SlideShare a Scribd company logo
1 of 19
General Introduction
Network Security
Scanning

10/23/13

1
Outline
1: Introduction to Network Security
2: basics of network
4: Network Structure
5: Data packets
6: Virtual Private Networks
7: Defending against Virus Attacks
8 Defending against Trojan Horses and Spyware
9: Computer-based Espionage and Terrorism

10/23/13

2
Introduction
The growth of the Internet has brought many
ways in which networks can be
compromised and data stolen.
Legislators are working to prevent identity
theft and ways to reduce the effects of
viruses and worms and others.

10/23/13

3
The Basics of a Network
• You need to understand the following:
– Basic network structure
– Data packets
– What does this mean for security?

10/23/13

4
10/23/13

5
Basic Network Structure
• The fundamental purpose of networks is
for communication
• Part of the network structure includes:
– NICs (network information card), hubs,
switches, routers, and firewalls

• Network architecture comprises the format
in which these devices are connected

10/23/13

6
Data Packets
• When a workstation wishes to send data, it
uses the client network software to enclose
the data in a 'packet' containing a 'header'
and a 'trailer'.
• The header and trailer contain information for
the destination computer. For example, the
header contains the address of the
destination computer.
• The exact form the packets take is determined
by the protocol the network uses.
10/23/13

7
Data Packets
• This is the package that holds the data
and transmission information
• Ultimately formatted in binary
• Information included in packets:
– Source and destination (IP Address)
information
– Packet size (in bytes) and type (e.g. Ethernet)
– Data and other header information
10/23/13

8
• When a data packet is put onto the network by a
workstation, each computer on the network
examines the packet to see who it is intended
for. The packet quickly dissipates if it is not
recognized, allowing other packets to be sent.
The rate at which packets can be sent is called
the 'bandwidth' (this has a somewhat different
meaning to how bandwidth is normally used).
As an example, a bandwidth of 10 Megabits per
second means that ten million individual 1s and
0s can pass through the network in one second.
10/23/13

9
What Does This Mean for Security?
• There are two points of attack:
– The data packet itself
– The devices that connect the network

• These are also the points of security
– Protect the data (encryption)
– Secure the network devices

10/23/13

10
Port scanning
• A port scanner is a handy tool that scans a
computer looking for active ports. With this utility,
a potential “hacker” can figure out what services
are available on a targeted computer from the
responses the port scanner receives.
• These tools scan large IP spaces and report on
the systems they encounter, the ports available,
and other information, such as OS types.
• The most popular port scanner is Network
Mapper (Nmap).
10/23/13

11
Nmap
Nmap (“Network Mapper”) is an open source
utility for network exploration or security
auditing. It was designed to rapidly scan large
networks, although it works fine against single
hosts. Nmap uses raw IP packets to determine
what hosts are available on the network, what
services (ports) they are offering, what operating
system (and OS version) they are running, what
type of packet filters/firewalls are in use, and
dozens of other characteristics. Nmap runs
10/23/13

12
Vulnerability Scanners
Tools available for scanning vulnerable systems.
Vulnerability scanners look for a specific
vulnerability or scan a system for all potential
vulnerabilities. Vulnerability tools are freely
available. The most popular and best-maintained
vulnerability scanner available, Nessus.

10/23/13

13
•

I have often heard that the best approach to
computer security is to use a layered approach.
Can you describe this approach and how an IDS
fits in?
The security model that will protect your organization
should be built upon the following layers:
1. Security policy of your organization
2. Host system security
3. Auditing
4. Router security
5. Firewalls
6. Intrusion detection systems
7. Incident response plan
10/23/13

14
Threats to Network Security
• Insecure Architectures
A misconfigured network is a primary entry point for
unauthorized users. Leaving a trust-based, open local
network vulnerable to the highly-insecure Internet
– Centralized Servers
– Broadcast Networks

10/23/13

15
Threats to Server Security

•Unused Services and Open Ports
•Unpatched Services

10/23/13

16
• Technical Controls
– Encryption
– Smart cards
– Network authentication
– Access control lists (ACLs)
– File integrity auditing software

