Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

12 Tait Hybridsecurity


Published on

Slides from Technology in Action for CompSci 203.

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

12 Tait Hybridsecurity

  1. 1. Technology In Action <ul><li>Hybrid of chapter 7+12: Networking and Security </li></ul>
  2. 2. Computer Threats <ul><li>Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. </li></ul>
  3. 3. Hackers <ul><li>Anyone who unlawfully accesses a computer system </li></ul><ul><li>Types of hackers: </li></ul><ul><ul><li>White-hat </li></ul></ul><ul><ul><li>Black-hat </li></ul></ul><ul><ul><li>Script kiddies </li></ul></ul>NB
  4. 4. What Hackers Do <ul><li>Steal information from computers: </li></ul><ul><ul><li>Credit card numbers </li></ul></ul><ul><ul><li>Bank account numbers </li></ul></ul><ul><li>Internet packet sniffing </li></ul><ul><li>Commit identity theft </li></ul>NB
  5. 5. Denial of Service Attacks <ul><li>Backdoor programs </li></ul><ul><ul><li>Trojan horse </li></ul></ul><ul><ul><li>Zombies </li></ul></ul><ul><li>Denial of service attacks </li></ul>NB
  6. 6. How Hackers Gain Access <ul><li>Direct access: </li></ul><ul><ul><li>Hacking software </li></ul></ul><ul><li>Indirect access: </li></ul><ul><ul><li>Internet connection </li></ul></ul><ul><ul><li>Logical ports </li></ul></ul>NB
  7. 7. Computer Safeguards Firewalls <ul><li>Software programs or hardware designed to close logical ports to invaders </li></ul><ul><ul><li>A firewall is built into Windows XP </li></ul></ul><ul><ul><li>More robust firewalls are available from other vendors. </li></ul></ul><ul><ul><li>Firewalls are critical if you have an always-on broadband connection. </li></ul></ul>NB
  8. 8. Network Navigation Devices <ul><li>Switches and Bridges </li></ul><ul><ul><li>Send data on a specific route through the network </li></ul></ul><ul><ul><li>Bridges send data between collision domains </li></ul></ul><ul><li>Routers </li></ul><ul><ul><li>Send information between two networks </li></ul></ul>NB
  9. 9. Network Security Threats <ul><li>Human Errors and Mistakes </li></ul><ul><ul><li>Accidents and mistakes </li></ul></ul><ul><li>Malicious Human Activity </li></ul><ul><ul><li>Current and former employees hacking or planting viruses </li></ul></ul><ul><li>Natural Events and Disasters </li></ul><ul><ul><li>Hurricanes, floods, fire </li></ul></ul>NB
  10. 10. Network Security <ul><li>Authentication </li></ul><ul><ul><li>User ID and password used to access the network </li></ul></ul><ul><ul><li>Use of a possessed object for access </li></ul></ul><ul><li>Access privileges </li></ul><ul><ul><li>Enable access to certain network systems </li></ul></ul><ul><li>Physical protection measures </li></ul><ul><ul><li>Restrict physical access to sensitive network equipment </li></ul></ul><ul><ul><li>Magnetic card readers </li></ul></ul><ul><ul><li>Biometric access devices </li></ul></ul>NB
  11. 11. Network Security <ul><li>Firewalls </li></ul><ul><ul><li>Prevent access to the network by unauthorized users </li></ul></ul><ul><ul><li>Composed of software and/or hardware </li></ul></ul><ul><ul><li>Screen and validate data packets </li></ul></ul><ul><ul><li>Bastion host/proxy server </li></ul></ul>NB
  12. 12. Network Firewall Layout NB