12 Tait Hybridsecurity

563
-1

Published on

Slides from Technology in Action for CompSci 203.

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
563
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
36
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 12 Tait Hybridsecurity

    1. 1. Technology In Action <ul><li>Hybrid of chapter 7+12: Networking and Security </li></ul>http://www.sepguy.com
    2. 2. Computer Threats <ul><li>Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. </li></ul>
    3. 3. Hackers <ul><li>Anyone who unlawfully accesses a computer system </li></ul><ul><li>Types of hackers: </li></ul><ul><ul><li>White-hat </li></ul></ul><ul><ul><li>Black-hat </li></ul></ul><ul><ul><li>Script kiddies </li></ul></ul>NB
    4. 4. What Hackers Do <ul><li>Steal information from computers: </li></ul><ul><ul><li>Credit card numbers </li></ul></ul><ul><ul><li>Bank account numbers </li></ul></ul><ul><li>Internet packet sniffing </li></ul><ul><li>Commit identity theft </li></ul>NB
    5. 5. Denial of Service Attacks <ul><li>Backdoor programs </li></ul><ul><ul><li>Trojan horse </li></ul></ul><ul><ul><li>Zombies </li></ul></ul><ul><li>Denial of service attacks </li></ul>NB
    6. 6. How Hackers Gain Access <ul><li>Direct access: </li></ul><ul><ul><li>Hacking software </li></ul></ul><ul><li>Indirect access: </li></ul><ul><ul><li>Internet connection </li></ul></ul><ul><ul><li>Logical ports </li></ul></ul>NB
    7. 7. Computer Safeguards Firewalls <ul><li>Software programs or hardware designed to close logical ports to invaders </li></ul><ul><ul><li>A firewall is built into Windows XP </li></ul></ul><ul><ul><li>More robust firewalls are available from other vendors. </li></ul></ul><ul><ul><li>Firewalls are critical if you have an always-on broadband connection. </li></ul></ul>NB
    8. 8. Network Navigation Devices <ul><li>Switches and Bridges </li></ul><ul><ul><li>Send data on a specific route through the network </li></ul></ul><ul><ul><li>Bridges send data between collision domains </li></ul></ul><ul><li>Routers </li></ul><ul><ul><li>Send information between two networks </li></ul></ul>NB
    9. 9. Network Security Threats <ul><li>Human Errors and Mistakes </li></ul><ul><ul><li>Accidents and mistakes </li></ul></ul><ul><li>Malicious Human Activity </li></ul><ul><ul><li>Current and former employees hacking or planting viruses </li></ul></ul><ul><li>Natural Events and Disasters </li></ul><ul><ul><li>Hurricanes, floods, fire </li></ul></ul>NB
    10. 10. Network Security <ul><li>Authentication </li></ul><ul><ul><li>User ID and password used to access the network </li></ul></ul><ul><ul><li>Use of a possessed object for access </li></ul></ul><ul><li>Access privileges </li></ul><ul><ul><li>Enable access to certain network systems </li></ul></ul><ul><li>Physical protection measures </li></ul><ul><ul><li>Restrict physical access to sensitive network equipment </li></ul></ul><ul><ul><li>Magnetic card readers </li></ul></ul><ul><ul><li>Biometric access devices </li></ul></ul>NB
    11. 11. Network Security <ul><li>Firewalls </li></ul><ul><ul><li>Prevent access to the network by unauthorized users </li></ul></ul><ul><ul><li>Composed of software and/or hardware </li></ul></ul><ul><ul><li>Screen and validate data packets </li></ul></ul><ul><ul><li>Bastion host/proxy server </li></ul></ul>NB
    12. 12. Network Firewall Layout NB

    ×