Presentation is loading. Please wait.

Presentation is loading. Please wait.

Business Data Communications, Fourth Edition Chapter 10: Network Security.

Similar presentations

Presentation on theme: "Business Data Communications, Fourth Edition Chapter 10: Network Security."— Presentation transcript:

1 Business Data Communications, Fourth Edition Chapter 10: Network Security

2 Learning Objectives Describe the security duties of a network administrator List the types of physical security used on a computer network Describe a device that can be used for physical security List three types of software security Describe two types of encryption Chapter 10: Network Security2

3 Learning Objectives List three encryption standards Describe digital signatures and digital certificates Define the Secure Sockets Layer List the differences between a virus and a worm Describe firewalls Chapter 10: Network Security3

4 Introduction Security is extremely important in today’s network environment Hackers can be a serious problem for both corporate and private computers Physical and software security are used Network administrator develops and implements security systems Chapter 10: Network Security4

5 Physical Security Can use a locked room for computers Remote clients not as easily locked up Today’s open environment with PCs everywhere presents a problem Handhelds and laptops connected to corporate networks are of particular concern Chapter 10: Network Security5

6 Physical Security Measures to Control Physical Access to Networks –Fingerprint device –Video camera –Movement detection devices –Medium Wires are more secure than wireless Fiber optic most secure of wired systems –Encryption used to encode data –Dial-in access is a problem Chapter 10: Network Security6

7 Physical Security Data/Network Security Equipment –Fingerprint/voiceprint devices to prevent access –Callback unit Blocks unauthorized network access Used with dial-up lines Computer calls user back at predetermined number Will not work with mobile computer that uses different phone number Chapter 10: Network Security7

8 Software Security IDs and Passwords –Assigned to users, must be protected –Need to use password that is not obvious –Should be changed periodically Some systems force users to change them –Network software monitors use and reports on attempted unauthorized access –Applications can require IDs as well Chapter 10: Network Security8

9 Software Security Encryption –Scrambling data before transmission –Uses encryption key –Plaintext versus cipher text Chapter 10: Network Security9

10 Software Security Encryption –Symmetric key encryption One key used by both ends of transmission Data Encryption Standard (DES) (56 bits) Triple DES – more secure (112 bits) Blowfish (32 to 448 bits) International Data Encryption Algorithm (128 bit) Clipper Chip Chapter 10: Network Security10

11 Chapter 10: Network Security11

12 Software Security Encryption –Public Key Encryption Two keys are used (public & private keys) RSA is most common form Pretty Good Privacy (shareware) –Elliptic Curve Cryptography (ECC) Uses logarithm to create key Chapter 10: Network Security12

13 Digital Signatures Used for verification of files transmitted over a network Impossible to counterfeit Digital Certification –E-Signature – Actual handwritten signature attached to a document Makes a document legal Chapter 10: Network Security13

14 Chapter 10: Network Security14

15 Chapter 10: Network Security15

16 Digital Signatures Digital Certification –Digital Certificates – Verifies a persons identity using multiple forms of identification Combined with digital signature –Wireless networks use encryption, digital signatures and digital certificates to secure data Chapter 10: Network Security16

17 Chapter 10: Network Security17

18 Secure Sockets Layer (SSL) Allows security of credit card numbers for e-commerce URL starts with https:// Software is on the server and client PC (included with most browsers now) Many sites also encrypt information before it is sent over the Internet Chapter 10: Network Security18

19 Chapter 10: Network Security19

20 Security Issues Forms of Computer Attacks –Virus –Worm Internet Worm – 1988 –Antivirus software needed, with updates –Denial of Service (DoS) attacks Chapter 10: Network Security20

21 Chapter 10: Network Security21

22 Security Issues Firewalls –Software program –Determines if user/software can access a system –Used in corporate networks and home computers –Trojan Horse – hidden program that executes by a trigger Chapter 10: Network Security22

23 Chapter 10: Network Security23

24 Chapter 10: Network Security24

25 Security Issues Firewalls –Packet-level firewall Determines if packets should pass to the network IP Spoofing – intruder appears to be from a valid address on the network –Application-level firewall Prevents unauthorized access to applications –Proxy Server Creates artificial addresses so to the outside, it looks like only one server exists on the corporate network, rather than several Chapter 10: Network Security25

26 Chapter 10: Network Security26

27 Chapter 10: Network Security27

28 Summary Network security is high priority issue Physical security is one level of defense Software security is used extensively –Several types of encryption are used Digital signatures and digital certificates are used to verify a user’s identity Chapter 10: Network Security28

29 Summary Viruses and worms are a threat Denial of service attacks have become a problem Firewalls protect a network from outside access Chapter 10: Network Security29

30 Chapter 10 Complete

Download ppt "Business Data Communications, Fourth Edition Chapter 10: Network Security."

Similar presentations

Ads by Google