SlideShare a Scribd company logo
1 of 10
Download to read offline
Security Pack
Roger Cheng
3 Steps to Make Your Network Securer
 Connectivity allows one to more easily access the network to perform
data exchange based on software and hardware
 Connectivity also provides a means for hackers to intrude the network and
make threats aimed to compromise confidentiality, integrity and
availability
Why Network Security is Becoming More Important?
Data Software Hardware
Security Pack
Access Control List
How Do I Benefit From Network Security Of EKI?
IP Security
Login AuthenticationNetwork Access Control
 HTTPS, SSH
– A cryptographic network protocol makes data exchange
become unreadable
– It avoid the leakage of user account and configuration
Step 1 – Protect Your Switch
??
 IP Source Guard
– Legal host with known IP and MAC address is bundled on a
specific port to access the network
Step 2 – Prevent Unauthorized Network Access
MAC
IP
Correct IP/MAC
Incorrect IP/MAC
 IP Source Guard (cont.)
– IP-MAC-Port permit list (white list)
Step 2 – Prevent Unauthorized Network Access (cont.)
 DHCP Snooping
– Legal host obtains IP address successfully from DHCP server
and be added into IP-MAC-Port permit list automatically
Step 2 – Prevent Unauthorized Network Access (cont.)
Without DHCP Snooping With DHCP Snooping
DHCP Packet DHCP Packet
Illegal host with self-configured IP address Illegal host with self-configured IP address
 Access Control List
– Illegal frames with specific content are dropped
– Drop list (black list)
Step 3 – Protect Network Resource
Frames with
Legal content
Frames with
Illegal content
?
Not found
 DoS (Denial of Service) Attack Prevention
– A huge number of frames make malicious operation
continuously to paralysis the data server connected to the
network
– Identify and drop these frames
Step 3 – Protect Network Resource (cont.)
DoS Attack
DoS Attack
With DoS Attack Prevention
Without DoS Attack Prevention
Normal Operation
Abnormal Operation
Freeze!
Smooth
Thank
You
10%
29%
31%
30%
0
100
200
300
400
500
600
700
A B C D E F
Morbi fermen
tum justo.
TEXT 1 TEXT 2
Lorem ipsum
dolor sit.
Morbi fermen
tum justo.
Lorem ipsum
dolor sit.
TEXT 3 TEXT 4

More Related Content

What's hot

Communications security for journalists
Communications security for journalistsCommunications security for journalists
Communications security for journalists
blogzilla
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Internet terms
Internet termsInternet terms
Internet terms
theAidman
 

What's hot (20)

How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
 
Wi fi
Wi fiWi fi
Wi fi
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Communications security for journalists
Communications security for journalistsCommunications security for journalists
Communications security for journalists
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Spoofing
SpoofingSpoofing
Spoofing
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Internet terms
Internet termsInternet terms
Internet terms
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 

Similar to Advantech's steps to make your Network Securer

write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
noreendchesterton753
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
Rishabh Mehan
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
drkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
lorent8
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
Erica StJohn
 

Similar to Advantech's steps to make your Network Securer (20)

write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Advantech's steps to make your Network Securer

  • 1. Security Pack Roger Cheng 3 Steps to Make Your Network Securer
  • 2.  Connectivity allows one to more easily access the network to perform data exchange based on software and hardware  Connectivity also provides a means for hackers to intrude the network and make threats aimed to compromise confidentiality, integrity and availability Why Network Security is Becoming More Important? Data Software Hardware
  • 3. Security Pack Access Control List How Do I Benefit From Network Security Of EKI? IP Security Login AuthenticationNetwork Access Control
  • 4.  HTTPS, SSH – A cryptographic network protocol makes data exchange become unreadable – It avoid the leakage of user account and configuration Step 1 – Protect Your Switch ??
  • 5.  IP Source Guard – Legal host with known IP and MAC address is bundled on a specific port to access the network Step 2 – Prevent Unauthorized Network Access MAC IP Correct IP/MAC Incorrect IP/MAC
  • 6.  IP Source Guard (cont.) – IP-MAC-Port permit list (white list) Step 2 – Prevent Unauthorized Network Access (cont.)
  • 7.  DHCP Snooping – Legal host obtains IP address successfully from DHCP server and be added into IP-MAC-Port permit list automatically Step 2 – Prevent Unauthorized Network Access (cont.) Without DHCP Snooping With DHCP Snooping DHCP Packet DHCP Packet Illegal host with self-configured IP address Illegal host with self-configured IP address
  • 8.  Access Control List – Illegal frames with specific content are dropped – Drop list (black list) Step 3 – Protect Network Resource Frames with Legal content Frames with Illegal content ? Not found
  • 9.  DoS (Denial of Service) Attack Prevention – A huge number of frames make malicious operation continuously to paralysis the data server connected to the network – Identify and drop these frames Step 3 – Protect Network Resource (cont.) DoS Attack DoS Attack With DoS Attack Prevention Without DoS Attack Prevention Normal Operation Abnormal Operation Freeze! Smooth
  • 10. Thank You 10% 29% 31% 30% 0 100 200 300 400 500 600 700 A B C D E F Morbi fermen tum justo. TEXT 1 TEXT 2 Lorem ipsum dolor sit. Morbi fermen tum justo. Lorem ipsum dolor sit. TEXT 3 TEXT 4