Top Banner
Network & Internet Security Chapter 4
46

Network & Internet Security

Jan 10, 2016

Download

Documents

Bao

Network & Internet Security. Chapter 4. Information Technology. Helps to produce, manipulate, store, communicate, and/or disseminate information Consists of Computers + Communications Most computers today have Internet access. LANS, MANS, and WANS. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network & Internet Security

Network & Internet Security

Chapter 4

Page 2: Network & Internet Security

Information Technology

• Helps to produce, manipulate, store, communicate, and/or disseminate information

• Consists of Computers + Communications• Most computers today have Internet access

Page 3: Network & Internet Security

LANS, MANS, and WANS

• Local area network (LAN) - a network of computers and other devices that is confined to a relatively small space, such as one building or even one office.

• Metropolitan area network (MAN) - a network that connects clients and servers in multiple buildings in a region.

• Wide area network (WAN) - a network that connects two or more geographically distinct LANs

Page 4: Network & Internet Security

LAN (Short distance)

Page 5: Network & Internet Security

MAN (Usually within a city)

Page 6: Network & Internet Security

WAN (Large distance)

Seattle

San Diego

Chicago

Dallas

Washington

Boston

Page 7: Network & Internet Security

From the Analog to the Digital Age

• Tape recorders, voices, and musical instruments are analog.

• CDs are digital.

Page 8: Network & Internet Security

Going Digital

• Music CD’s• Computers• TVs• Web TV• Telephones• Movies (DVD)• Newspapers

Page 9: Network & Internet Security

Digital Television

• Clearer picture

• Supports HDTV

Page 10: Network & Internet Security

HDTV

Page 11: Network & Internet Security

Plymouth State College

Forms of Connectivity

• Videoconferencing• Virtual Private Networks• Telecommuting & virtual offices• Home networks (WiFi)• Cell Phones• Bluetooth

Page 12: Network & Internet Security

Plymouth State College

Videoconferencing

Page 13: Network & Internet Security

VPNs

• Virtual Private Networks– Private networks that use a public network, usually the

internet, to connect remote sites

Page 14: Network & Internet Security

VPN (Virtual Private Network)

Node

node

node

Nodenode

node

Node

Internet

Page 15: Network & Internet Security

Network Concerns and Protection

• Hackers

• Viruses

• Snooping

• Firewalls

Page 16: Network & Internet Security

Cyberthreats, Hackers, & Safeguards

• Problem: • Initially no security was built into the Internet.• The internet is used by some people who are

not trustworthy.• All it takes is one computer on a LAN that has

been compromised for all computers on it to be vulnerable.

Page 17: Network & Internet Security

Cybercrime

• Crimes committed with or against computers and networks

• Includes unauthorized access or use• Hacking

– Individual information– Business information– National security information

Plymouth State University

Page 18: Network & Internet Security

Cyberthreats, Hackers, & Safeguards

• Hackers– People who gain unauthorized access to computers or

networks, often for fun or to see if they can (not good)

• Crackers– Malicious hackers who break into computers for malicious

purposes

Page 19: Network & Internet Security

11/2/00 Plymouth State University 19

Threats to Computers & Communications Systems

• WormsA program that copies itself

repeatedly into a computer’s memory or onto a disk drive

• VirusesA is a “deviant” program, stored

on a computer hard drive, that can cause unexpected and undesirable effects.

Page 20: Network & Internet Security

Viruses & Worms

• How they spread– Via e-mail attachments– By infected floppies or CDs– By clicking on infiltrated websites– By downloading from infected files from

websites– Through infiltrated Wi-Fi hotspots– From one infected PC on a LAN to

another• What can you do about it?

– Install anti-virus software and subscribe to the automatic anti-virus update service

Page 21: Network & Internet Security

Cyberthreats, Hackers, & Safeguards

• Trojan Horses – Programs that pretend to be a useful program

such as a free game or screensaver.– Carry viruses or malicious instructions that

damage your computer or install a backdoor or spyware

– Backdoors and spyware allow others to access your computer without your knowledge

Page 22: Network & Internet Security

Backdoor

• Sometimes installed by a virus• http://www.youtube.com/watch?v=ahcVp8vIicI

Plymouth State University

Page 23: Network & Internet Security

11/2/00 Plymouth State University 23

Disgruntled Employees

Page 24: Network & Internet Security

11/2/00 Plymouth State University 24

Computer Criminals

• Hackers• Crackers• Employees

Page 25: Network & Internet Security

Protecting Your Computer

• Safeguards– Use antivirus software, and keep it current– Install a firewall to filter out undesirable traffic– Use robust passwords –

