Top Banner
Technology In Action Hybrid of chapter 7+12: Networking and Security http://www.sepguy.com
12

12 Tait Hybridsecurity

Jan 14, 2015

Download

Technology

Slides from Technology in Action for CompSci 203.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 12 Tait Hybridsecurity

Technology In ActionHybrid of chapter 7+12: Networking and Security

http://www.sepguy.com

Page 2: 12 Tait Hybridsecurity

Computer Threats

• Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

Page 3: 12 Tait Hybridsecurity

Hackers

• Anyone who unlawfully accesses a computer system

• Types of hackers: – White-hat– Black-hat– Script kiddies

NB

Page 4: 12 Tait Hybridsecurity

What Hackers Do

• Steal information from computers:– Credit card numbers– Bank account numbers

• Internet packet sniffing• Commit identity theft

NB

Page 5: 12 Tait Hybridsecurity

Denial of Service Attacks

• Backdoor programs – Trojan horse

– Zombies

• Denial of service attacks

NB

Page 6: 12 Tait Hybridsecurity

How Hackers Gain Access

• Direct access:– Hacking software

• Indirect access:– Internet connection– Logical ports

NB

Page 7: 12 Tait Hybridsecurity

Computer SafeguardsFirewalls

• Software programs or hardware designed to close logical ports to invaders– A firewall is built into Windows XP– More robust firewalls are available

from other vendors.– Firewalls are critical if you have an

always-on broadband connection.

NB

Page 8: 12 Tait Hybridsecurity

Network Navigation Devices• Switches and Bridges

– Send data on a specific route through the network

– Bridges send data between collision domains

• Routers– Send information

between two networks

8

NB

Page 9: 12 Tait Hybridsecurity

Network Security Threats

• Human Errors and Mistakes– Accidents and mistakes

• Malicious Human Activity– Current and former employees hacking or

planting viruses

• Natural Events and Disasters– Hurricanes, floods, fire

9

NB

Page 10: 12 Tait Hybridsecurity

Network Security

• Authentication– User ID and password used to access the network– Use of a possessed object for access

• Access privileges– Enable access to certain network systems

• Physical protection measures– Restrict physical access to sensitive network equipment– Magnetic card readers– Biometric access devices

10

NB

Page 11: 12 Tait Hybridsecurity

Network Security• Firewalls

– Prevent access to the network by unauthorized users

– Composed of software and/or hardware– Screen and validate data packets– Bastion host/proxy server

11

NB

Page 12: 12 Tait Hybridsecurity

Network Firewall Layout

12

NB