10/23/13

17
Summary
• Approaches to securing your network:
– Proactive vs. reactive
– Perimeter: focus is on perimeter devices,
internal devices are still vulnerable
– Layered: focus includes both perimeter and
individual computers within the network
– Hybrid: combination of multiple security
paradigms
10/23/13

18
Thank you

10/23/13

19

More Related Content

What's hot

Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile ComputingNitin Ujgare
 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1Sujesh Lal
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1arjun0222
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computingaazeem689
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingFaindra Jabbar
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 

What's hot (19)

Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
Nomadic Computing
Nomadic ComputingNomadic Computing
Nomadic Computing
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computing
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Manika
ManikaManika
Manika
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer Networking
 
niceData com.
niceData com.niceData com.
niceData com.
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Viewers also liked

Incentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in IndiaIncentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in IndiaVinnir Enterprises
 
Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)I4MS_eu
 
Rpp kelas 4 2013
Rpp kelas 4 2013Rpp kelas 4 2013
Rpp kelas 4 2013yudiyunika
 
1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_port1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_portNauticgarraf
 
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)I4MS_eu
 
Francis Wray, Scapos, UK
Francis Wray, Scapos, UKFrancis Wray, Scapos, UK
Francis Wray, Scapos, UKI4MS_eu
 
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...I4MS_eu
 
Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)Afdal Anwar
 
Oscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ESOscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ESI4MS_eu
 
Prophetic leadership quality
Prophetic leadership qualityProphetic leadership quality
Prophetic leadership qualityIman Ali
 
historia de la tipografia
historia de la tipografiahistoria de la tipografia
historia de la tipografiaAndres Castillo
 
Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014I4MS_eu
 
Nikos Kexagias
Nikos KexagiasNikos Kexagias
Nikos KexagiasI4MS_eu
 
презентация решения Si 10.13
презентация решения Si 10.13презентация решения Si 10.13
презентация решения Si 10.13Alexey Korotaev
 
Carles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ESCarles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ESI4MS_eu
 
Rpp kelas 5 2013
Rpp kelas 5  2013Rpp kelas 5  2013
Rpp kelas 5 2013yudiyunika
 

Viewers also liked (18)

Incentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in IndiaIncentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in India
 
Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)
 
Rpp kelas 4 2013
Rpp kelas 4 2013Rpp kelas 4 2013
Rpp kelas 4 2013
 
1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_port1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_port
 
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
 
Matriks putta
Matriks puttaMatriks putta
Matriks putta
 
Francis Wray, Scapos, UK
Francis Wray, Scapos, UKFrancis Wray, Scapos, UK
Francis Wray, Scapos, UK
 
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
 
Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)
 
Oscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ESOscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ES
 
Prophetic leadership quality
Prophetic leadership qualityProphetic leadership quality
Prophetic leadership quality
 
historia de la tipografia
historia de la tipografiahistoria de la tipografia
historia de la tipografia
 
Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014
 
Andrés salazar
Andrés salazarAndrés salazar
Andrés salazar
 
Nikos Kexagias
Nikos KexagiasNikos Kexagias
Nikos Kexagias
 
презентация решения Si 10.13
презентация решения Si 10.13презентация решения Si 10.13
презентация решения Si 10.13
 
Carles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ESCarles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ES
 
Rpp kelas 5 2013
Rpp kelas 5  2013Rpp kelas 5  2013
Rpp kelas 5 2013
 

Similar to Securitych1

A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSKatie Robinson
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information SecurityRachel Phillips
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
CSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayCSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayRochelle Schear
 

Similar to Securitych1 (20)

Network security
Network securityNetwork security
Network security
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 
CY.pptx
CY.pptxCY.pptx
CY.pptx
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
G011123539
G011123539G011123539
G011123539
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
50120140501013
5012014050101350120140501013
50120140501013
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Modules1
Modules1Modules1
Modules1
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
CSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayCSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment Essay
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Securitych1

