national and international organizations (standards)

Who Owns the Internet? No one company or country can be considered as owner of Internet – Ownership shared among various entities Coordination: – Internet Society (ISOC) – Internet Engineering Task Force (IETF) – Internet Architecture Board (IAB) In the US – – ICANN – Internet names and port numbers (Internet Corporation for Assigned Names and Numbers)

Cost ($$$$)… Revenue is required to offset expenses – Servers, routers, communication lines, etc. Costs must be covered by users – Companies, organizations and individuals – AOL – subscribers charges monthly fee

Internet Address  Domain Name  Logical name for computing system  Top-Level Domain (suffix)  ICANN  IP Number  32-bit address (4 part decimal #)  ARIN ( American Registry for Internet Numbers )/ RIPE / APNIC 

Internet Address… Ethernet Address – 48-bit address built into machine or Ethernet board – Refers to specific board in a local computer

Addressing Domain Name Server (local) Network Information Server (wider area) – Maintain databases with domain names and IP numbers in binary format Domain Name  IP Number(logical)  Ethernet Address (physical)

Laptops Static IP address – Specified manually and entered into network tables Dynamic IP address – Dynamic Host Configuration Protocol (DHCP) – Ask network for an IP address when you turn it on (from a pool of available addresses) IP address changes each time computer is used

Web Browsers Internet Explorer, Mozilla, Netscape Navigator, Firefox System of communicating Web documents – Hypertext Transfer Protocol (HTTP) Formatting instructions called: – HTML (Hypertext Markup Language)

How info is transmitted? Uniform Resource Locator (URL) Hypertext Transfer Protocol Domain name of the Web server Directory path Web page

What info is transmitted? Each time you access the Web, the browser sends the following to the Web server – The IP address of your machine Often it can identify your town or ISP – The web server’s IP address – The OS you use on your machine – The browser you use Goto to see how much info is sent to the Web server

What are Cookies? Have you ever gone to a website that seemed to remember you? Websites use cookies to store info about you on your own computer – When you visit such a website, it stores info as cookies (that appear as files) on your computer – Next you visit the same website, your browser sends over all the cookies stored by that website What info is stored in cookies? – In theory, anything the website wants to – Normally, it is about how you used the website – A website could store your id, password, etc in cookies if it has that info.

What are Cookies? The positive side of cookies – A Web server can use cookies to streamline and personalize your interactions with it – A browser is supposed to send cookies only to the Web server who stored them. The negative side of cookies – Companies may use cookies to store info for other purposes without your permission – There are ways for a Web server to get cookies that were stored by other Web servers.

What defenses against Cookies For the website you visit, especially, those websites you need to register, check: – How will the company use the info you supply? – Will the company share info with others? – Can you limit access of other to this info? – What protections are in place to keep this info?

What defenses against Cookies If you use a computer at work or school, cookies would be stored on school or company’s computer: – System administrators or managers may read your cookies files View your organization’s privacy policy – Technicians may inadvertently access your cookies, when your computer was sent for repair, for example. – Best way to protect yourself, delete cookies. Almost every browser has a function you can use to delete cookies.

How secure is info during transmission When you use the Internet, all data you put on the network is visible to computers on the same Ethernet, as discussed in the Network chapter. When your data need to be passed from one segment to another segment of the network, the intermediate computers can read your data. Thus, info is not secure at all when transmitted on the Internet.

How secure is info during transmission One way to protect yourself is encrypt info that you want to be confidential – When data is encrypted, it can still be copied or intercepted by other computers, however, they would not know what it means. – When a good encryption is used, it may take years, decades to break the code When shopping (or passing private info) on the Web, make sure the website uses HTTPS protocol. – HTTPS: Secure HTTP, which asks the browser to encrypt the data before it is transmitted and the server decrypts data upon receiving.

Security

Data Availability Data in memory is volatile. Data in storage is non-volatile so it is always available – As long as it isn’t trashed accidentally or deliberately. So, when using software (Word, etc.) save often.

Data Availability BACK UP IMPORTANT DATA – Often Specifically what should YOU do with your data. – At least once per semester, back up your entire computer if it is at all convenient. I use a removable hard disk They are currently cheap

Data Security Secure data is data that is difficult for OTHERS to access. There are two basic methods of securing data: – Password systems – Encryption

Password Systems Username and Password – Good systems will not tell you which one is wrong if one of them is. Usernames are often given to you so you have no choice as to what to use. Most people choose their own passwords.

Choosing Passwords Make it long. Use both letters and digits, maybe even special symbols Use upper and lower case. Example: dsitBtitw5 (dr sidbury is the best teacher in the world 5) Example: P=2*(L+w)

Cryptography/Encryption Ebub jt fodpefe tp uibu ju epfto’u mppl opsnbm. Data is encoded so that it doesn’t look normal.

What are viruses? Unwanted and unanticipated programs May damage a computer or degrade its performance Viruses may appear: – As an attachment – In another program – In user data files (MS Word Macros) – On disk in a place that is routinely activated. – A virus cannot be spread without a human action Worms – Similar to viruses – Have capability to travel without any human action – e.g., send a copy of itself to everyone in your address book, then send to everyone in the receiver’s addr book

How to detect viruses? Anti-virus programs compare each file against known viruses A computer may be set up in such a way that no disk files can be accessed until virus scanning has been completed. A new virus may not be known by the anti-virus program until the virus information is available to the anti-virus program Be proactive in getting information of new viruses for the anti-virus program

How to protect yourself? Be sure anti-virus software is running on your computer and keep the virus info up to date Do not execute (open) any program (file) downloaded from the Internet without first having it scanned for viruses. Be cautious before allowing your Web browser to run programs behind the scenes Save all your attachments to hard disk and scan them for viruses before open them Do not run any macro in Word documents or Excel spreadsheets unless you know they are reliable Install and configure firewalls if your computer is connected to the Web.

Spyware Keyboard Sniffers Wire tapping Trojan Horses Packet Sniffer

Firewalls A firewall controls/monitors traffic from one system to another one. – The systems may be individual computers or networks. A firewall can block unauthorized access to your computer while permitting authorized communications Most computers which you buy have a built in firewall. You should configure them or you will not be able to use software correctly.