Network Security

15
Network Security By: Tyrone Turner

Transcript of Network Security

Page 1: Network Security

Network Security

By: Tyrone Turner

Page 2: Network Security

What is Network Security?

• JUST THAT, IT IS SECURING THE NETWORK!

• It follows the four types of information assurance.

Page 3: Network Security

Types of Information Assurance

• Confidentiality• Integrity• Authentication• Availability

Page 4: Network Security

How do you secure your network?

• Firewalls• IDS/IPS• DMZ• Honey pots• Proxy servers• Protocol analyzers

Page 5: Network Security

Firewalls

• Block traffic• Controls and monitors access between

networks

Page 6: Network Security

Firewalls cont’d

• Offers 5 service and security features– Packet filtering– Stateful inspection– Access and authentication– Application layer filtering– Network Address Translation (NAT)

Page 7: Network Security

IDS/IPS

• IDS (Intrusion Detection Systems)– Used to see if someone is on your network

• IPS (Intrusion Prevention Systems)– Attempts to stop an unauthorized user before they

get in

Page 8: Network Security

DMZ

• DMZ (Demilitarized Zone)– Light protection between the internet and firewall

Page 9: Network Security

Honey pots

• Separate server or service that is used to attract hackers to attack it

Page 10: Network Security

Proxy servers

• These are network servers that accept and forwards from the clients and from servers

Page 11: Network Security

Protocol analyzers

• These applications monitor everything down to the frame.

• It can give you the information on Layers 7,5,3,2

Page 12: Network Security

What threatens a network?• Viruses -Attacks that particular system being used and there are 8 types:

– Boot Sector Viruses- infects the boot sector or partition table of the disk.– Companion Viruses- disguises itself as a legitimate using a legitimate program name but a different

extension – File infector Viruses- infects files that generally has the extension .com or .exe– Macro Viruses- attacks programs like excel and word– Memory Resident Viruses- when a system is infected by a virus that stays resident in the systems

memory, the virus will continue to stay in memory and infect other files– Polymorphic Viruses- changes itself with each infection. Created to confuse virus scan programs– Metamorphic Viruses- has the ability to change its form and the code keeps changing each time the virus

changes.– Stealth Viruses- hides itself from virus protection software by encrypting its code.

• Trojan Horse -A program that hides on your computer and waits to be executed.• Logic Bombs- Are distributed primarily by worms and viruses.

Page 13: Network Security

What threatens a network?Cont’d

• Worms- Is like a virus except it doesn’t need a person to be present to execute.

• Adware & Spyware– Adware monitors the websites you visit the most and use the

information gathered to create targeted advertisements.– Spyware is a program that sends information about what you are

doing or about your system over the internet.• Root kit- A type of back door program that is inserted into application

software• Botnets- Short for robot network. A bot is typically a type of computer

system that is attached to a network whose security has been compromised and runs malicious software completely unknown to the user.

• Privilege escalation- Exploits bugs in software to gain access.

Page 14: Network Security

Summary

• 4 types of Info Assurances• 6 types of ways to secure your network• 8 threats of a network

Page 15: Network Security

Thank You!