CISCO NETWORKING ACADEMY Chabot College ELEC 99.05 Internet Security Introduction.

Slides:



Advertisements
Similar presentations
3 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Getting Connected  First,you need to subscribe to an Internet service provider.
Advertisements

Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Chapter 6: The Internet1 The Internet Chapter 6. Chapter 6: The Internet2 Internet Technology Background Internet Infrastructure Internet Protocols, Addresses,
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
High Speed Internet Access for the Home Presented by: David F. Soll Vice President of Advanced Technology.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Figure 6-1 Growth pattern of Internet hosts MillionMillionMillionMillion.
Unit 4, Lesson 11 How Data Travels the Internet
CISCO NETWORKING ACADEMY Chabot College ELEC Wide Area Network Introduction.
Internet Connection Sharing Ben Ramig Erik Tierney.
CISCO NETWORKING ACADEMY Chabot College ELEC Hyperterminal Access to Routers.
The Internet for SME’s What is ADSL? Asymmetric Digital Subscriber Line (ADSL) is high- speed digital connectivity over the existing, copper (or analogue)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Introduction to the Internet Present by: Selvakumar (Tech Lead, Senior Software Engineer, at ADT) & Part time Lecturer at Info Tech Sys
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Copyright 2007 Jim Martin1 Broadband Internet Access Dr. Jim Martin
Chabot College ELEC Ports (Layer 4).
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Honeypot and Intrusion Detection System
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Week Four Rouda’s Sections.  LAN - Local Area Network ◦ small area (e.g. a building) ◦ small number of machines  WAN - Wide Area Network ◦ large area.
INFORMATION SECURITY UNIX & DB2. Introduction THE OBJECTIVE IS TO DESIGN SECURITY MEASURES FOR A MILITARY SYSTEM SYSTEM RUNNING A DB2 SERVER ON UNIX FOCUS.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
CHABOT COLLEGE CISCO NETWORKING ACADEMY Chabot College ISDN Semester 4, Chapter 5.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
TOPIC 3 DATA TRANSMISSION AND NETWORKING MEDIA. INTERNET SERVICE PROVIDER (ISP) also known as Internet Access Provider (IAP) It is a company that offers.
Internet Infrastructure Min Ding Smeal College of Business Administration Pennsylvania State University.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
NETWORK DEVICES RONALD SHERGA OCTOBER 13, 2015 LTEC 4550.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Internet Service Providers and types of internet connections
Getting Connected to NGS while on the Road…
Lab #2 NET332 By Asma AlOsaimi.
Date: April. 13, Monday Evening.
Dynamic Domain Name System
Networking W.S. Hwang KUAS EE..
CONNECTING TO THE INTERNET
Pertemuan 19 Introduction to TCP/IP
Introduction to Computers
Introduction to Networking
Chapter 7 Connecting to the Internet
Introduction An introduction to the software and organization of the Internet Lab.
Routing and Switching Essentials v6.0
Internet Security Submitted to Professor Mort Anvari
PPPoE Internet Point to Point Protocol over Ethernet
Getting Connected to NGS while on the Road…
COMPUTER NETWORKS CS610 Lecture-38 Hammad Khalid Khan.
Internet Connection Sharing
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

CISCO NETWORKING ACADEMY Chabot College ELEC Internet Security Introduction

CISCO NETWORKING ACADEMY Internet Security TCP/IP and the internet were designed by professionals with a common culture and cooperative goals. Today they are used by a wide range of persons with varying and sometimes malicious goals. The technology of TCP/IP does not assure user security. There are many points at which TCP/IP security can be compromised.

CISCO NETWORKING ACADEMY Internet Security Security intrusions over the internet are common. The following slide shows 48 hours of intrusion attempts against a DSL-connected PC… –Note that the probes come from all over the world, including Romania. –Most of these attempts are from “script kiddies” running a program on a PC to grind through a range of IP addresses.

CISCO NETWORKING ACADEMY Probes Against DSL-Connected Machine

CISCO NETWORKING ACADEMY Security Strategies Use a NAT router to connect to DSL or cable modem. Use a software firewall for dial-up, DSL or cable modem. –(e.g. Zone Alarm, from - free) Read Steve Gibson’s excellent Shields-UP site and follow his configuration advice. (free)

CISCO NETWORKING ACADEMY Shields UP Key ideas from Shields UP: –As delivered, Windows is not secure when connected to the internet. –The key problems can be fixed by a free reconfiguration. –Free software firewalls are recommended.

CISCO NETWORKING ACADEMY Shields UP Here’s how windows protocol bindings are delivered: Layer 1&2 Layer 3 Higher Layers

CISCO NETWORKING ACADEMY Shields UP Binding these Microsoft network services to TCP/IP creates security vulnerabilities! Problem Bindings

CISCO NETWORKING ACADEMY Shields UP Here are the bindings needed for access to the internet:

CISCO NETWORKING ACADEMY Shields UP The excellent Shields Up site tells you how to do it! Bonus Credit Assignment - fix your home PC!