UNIVERSITY OF ABOMEY-CALAVI                 -o-o-o-o-o-o-o-o-         ABOMEY-CALAVI POLYTECHNIC                  -o-o-o-o-...
Outline                   INTRODUCTION            1.   NETWORKING THREATS            2.   METHODS OF ATTACK            3. ...
INTRODUCTION 1. NETWORKING     THREATS  2. METHODS OF      ATTACK                            INTRODUCTION3. SECURITY POLIC...
NETWORKING THREATS (1) INTRODUCTION                           Hackers are intruders who gain access to a                 ...
NETWORKING THREATS (2) INTRODUCTION 1. NETWORKING     THREATS  2. METHODS OF      ATTACK3. SECURITY POLICY4. USING FIREWAL...
METHODS OF ATTACK INTRODUCTION                          Viruses are programs that once activated 1. NETWORKING           ...
SECURITY POLICY (1) INTRODUCTION                           A security policy should include identification 1. NETWORKING ...
SECURITY POLICY (2) INTRODUCTION                           Antivirus software, installed on every computer, 1. NETWORKING...
USING FIREWALLS (1) INTRODUCTION 1. NETWORKING     THREATS  2. METHODS OF      ATTACK               Packet Filtering –con...
USING FIREWALLS (2) INTRODUCTION 1. NETWORKING                            A DMZ is an area of the network that is     THR...
INTRODUCTION 1. NETWORKING     THREATS  2. METHODS OF      ATTACK                 CONCLUSION3. SECURITY POLICY4. USING FIR...
INTRODUCTION                            THANK YOU FOR YOUR KIND 1. NETWORKING     THREATS                       ATTENTION....
Upcoming SlideShare
Loading in …5
×

Network basic security

345
-1

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
345
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Network basic security

  1. 1. UNIVERSITY OF ABOMEY-CALAVI -o-o-o-o-o-o-o-o- ABOMEY-CALAVI POLYTECHNIC -o-o-o-o-o-o-o- COMPUTER SCIENCE AND TELECOMMUNICATIONS DEPARTEMENTOPTION: NETWORKS AND TELECOMMUNICATIONS 5 -o-o-o- Discipline: ENGLISH Network Basic SecurityPresented by: Under the baton of:RADJI Mohamed Mr Bienvenu OLORY RADJI Mohamed 01/01/2013 1
  2. 2. Outline INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK 3. SECURITY POLICY 4. USING FIREWALLS CONCLUSIONNetwork Basic Security RADJI Mohamed 01/01/2013 2
  3. 3. INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK INTRODUCTION3. SECURITY POLICY4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 3
  4. 4. NETWORKING THREATS (1) INTRODUCTION  Hackers are intruders who gain access to a network through the carelessness of network 1. NETWORKING THREATS users.  Attacks can come from both internal and external sources. Internal attacks account for 2. METHODS OF ATTACK 70% of security incidents.  Social engineering is a group of techniques used to deceive internal users into performing3. SECURITY POLICY specific actions or revealing confidential information.4. USING FIREWALLS  Three types of social engineering attacks are: pretexting, phishing and vishing. CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 4
  5. 5. NETWORKING THREATS (2) INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK3. SECURITY POLICY4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 5
  6. 6. METHODS OF ATTACK INTRODUCTION  Viruses are programs that once activated 1. NETWORKING spread by modifying other programs or files, THREATS causing damage to files, or erasing them completely. 2. METHODS OF  A worm is similar to a virus except it runs ATTACK independently and spreads by resending itself an e-mail attachement or part of a network3. SECURITY POLICY message.  A Trojan horse is a program that appears legitimate. Once initiated, it can damage a4. USING FIREWALLS hard drive or create a back door into a system allowing hackers to gain access. CONCLUSION Network Basic Securityccbb RADJI Mohamed 01/01/2013 6
  7. 7. SECURITY POLICY (1) INTRODUCTION  A security policy should include identification 1. NETWORKING and authentication policies, password policies, THREATS acceptable use policies, remote access policies, and incident handling procedures. 2. METHODS OF ATTACK  All users of network must support and follow the security policy in order for it to be effective.3. SECURITY POLICY  Keep software applications up-to-date with the latest security patches and updates to help deter threats.4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 7
  8. 8. SECURITY POLICY (2) INTRODUCTION  Antivirus software, installed on every computer, 1. NETWORKING THREATS detects and removes known viruses, worms and Trojan horses. 2. METHODS OF  Anti-spam software identifies spam and places it ATTACK into a junk folder or deletes it.  Tools and applications used in securing a3. SECURITY POLICY network include: Software patches and updates – Virus protection – Spyware protection – Spam4. USING FIREWALLS blockers – Pop-up blockers – Firewalls. CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 8
  9. 9. USING FIREWALLS (1) INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK  Packet Filtering –controls access based on IP or MAC addresses.3. SECURITY POLICY  Application/web Site Filtering controls access based on the application.  Statefull Packet Inspection (ISP) ensures4. USING FIREWALLS incoming packets are legitimate responses to requests from internal hosts. SPI can recognize CONCLUSION and filter out attacks such as DoS. Network Basic Security RADJI Mohamed 01/01/2013 9
  10. 10. USING FIREWALLS (2) INTRODUCTION 1. NETWORKING  A DMZ is an area of the network that is THREATS accessible to both internal and external users.  If the wireless access point is unsecured, anyone 2. METHODS OF ATTACK who connects to it is considered part of the internal network and is on the protected side of3. SECURITY POLICY the firewall.4. USING FIREWALLS CONCLUSION Network Basic Securityc RADJI Mohamed 01/01/2013 10
  11. 11. INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK CONCLUSION3. SECURITY POLICY4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 11
  12. 12. INTRODUCTION THANK YOU FOR YOUR KIND 1. NETWORKING THREATS ATTENTION. 2. METHODS OF ATTACK3. SECURITY POLICY YOUR QUESTIONS AND SUGGESTIONS ARE WELCOME.4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 12
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×