Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference?
The Ultimate Guide to Choosing WordPress Pros and Cons
Syed Ubaid Ali Jafri Lecture on Information Technology
1. INTERNET INTEGRATION & NETWORK
SECURITY
BY
SYEDUBAID ALI JAFRI
Information Security Expert
CEO
UJ Consultant & Solution
Provider
http://www.ujconsultant.com
3. IMPORTANCE OF TECHNOLOGY
MAIL POST EMAIL
A Sender A Sender
Writes a Letter and place the information
To:
From:
Return Address:
Writes a Letter and place the information
To:
From:
Return Address:
Find nearby post office Find an E-Mail Server
Post Officer then check the Header information:
1) To: abc
2) Address: 123/Abc. Khi
3) From: xyz
4) Return Address: 123/Abc. Khi
E-Mail Server verify the header information:
1) To: abc@hotmail.com
2) From: xyz@hotmail.com
3) Return Address: abc@hotmail.com
When the information on a header is verified a stamp
has been made on the envelop , and an amount
is charged for the service
When the information on a header is verified it send
the information to the e-mail server, For free E-
Mail Server , no amount is charged for the
service
On the same day or another day the post master took
the envelop and send the envelop to the nearby
post office of the destination
On the same day or with a delay of time Email server
send the request to another email server if it
contains the address then it send to the Mail
Server
Post Master of the destination’s Address then took
the envelop and send it to the address
Mail Server send a mail to the destination’s Address.
Receiver check the POSTBOX Receiver checks the Mail Box
4. 10 Years Back
• Microsoft Launch their operating system known as
“Windows XP”
Time Period Commands
10 Years Start > Run> cmd
Netstat-an
Identifies from which server your machine connection is established
10 Years Start > Run > cmd
Net view
Identifies how many computers are the part of your network
9 Years Start > Run > cmd
Ping Pc-Name
Ping google.com.pk
Get the IP Address from a Domain name
8 Years Start > Run > cmd
Msinfo32.exe
Command used to identify the peripheral of computer
6. WHAT WE DO AND HOW WE BECOME A
VICTIM
Following are the list of threats that a
user faces on a network:
•MAN IN THE MIDDLE ATTACK
•SESSION HIJACKING
•FAKE E-MAIL FORWARDING
•DENIAL OF SERVICES
•SOCIAL ENGINEERING
7. THREATS
MAN IN THE MIDDLE ATTACK:
The man-in-the middle attack intercepts a communication
between two systems.
8. THREATS
SESSION HIJACKING
•The Session Hijacking attack consists of the exploitation
of the web session control mechanism, which is normally
managed for a session token.
10. THREATS
DENIAL OF SERVICES
A denial-of-service attack (DoS attack) or distributed
denial-of-service attack (DDoS attack) is an attempt to make
a computer or network resource unavailable to its intended users
11. THREATS
SOCIAL ENGINEERING
In the context of security, is understood to mean the art of
manipulating people into performing actions or divulging confidential
information
12. INTRODUCTION TO NETWORK SECURITY
• It consists of the provisions and policies adopted by a network
administrator to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and
network-accessible resources.
• Network security involves the authorization of access to data in a
network, which is controlled by the network administrator.
18. MINIMIZING RISK
•Making Remote Connectivity disabled
•Services Like Telnet, SSH, VNC should be
stopped forcefully
•Changing Values from Registry
•Releasing and Renewing IP Addresses