NETWORKING THREATS (1) INTRODUCTION Hackers are intruders who gain access to a network through the carelessness of network 1. NETWORKING THREATS users. Attacks can come from both internal and external sources. Internal attacks account for 2. METHODS OF ATTACK 70% of security incidents. Social engineering is a group of techniques used to deceive internal users into performing3. SECURITY POLICY specific actions or revealing confidential information.4. USING FIREWALLS Three types of social engineering attacks are: pretexting, phishing and vishing. CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 4
METHODS OF ATTACK INTRODUCTION Viruses are programs that once activated 1. NETWORKING spread by modifying other programs or files, THREATS causing damage to files, or erasing them completely. 2. METHODS OF A worm is similar to a virus except it runs ATTACK independently and spreads by resending itself an e-mail attachement or part of a network3. SECURITY POLICY message. A Trojan horse is a program that appears legitimate. Once initiated, it can damage a4. USING FIREWALLS hard drive or create a back door into a system allowing hackers to gain access. CONCLUSION Network Basic Securityccbb RADJI Mohamed 01/01/2013 6
SECURITY POLICY (1) INTRODUCTION A security policy should include identification 1. NETWORKING and authentication policies, password policies, THREATS acceptable use policies, remote access policies, and incident handling procedures. 2. METHODS OF ATTACK All users of network must support and follow the security policy in order for it to be effective.3. SECURITY POLICY Keep software applications up-to-date with the latest security patches and updates to help deter threats.4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 7
SECURITY POLICY (2) INTRODUCTION Antivirus software, installed on every computer, 1. NETWORKING THREATS detects and removes known viruses, worms and Trojan horses. 2. METHODS OF Anti-spam software identifies spam and places it ATTACK into a junk folder or deletes it. Tools and applications used in securing a3. SECURITY POLICY network include: Software patches and updates – Virus protection – Spyware protection – Spam4. USING FIREWALLS blockers – Pop-up blockers – Firewalls. CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 8
USING FIREWALLS (1) INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK Packet Filtering –controls access based on IP or MAC addresses.3. SECURITY POLICY Application/web Site Filtering controls access based on the application. Statefull Packet Inspection (ISP) ensures4. USING FIREWALLS incoming packets are legitimate responses to requests from internal hosts. SPI can recognize CONCLUSION and filter out attacks such as DoS. Network Basic Security RADJI Mohamed 01/01/2013 9
USING FIREWALLS (2) INTRODUCTION 1. NETWORKING A DMZ is an area of the network that is THREATS accessible to both internal and external users. If the wireless access point is unsecured, anyone 2. METHODS OF ATTACK who connects to it is considered part of the internal network and is on the protected side of3. SECURITY POLICY the firewall.4. USING FIREWALLS CONCLUSION Network Basic Securityc RADJI Mohamed 01/01/2013 10
INTRODUCTION THANK YOU FOR YOUR KIND 1. NETWORKING THREATS ATTENTION. 2. METHODS OF ATTACK3. SECURITY POLICY YOUR QUESTIONS AND SUGGESTIONS ARE WELCOME.4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 12
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.