A Network Security Overview Thomas Kernes November 1, 2000.

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Computer Security Workshops Security Introduction, Central Principles and Concepts.
CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
1 An Overview of Computer Security computer security.
Network Insecurity: challenging conventional wisdom Terry Gray UW Computing & Communications 10 October 2000.
Network Security Overview Tales from the trenches.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Computer Security Fundamentals
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
NETWORK SECURITY.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
A First Course in Information Security
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Module 11: Designing Security for Network Perimeters.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Computer Security By Duncan Hall.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
1 NES554: Computer Networks Defense Course Overview.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Securing Interconnect Networks By: Bryan Roberts.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Information and documentation media systems.
CSE 331: Introduction to Networks and Security
Answer the questions to reveal the blocks and guess the picture.
Type Topic in here! Created by Educational Technology Network
Columbus State University
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to the course
السلوك التنظيمى المعاصر
Introduction to Systems Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
Information Assurance & Network Security Certificate
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
The Computer as a Medium for Sharing Knowledge
Type Topic in here! Created by Educational Technology Network
Type Topic in here! Created by Educational Technology Network
Type Topic in here! Created by Educational Technology Network
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Type Topic in here! Created by Educational Technology Network
Type Topic in here! Created by Educational Technology Network
Type Topic in here! Created by Educational Technology Network
Type Topic in here! Created by Educational Technology Network
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

A Network Security Overview Thomas Kernes November 1, 2000

Abstract: With the advent and mass utilization of computers and networks in today's business world, network security has become a very large and important topic of discussion. Whether it is firewalls to keep people out of your network, cryptography to scramble important data or user education to minimize the risk of an accidental security breach, security takes many forms. This presentation will cover some of the important aspects of network security and highlight some of the unseen problems that affect nearly all businesses.

What is Network Security? The ‘Network’ includes hardware, the interconnections and the information. Physical security vs network security Identification of threats

So how do we protect? Security models Protection prioritization Administrative policy Education Vigilance

How do we accomplish that? Available Tools Education Awareness Salesmanship

Tools - Cryptography VPN -remote access PGP - Dedicated Circuits -‘tunnels’ -IPSec

Tools - Web Security Firewalls -denial of services vs threats Remote Access Human Element -keeping info in is harder than keeping people out

Tools - Virus Protection Intruders Human Element

So Now What? All of the tools may not be the answer

Education Only one person has to ‘talk’ Social Engineering Kevin Mitnick Microsoft

Conclusion Security is a black art

References Network Security Essentials William Stallings, Prentice Hall, 2000 US Department of Defense Jim Christy, Special Investigator, USAF Cuckoo’s Egg - Clifford Stoll