SlideShare a Scribd company logo
1 of 10
NETWORK SECURITY OVER
ETHERNET
BY
Syed Ubaid Ali Jaffery
CEO Uj Consultant & solution
Provider
Information Security Expert
2
ETHERNET TECHNOLOGY
Band Specification
________________
802.3
802.5
802.6
802.11
802.11b, 802.11g
802.11a
802.16
802.16m , 802.16e
Technology
____________
Ethernet LAN
Token Ring
Man(Fiber
distributed
data interface)
WLAN
WLAN (2.4 Ghz)
WLAN (5 Ghz)
Wi-Max
Wi-Max(Mobile)
Physical/Logical
____________
Physical
Physical
Physical
Physical
Logical
Logical
Physical
Logical
Guided/Unguided
______________
Guided
Guided
Guided
Unguided
Unguided
Unguided
Unguided
Unguided
3
Inside An Operating System
Security Level
OS Name Security Percentage
• Windows 95 39%
• Windows 98 46%
• Windows ME 50%
• Windows 2000 57.46%
• Windows XP Sp1 63.33%
• Windows XP Sp2 68.0%
• Windows 7 Ultimate 70%
• Windows Vista Ultimate 73%
• Linux RadHat 60%
• Linux Fedora 73%
• Linux Distribution All 80-84%
• Linux Distro Backtrack 94%
4
Outside An Operating System Security
Levels
5
WHAT ?
• What an Intruder Seek?
• What an intruder do with that
information?
• What should be protected?
• What resources are required
to protect?
What Information are required to
Attack a user?
The security level for a user is become incredibly low. An attack
can be made by having these information:
1) An IP Address
2) Operating System Vulnerability
3) Vulnerability Exploit and
4) A connection Oriented Session
7
How Attacks are Performed
• Port Scanning
• Network Scanning
• Information Gathering
• Vulnerabilities Assessment
• Trace Route.
• Steganography
8
Covering Tracks
• Root kits
• System log Removal
• Databases Injection
9
THANK YOU
9
THANK YOU

More Related Content

What's hot

Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายหน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายsoifha
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSylvie Boube-Politano
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bSylvain Martinez
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityDeepakraj Sahu
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityChris Sistrunk
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015CODE BLUE
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Yuichi Ito
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 

What's hot (20)

Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Wireless security
Wireless securityWireless security
Wireless security
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายหน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
 
Cisco CCNA module 3
Cisco CCNA module 3Cisco CCNA module 3
Cisco CCNA module 3
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Cisco CCNA module 8
Cisco CCNA module 8Cisco CCNA module 8
Cisco CCNA module 8
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 

Viewers also liked

Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri
 
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...Todd Nilson
 
Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)Todd Nilson
 

Viewers also liked (6)

Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
 
Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)
 

Similar to Network Security Over Ethernet Explained

IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
cisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdfcisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdfHi-Network.com
 
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHzRedes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHzandrerasminio
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdfJokaTek
 
cisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdfcisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdfcisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdfHi-Network.com
 
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfNeed key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfarkleatheray
 
cisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfcisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfHi-Network.com
 
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptxWireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptxbrianbrowne13
 
cisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdfcisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdfcisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfcisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfHi-Network.com
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAnicholas njoroge
 
cisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdfcisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdfcisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdfHi-Network.com
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
cisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdfcisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdfHi-Network.com
 

Similar to Network Security Over Ethernet Explained (20)

IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
cisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdfcisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdf
 
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHzRedes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHz
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
cisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdfcisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdf
 
cisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdfcisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdf
 
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfNeed key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdf
 
cisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfcisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdf
 
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptxWireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
 
cisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdfcisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdf
 
cisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdfcisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdf
 
cisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfcisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdf
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USA
 
cisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdfcisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdf
 
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
cisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdfcisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdf
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
cisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdfcisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdf
 

More from Syed Ubaid Ali Jafri

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Syed Ubaid Ali Jafri
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Syed Ubaid Ali Jafri
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Syed Ubaid Ali Jafri
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri
 

More from Syed Ubaid Ali Jafri (14)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
LAN Security
LAN Security LAN Security
LAN Security
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Network Security Over Ethernet Explained

  • 1. NETWORK SECURITY OVER ETHERNET BY Syed Ubaid Ali Jaffery CEO Uj Consultant & solution Provider Information Security Expert
  • 2. 2 ETHERNET TECHNOLOGY Band Specification ________________ 802.3 802.5 802.6 802.11 802.11b, 802.11g 802.11a 802.16 802.16m , 802.16e Technology ____________ Ethernet LAN Token Ring Man(Fiber distributed data interface) WLAN WLAN (2.4 Ghz) WLAN (5 Ghz) Wi-Max Wi-Max(Mobile) Physical/Logical ____________ Physical Physical Physical Physical Logical Logical Physical Logical Guided/Unguided ______________ Guided Guided Guided Unguided Unguided Unguided Unguided Unguided
  • 3. 3 Inside An Operating System Security Level OS Name Security Percentage • Windows 95 39% • Windows 98 46% • Windows ME 50% • Windows 2000 57.46% • Windows XP Sp1 63.33% • Windows XP Sp2 68.0% • Windows 7 Ultimate 70% • Windows Vista Ultimate 73% • Linux RadHat 60% • Linux Fedora 73% • Linux Distribution All 80-84% • Linux Distro Backtrack 94%
  • 4. 4 Outside An Operating System Security Levels
  • 5. 5 WHAT ? • What an Intruder Seek? • What an intruder do with that information? • What should be protected? • What resources are required to protect?
  • 6. What Information are required to Attack a user? The security level for a user is become incredibly low. An attack can be made by having these information: 1) An IP Address 2) Operating System Vulnerability 3) Vulnerability Exploit and 4) A connection Oriented Session
  • 7. 7 How Attacks are Performed • Port Scanning • Network Scanning • Information Gathering • Vulnerabilities Assessment • Trace Route. • Steganography
  • 8. 8 Covering Tracks • Root kits • System log Removal • Databases Injection