Your SlideShare is downloading. ×
0
Network Security<br />By: Tyrone Turner<br />
What is Network Security?<br />JUST THAT, IT IS SECURING THE NETWORK!<br />It follows the four types of information assura...
Types of Information Assurance<br />Confidentiality<br />Integrity<br />Authentication<br />Availability<br />
How do you secure your network?<br />Firewalls<br />IDS/IPS<br />DMZ<br />Honey pots<br />Proxy servers<br />Protocol anal...
Firewalls<br />Block traffic<br />Controls and monitors access between networks<br />
Firewalls cont’d<br />Offers 5 service and security features<br />Packet filtering<br />Stateful inspection<br />Access an...
IDS/IPS<br />IDS (Intrusion Detection Systems)<br />Used to see if someone is on your network<br />IPS  (Intrusion Prevent...
DMZ<br />DMZ (Demilitarized Zone)<br />Light protection between the internet and firewall<br />
Honey pots<br />Separate server or service that is used to attract hackers to attack it<br />
Proxy servers<br />These are network servers that accept and forwards from the clients and from servers<br />
Protocol analyzers<br />These applications monitor everything down to the frame. <br />It can give you the information on ...
What threatens a network?<br />Viruses -Attacks that particular system being used and there are 8 types:<br />Boot Sector ...
What threatens a network?Cont’d<br />Worms- Is like a virus except it doesn’t need a person to be present to execute.<br /...
Summary<br />4 types of Info Assurances<br />6 types of ways to secure your network<br />8 threats of a network<br />
Thank You!<br />
Upcoming SlideShare
Loading in...5
×

Network Security

613

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
613
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
52
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Network Security"

  1. 1. Network Security<br />By: Tyrone Turner<br />
  2. 2. What is Network Security?<br />JUST THAT, IT IS SECURING THE NETWORK!<br />It follows the four types of information assurance.<br />
  3. 3. Types of Information Assurance<br />Confidentiality<br />Integrity<br />Authentication<br />Availability<br />
  4. 4. How do you secure your network?<br />Firewalls<br />IDS/IPS<br />DMZ<br />Honey pots<br />Proxy servers<br />Protocol analyzers<br />
  5. 5. Firewalls<br />Block traffic<br />Controls and monitors access between networks<br />
  6. 6. Firewalls cont’d<br />Offers 5 service and security features<br />Packet filtering<br />Stateful inspection<br />Access and authentication<br />Application layer filtering<br />Network Address Translation (NAT)<br />
  7. 7. IDS/IPS<br />IDS (Intrusion Detection Systems)<br />Used to see if someone is on your network<br />IPS (Intrusion Prevention Systems)<br />Attempts to stop an unauthorized user before they get in<br />
  8. 8. DMZ<br />DMZ (Demilitarized Zone)<br />Light protection between the internet and firewall<br />
  9. 9. Honey pots<br />Separate server or service that is used to attract hackers to attack it<br />
  10. 10. Proxy servers<br />These are network servers that accept and forwards from the clients and from servers<br />
  11. 11. Protocol analyzers<br />These applications monitor everything down to the frame. <br />It can give you the information on Layers 7,5,3,2<br />
  12. 12. What threatens a network?<br />Viruses -Attacks that particular system being used and there are 8 types:<br />Boot Sector Viruses- infects the boot sector or partition table of the disk.<br />Companion Viruses- disguises itself as a legitimate using a legitimate program name but a different extension <br />File infector Viruses- infects files that generally has the extension .com or .exe<br />Macro Viruses- attacks programs like excel and word<br />Memory Resident Viruses- when a system is infected by a virus that stays resident in the systems memory, the virus will continue to stay in memory and infect other files<br />Polymorphic Viruses- changes itself with each infection. Created to confuse virus scan programs<br />Metamorphic Viruses- has the ability to change its form and the code keeps changing each time the virus changes.<br />Stealth Viruses- hides itself from virus protection software by encrypting its code.<br />Trojan Horse -A program that hides on your computer and waits to be executed.<br />Logic Bombs- Are distributed primarily by worms and viruses.<br />
  13. 13. What threatens a network?Cont’d<br />Worms- Is like a virus except it doesn’t need a person to be present to execute.<br />Adware & Spyware<br />Adware monitors the websites you visit the most and use the information gathered to create targeted advertisements.<br />Spyware is a program that sends information about what you are doing or about your system over the internet.<br />Root kit- A type of back door program that is inserted into application software<br />Botnets- Short for robot network. A bot is typically a type of computer system that is attached to a network whose security has been compromised and runs malicious software completely unknown to the user.<br />Privilege escalation- Exploits bugs in software to gain access.<br />
  14. 14. Summary<br />4 types of Info Assurances<br />6 types of ways to secure your network<br />8 threats of a network<br />
  15. 15. Thank You!<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×