• Minimum 8 characters with letters, numbers, characters• 4cats is not a good password, but f0UrK@tTz is

– Install antispyware software– Encrypt financial and personal records – Back up your data, so if your PC is attacked and

must be reformatted, you can restore your data

Page 26: Network & Internet Security

Protecting Your Computer

• Encryption– The process of altering readable data into

unreadable form to prevent unauthorized access– Two forms:

• Private Key encryption means the same secret key is used by both the sender and receiver to encrypt and decrypt a message

• Public Key encryption means that two keys are used

Page 27: Network & Internet Security

Encryption

• Scrambles data before transmission• Uses encryption key• Plaintext versus cipher text

Page 28: Network & Internet Security

Proof of Authenticity

• Certificate Authority• Entity that issues digital certificates• Digital Certificate

– Provided by a Certificate Authority– Has an expiration date

• Digital Signature– Gives a recipient reason to believe that the

message was created by a known sender

Plymouth State University

Page 29: Network & Internet Security

Validation

Plymouth State University

Page 30: Network & Internet Security

Vulnerable Communication

• Home WiFi Networks• Cellular phones• Bluetooth

Plymouth State University

Page 31: Network & Internet Security

Cellular Phones

Plymouth State University

Page 32: Network & Internet Security

Wireless Communications MediaShort-range Wireless

• Wi-Fi (802.11) networks– Wi-Fi b, a, and g correspond to 802.11b, 802.11a, and 802.11g– 802.11 is an IEEE wireless technical specification– 802.11b is older, transmits 11 megabits per second – 802.11a is faster than b but with weaker security than g– 802.11g is 54 megabits per second and transmits 50 ft

• Warning! Security is disabled by default on Wi-Fi

Page 33: Network & Internet Security

Wireless Communications MediaPersonal Area Wireless

• Bluetooth– Short-range wireless standard to link cellphones, PDAs,

computers, and peripherals at distances up to 30 ft– Named after King Harald Bluetooth, the Viking who unified

Denmark and Norway– Transmits 720 kilobits per second

– Bluetooth can also be used to eavesdrop on networks– Turn it off on your cell phone unless you need it at that time

Page 34: Network & Internet Security

11/2/00 Plymouth State University 34

SafeguardsIdentification & Access

• What you have– Cards, keys, signatures, badges, RFID,

USB key

• What you know– PINs, passwords, personal information

• Who you are– Physical traits

• Biometrics – fingerprints, iris, face recognition

Joe Smith

Page 35: Network & Internet Security

Stealing Passwords

Plymouth State University

http://www.youtube.com/watch?v=O68zx6xTubs

http://boingboing.net/2011/03/07/nevada-student-charg.html

Page 36: Network & Internet Security

11/2/00 Plymouth State University 36

Iris Scan

Page 37: Network & Internet Security

11/2/00 Plymouth State University 37

Safeguards

• Encryption• Protection of software & data

– Access, audit, & people controls• Disaster-recovery plans

Page 38: Network & Internet Security

11/2/00 Plymouth State University 38

Protection of Software & Data

• Security procedures– Control of access– Audit controls– People controls

• Disaster-recovery plan

What can a business do if there are no disaster-recovery plans in place and a disaster

occurs?

Page 39: Network & Internet Security

Attacks on Computers and Networks

• Botnet• Denial-of-Service attack• Logic bomb• Trojan Horse• Malware on cell phones• Virus on router• iPod infected during manufacturing

Plymouth State University

Page 40: Network & Internet Security

Identity / Information Theft

• Requests for information• Phishing (spoof E-mail)• Pharming (fake web site)• Auction fraud

Plymouth State University

Page 41: Network & Internet Security

Real Web Site

Plymouth State University

Page 42: Network & Internet Security

Fake Web Site

Plymouth State University

Page 43: Network & Internet Security

Protection at Work

• No floppy / USB use• Secure access

– Physical– Logical

Plymouth State University

Page 44: Network & Internet Security

Recent Problems

• Cyberbullying• Cyberstalking• Pornography• Child predators

Plymouth State University

Page 45: Network & Internet Security

Plymouth State College

Internet Predators

Page 46: Network & Internet Security

Legal Protection

• Laws changing due to changing technology

Plymouth State University