  • 2. Outline 1: Introduction to Network Security 2: basics of network 4: Network Structure 5: Data packets 6: Virtual Private Networks 7: Defending against Virus Attacks 8 Defending against Trojan Horses and Spyware 9: Computer-based Espionage and Terrorism 10/23/13 2
  • 3. Introduction The growth of the Internet has brought many ways in which networks can be compromised and data stolen. Legislators are working to prevent identity theft and ways to reduce the effects of viruses and worms and others. 10/23/13 3
  • 4. The Basics of a Network • You need to understand the following: – Basic network structure – Data packets – What does this mean for security? 10/23/13 4
  • 6. Basic Network Structure • The fundamental purpose of networks is for communication • Part of the network structure includes: – NICs (network information card), hubs, switches, routers, and firewalls • Network architecture comprises the format in which these devices are connected 10/23/13 6
  • 7. Data Packets • When a workstation wishes to send data, it uses the client network software to enclose the data in a 'packet' containing a 'header' and a 'trailer'. • The header and trailer contain information for the destination computer. For example, the header contains the address of the destination computer. • The exact form the packets take is determined by the protocol the network uses. 10/23/13 7
  • 8. Data Packets • This is the package that holds the data and transmission information • Ultimately formatted in binary • Information included in packets: – Source and destination (IP Address) information – Packet size (in bytes) and type (e.g. Ethernet) – Data and other header information 10/23/13 8
  • 9. • When a data packet is put onto the network by a workstation, each computer on the network examines the packet to see who it is intended for. The packet quickly dissipates if it is not recognized, allowing other packets to be sent. The rate at which packets can be sent is called the 'bandwidth' (this has a somewhat different meaning to how bandwidth is normally used). As an example, a bandwidth of 10 Megabits per second means that ten million individual 1s and 0s can pass through the network in one second. 10/23/13 9
  • 10. What Does This Mean for Security? • There are two points of attack: – The data packet itself – The devices that connect the network • These are also the points of security – Protect the data (encryption) – Secure the network devices 10/23/13 10
  • 11. Port scanning • A port scanner is a handy tool that scans a computer looking for active ports. With this utility, a potential “hacker” can figure out what services are available on a targeted computer from the responses the port scanner receives. • These tools scan large IP spaces and report on the systems they encounter, the ports available, and other information, such as OS types. • The most popular port scanner is Network Mapper (Nmap). 10/23/13 11
  • 12. Nmap Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs 10/23/13 12
  • 13. Vulnerability Scanners Tools available for scanning vulnerable systems. Vulnerability scanners look for a specific vulnerability or scan a system for all potential vulnerabilities. Vulnerability tools are freely available. The most popular and best-maintained vulnerability scanner available, Nessus. 10/23/13 13
  • 14. • I have often heard that the best approach to computer security is to use a layered approach. Can you describe this approach and how an IDS fits in? The security model that will protect your organization should be built upon the following layers: 1. Security policy of your organization 2. Host system security 3. Auditing 4. Router security 5. Firewalls 6. Intrusion detection systems 7. Incident response plan 10/23/13 14
  • 15. Threats to Network Security • Insecure Architectures A misconfigured network is a primary entry point for unauthorized users. Leaving a trust-based, open local network vulnerable to the highly-insecure Internet – Centralized Servers – Broadcast Networks 10/23/13 15
  • 16. Threats to Server Security •Unused Services and Open Ports •Unpatched Services 10/23/13 16
  • 17. • Technical Controls – Encryption – Smart cards – Network authentication – Access control lists (ACLs) – File integrity auditing software 10/23/13 17
  • 18. Summary • Approaches to securing your network: – Proactive vs. reactive – Perimeter: focus is on perimeter devices, internal devices are still vulnerable – Layered: focus includes both perimeter and individual computers within the network – Hybrid: combination of multiple security paradigms 10/23/13 18

Editor's Notes

  1. Securing the data and the network devices are covered in later chapters. This is the basic purpose of this book, to secure the data and the network devices that allow communication between and among organizations.