Your SlideShare is downloading. ×
12 Tait Hybridsecurity
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

12 Tait Hybridsecurity

526
views

Published on

Slides from Technology in Action for CompSci 203.

Slides from Technology in Action for CompSci 203.

Published in: Technology, News & Politics

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
526
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
36
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Technology In Action
      • Hybrid of chapter 7+12: Networking and Security
      http://www.sepguy.com
    • 2. Computer Threats
      • Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.
    • 3. Hackers
      • Anyone who unlawfully accesses a computer system
      • Types of hackers:
        • White-hat
        • Black-hat
        • Script kiddies
      NB
    • 4. What Hackers Do
      • Steal information from computers:
        • Credit card numbers
        • Bank account numbers
      • Internet packet sniffing
      • Commit identity theft
      NB
    • 5. Denial of Service Attacks
      • Backdoor programs
        • Trojan horse
        • Zombies
      • Denial of service attacks
      NB
    • 6. How Hackers Gain Access
      • Direct access:
        • Hacking software
      • Indirect access:
        • Internet connection
        • Logical ports
      NB
    • 7. Computer Safeguards Firewalls
      • Software programs or hardware designed to close logical ports to invaders
        • A firewall is built into Windows XP
        • More robust firewalls are available from other vendors.
        • Firewalls are critical if you have an always-on broadband connection.
      NB
    • 8. Network Navigation Devices
      • Switches and Bridges
        • Send data on a specific route through the network
        • Bridges send data between collision domains
      • Routers
        • Send information between two networks
      NB
    • 9. Network Security Threats
      • Human Errors and Mistakes
        • Accidents and mistakes
      • Malicious Human Activity
        • Current and former employees hacking or planting viruses
      • Natural Events and Disasters
        • Hurricanes, floods, fire
      NB
    • 10. Network Security
      • Authentication
        • User ID and password used to access the network
        • Use of a possessed object for access
      • Access privileges
        • Enable access to certain network systems
      • Physical protection measures
        • Restrict physical access to sensitive network equipment
        • Magnetic card readers
        • Biometric access devices
      NB
    • 11. Network Security
      • Firewalls
        • Prevent access to the network by unauthorized users
        • Composed of software and/or hardware
        • Screen and validate data packets
        • Bastion host/proxy server
      NB
    • 12. Network Firewall Layout NB