Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network System Security - Task 2. Russell Johnston.

Similar presentations


Presentation on theme: "Network System Security - Task 2. Russell Johnston."— Presentation transcript:

1 Network System Security - Task 2. Russell Johnston.

2 Email Systems.  Secure MIME: Which stands for secure Multi-Purpose Internet Mail Extensions. It is known as a secure method of sending e-mail that uses the Rivest-Shamir- Adleman encryption system.  Spam: Spam is defined as unwanted and unneeded junk mail. Spam usually consists of advertising and it is sent to a large number of people through e- mail. Other purposes of spam can include phishing and spreading malware.  Hoaxing: Hoaxing is known as a type of scam that can be distributed in email form. Hoaxing is designed to deceive and defraud email recipients and the motivation behind it is usually financial.

3 Email and Wireless Systems.  Relay agents are known as a small program that relays DHCP/BOOTP messages between clients and servers on different subnets. Relay agents can be misused and can be dangerous as they are able to redirect users to certain dangerous sites which can be used to make the user input personal and financial information.  A site survey is known as an examination of a location or a place in order to obtain data or information. Secure information which can be required from a site survey can be the cost and required for a certain task to be completed. Site surveys are common with large-scale technology projects such as installing a new network or upgrading an old one

4 Wireless Systems.  Mac Association: This is where a system associates itself with a router. The router will log the computers MAC address in a table for later reference. A mac filter is used and it can either accept or reject, if a mac filter is enable then when a new computer connects to the router, it will check that the systems mac address to the mac table which is stored.  WPA/WEP: Wifi Protected Access (WPA) is known as a security standard for systems using a wireless Wi-Fi connection. It is known as an improved standard of WEP. It provides a more complex data encryption than WEP and it also has user authentication. WEP was originally designed to provide the same level of security as a wired LAN. But WEP was found not to be as secure as once thought and that is why WPA was created.  TKIP: TKIP is known as an encryption protocol for wireless LANs. It is designed and created to provide more secure encryption than the well-known weaker protocol Wired Equivalent Privacy, WEP also.

5 Networked Devices.  A router is a device that forwards data packets along networks and is connected to at least two networks. Security features include passwords and access control lists.  Switches are known as a high speed and intelligent devices that receives incoming data packets and redirects them to their destination on a LAN. To keep secure you can close unused ports, use passwords and permit certain mac addresses.

6 Networked devices and Transmission Media.  Wireless access point is a hardware device or a configured node on a LAN that allows wireless capable devices and wired networks to connect through a wireless standard.  Shielded cable provides much more security in comparison to unshielded cable as an attacker would be able to add a tapping device on that cable and gain access to the data which is going through that exact cable. Shielded cable provides an additional layer of protection.

7 Intrusion Detection Systems  Firewalls: There are two different types of firewall which include software and hardware. Hardware firewalls are built within the network devices and can shield every single device and are used by most home users who want to protect their system.  Virus Protection: Virus protection software is designed to prevent viruses, worms and Trojan horses from getting into your system as well as remove and delete any malicious software code that has already infected your system.  Spyware Protection: Spyware protection is known as a program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.

8 Intrusion Detection Systems  File Monitoring and Folder Monitoring: File monitoring is known as the process of ensuring that files have integrity. With folder monitoring software you are able to detect the changes which have occurred with folders and sub-folders.  Use of Honeypots: Honeypots are known as an Internet-attached server that acts as a type of trap, which baits in potential hackers.  Alarms: Alarm software can also be used within a system to prevent and detect hackers and unauthorised users from accessing your system by alarming the user.


Download ppt "Network System Security - Task 2. Russell Johnston."

Similar presentations


Ads by Google