Network Security
-
Upload
tyrone-turner -
Category
Technology
-
view
610 -
download
2
Transcript of Network Security
![Page 1: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/1.jpg)
Network Security
By: Tyrone Turner
![Page 2: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/2.jpg)
What is Network Security?
• JUST THAT, IT IS SECURING THE NETWORK!
• It follows the four types of information assurance.
![Page 3: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/3.jpg)
Types of Information Assurance
• Confidentiality• Integrity• Authentication• Availability
![Page 4: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/4.jpg)
How do you secure your network?
• Firewalls• IDS/IPS• DMZ• Honey pots• Proxy servers• Protocol analyzers
![Page 5: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/5.jpg)
Firewalls
• Block traffic• Controls and monitors access between
networks
![Page 6: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/6.jpg)
Firewalls cont’d
• Offers 5 service and security features– Packet filtering– Stateful inspection– Access and authentication– Application layer filtering– Network Address Translation (NAT)
![Page 7: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/7.jpg)
IDS/IPS
• IDS (Intrusion Detection Systems)– Used to see if someone is on your network
• IPS (Intrusion Prevention Systems)– Attempts to stop an unauthorized user before they
get in
![Page 8: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/8.jpg)
DMZ
• DMZ (Demilitarized Zone)– Light protection between the internet and firewall
![Page 9: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/9.jpg)
Honey pots
• Separate server or service that is used to attract hackers to attack it
![Page 10: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/10.jpg)
Proxy servers
• These are network servers that accept and forwards from the clients and from servers
![Page 11: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/11.jpg)
Protocol analyzers
• These applications monitor everything down to the frame.
• It can give you the information on Layers 7,5,3,2
![Page 12: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/12.jpg)
What threatens a network?• Viruses -Attacks that particular system being used and there are 8 types:
– Boot Sector Viruses- infects the boot sector or partition table of the disk.– Companion Viruses- disguises itself as a legitimate using a legitimate program name but a different
extension – File infector Viruses- infects files that generally has the extension .com or .exe– Macro Viruses- attacks programs like excel and word– Memory Resident Viruses- when a system is infected by a virus that stays resident in the systems
memory, the virus will continue to stay in memory and infect other files– Polymorphic Viruses- changes itself with each infection. Created to confuse virus scan programs– Metamorphic Viruses- has the ability to change its form and the code keeps changing each time the virus
changes.– Stealth Viruses- hides itself from virus protection software by encrypting its code.
• Trojan Horse -A program that hides on your computer and waits to be executed.• Logic Bombs- Are distributed primarily by worms and viruses.
![Page 13: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/13.jpg)
What threatens a network?Cont’d
• Worms- Is like a virus except it doesn’t need a person to be present to execute.
• Adware & Spyware– Adware monitors the websites you visit the most and use the
information gathered to create targeted advertisements.– Spyware is a program that sends information about what you are
doing or about your system over the internet.• Root kit- A type of back door program that is inserted into application
software• Botnets- Short for robot network. A bot is typically a type of computer
system that is attached to a network whose security has been compromised and runs malicious software completely unknown to the user.
• Privilege escalation- Exploits bugs in software to gain access.
![Page 14: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/14.jpg)
Summary
• 4 types of Info Assurances• 6 types of ways to secure your network• 8 threats of a network
![Page 15: Network Security](https://reader035.fdocuments.us/reader035/viewer/2022070318/55762878d8b42a4e1c8b52b6/html5/thumbnails/15.jpg)
Thank You!