Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing Interconnect Networks By: Bryan Roberts.

Similar presentations


Presentation on theme: "Securing Interconnect Networks By: Bryan Roberts."— Presentation transcript:

1 Securing Interconnect Networks By: Bryan Roberts

2 What is an Interconnected Network?  Two or more networks or network segments  Connected among private, public, commercial, industrial or governmental levels  Use internet protocol  3 different types

3 3 Types of Internetworks  Intranet Set of networks using internet protocol and IP – based tools Single administrative entity Closed to specific users Most commonly internal network of an organization At least one web server to provide information

4 3 Types of Internetworks  Extranet Network or internetwork limited to a single organization Limited connections to the network Cannot consist of single LAN Must have at least one connection with an external network

5 3 Types of Internetworks  Internet Most popular Consists of connections to all types of networks Successor of Advanced Research Projects Agency Network (ARPANET) developed by U.S. governmentAdvanced Research Projects Agency Network Communications backbone of World Wide Web

6 Basic Hardware Components of Networks  Network Interface Card (NIC) Allows computers to communicate over a network Allows users to connect to other users through cable or wireless connections  Repeaters Electronic device that receives a signal and retransmits it at a higher power level Most common is twisted pair which allows up to 100 meters away

7 Basic Hardware Components of Networks  Hubs Contains multiple ports of connectivity When a packet arrives at one port it copies it to all other ports for transmission Destination address does not change to a broadcast address Copies data to all nodes connected to hub

8 Basic Hardware Components of Networks  Others Bridges  Connects multiple segments at data link layer Switches  Forwards and filters datagrams between ports based on MAC address in packets Routers  Device that forwards data packets between networks

9 Why is securing important?  Motivation is driven by contagious threats of internet viruses and worms  Breaching becomes an internal threat to the network if the system is cracked  CSI and FBI report 13 different types of attacks Range from website defacement to financial fraud to internet worms and viruses

10 Types of protection  Anti-virus software Norton Macafee  Firewalls  Virtual Private Network (VPN), Secure Socket Layer (SSL) and IPSEC Protect against the loss of confidential data

11 Securing Information Systems  These requirements must be satisfied: Systems must be interconnected Threat must be capable of breaching a system and then being able to attack others One system breach affects another system breach, causing a chain effect

12 3 Ways to deal with threats  Protection Primary defense, especially against unknown attackers who may not even be traceable  Detection Useful in situations where identity of attackers can be established and legal measures can be taken against them  Reaction Time taken to restore the system back to normal

13 Cryptographic Measures  Do not protect against availability loss  Do not stop the attackers from breaching the system  Render information unusable unless attackers decrypt the data

14 Firms  Use both protection countermeasures Firewalls Cryptographic countermeasures  SSL

15 Accessing Encrypted Confidential Documents  One must perform the following: Breach the information system and obtain access to the document Break the cryptographic security protecting the document to access its contents

16 Using protection and cryptographic countermeasures  Used in many enterprises  Secure information assets against confidentiality loss  Protection measures Protect against breaching  Cryptographic measures Protect unauthorized users from accessing sensitive data

17 Conclusion  Types used to secure Anti-virus software Firewalls VPN’s, SSL, and IPSEC  Importance It is important to secure your data in an interconnected network Can cause huge failure if system is breached Hackers and crackers can destroy a whole system if they gain access to information


Download ppt "Securing Interconnect Networks By: Bryan Roberts."

Similar presentations


Ads by Google