Syed Ubaid Ali Jafri Lecture on Information Technology

622 views
504 views

Published on

Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference?

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
622
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
9
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Syed Ubaid Ali Jafri Lecture on Information Technology

  1. 1. INTERNET INTEGRATION & NETWORK SECURITY BY SYED UBAID ALI JAFRI Information Security Expert CEO UJ Consultant & Solution Provider http://www.ujconsultant.com
  2. 2. CONSIDERATIONS •IMPORTANCE OF TECHNOLOGY •NETWORK SCANNING •WHAT WE DO? •VIRTUALIZATION •INTRODUCTION TO NETWORK SECURITY •MINIMIZING RISK •EVALUATE PERFORMANCE
  3. 3. IMPORTANCE OF TECHNOLOGY MAIL POST EMAIL A Sender A Sender Writes a Letter and place the information To: From: Return Address: Writes a Letter and place the information To: From: Return Address: Find nearby post office Find an E-Mail Server Post Officer then check the Header information: 1)To: abc 2)Address: 123/Abc. Khi 3)From: xyz 4)Return Address: 123/Abc. Khi E-Mail Server verify the header information: 1)To: abc@hotmail.com 2)From: xyz@hotmail.com 3)Return Address: abc@hotmail.com When the information on a header is verified a stamp has been made on the envelop , and an amount is charged for the service When the information on a header is verified it send the information to the e-mail server, For free E-Mail Server , no amount is charged for the service On the same day or another day the post master took the envelop and send the envelop to the nearby post office of the destination On the same day or with a delay of time Email server send the request to another email server if it contains the address then it send to the Mail Server Post Master of the destination’s Address then took the envelop and send it to the address Mail Server send a mail to the destination’s Address. Receiver check the POSTBOX Receiver checks the Mail Box
  4. 4. 10 Years Back • Microsoft Launch their operating system known as “Windows XP” Time Period Commands 10 Years Start > Run> cmd Netstat-an Identifies from which server your machine connection is established 10 Years Start > Run > cmd Net view Identifies how many computers are the part of your network 9 Years Start > Run > cmd Ping Pc-Name Ping google.com.pk Get the IP Address from a Domain name 8 Years Start > Run > cmd Msinfo32.exe Command used to identify the peripheral of computer
  5. 5. NETWORK SCANNING •Foot printing •Finger Printing •Scanning •Identify the threat •Applying patches
  6. 6. WHAT WE DO AND HOW WE BECOME A VICTIM Following are the list of threats that a user faces on a network: •MAN IN THE MIDDLE ATTACK •SESSION HIJACKING •FAKE E-MAIL FORWARDING •DENIAL OF SERVICES •SOCIAL ENGINEERING
  7. 7. THREATS MAN IN THE MIDDLE ATTACK: The man-in-the middle attack intercepts a communication between two systems.
  8. 8. THREATS SESSION HIJACKING •The Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token.
  9. 9. THREATS FAKE E-MAIL FORWARDING
  10. 10. THREATS DENIAL OF SERVICES A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users
  11. 11. THREATS SOCIAL ENGINEERING In the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information
  12. 12. INTRODUCTION TO NETWORK SECURITY • It consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. • Network security involves the authorization of access to data in a network, which is controlled by the network administrator.
  13. 13. COUNTERMEASUREMENTS •Denying Unusable services •Checking people currently connect with this network •Closing Default operators of windows •Saving external resources •Making Log files •Updated Virus Definitions
  14. 14. COUNTERMEASUREMENTS Denying Unusable services RUN>Services.msc Close these services Automatic Updates Live Update Telnet
  15. 15. COUNTERMEASUREMENTS Closing Default operators of windows
  16. 16. COUNTERMEASUREMENTS HKLMSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer Operating system Default setting Windows 7 0x91 Windows Server 2008 0x91 Windows Vista 0x91 Windows Server 2003 0x95 Windows XP 0x91 Windows 2000 0x95 Windows 95/98 0x95
  17. 17. COUNTERMEASUREMENTS Making Log files RUN > eventvwr
  18. 18. MINIMIZING RISK •Making Remote Connectivity disabled •Services Like Telnet, SSH, VNC should be stopped forcefully •Changing Values from Registry •Releasing and Renewing IP Addresses
  19. 19. MINIMIZING RISK •Services Like Telnet, SSH, VNC should be stopped forcefully •Net stop telnet •Net start telnet
  20. 20. MINIMIZING RISK •Releasing and Renewing IP Addresses: •Ipconfig /release •Ipconfig /renew
  21. 21. EVALUATE PERFORMANCE

×