Advanced Internet Final


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Protocols: The protocol is the pre-defined way that someone who wants to use a service talks with that service. Protocols are often text, and simply describe how the client and server will have their conversation. The http in the Web's protocol. Ports - Any server machine makes its services available to the Internet using numbered ports , one for each service that is available on the server
  • Advanced Internet Final

    1. 1. Home Network Security – Your First Line of Defense Presentation BY: Laurie Kunkler Nate Hartmann Ferid ZNaIdia Taylan malak
    2. 2. Team network
    3. 3. Basic Overview & Objectives <ul><li>What is a home network </li></ul><ul><li>What is a firewall </li></ul><ul><li>Why does it need a firewall </li></ul><ul><li>What does a firewall actually do </li></ul><ul><li>How does a firewall work </li></ul><ul><li>How to obtain a firewall/How to check if you currently have a fire wall </li></ul><ul><li>Hardware firewalls vs. software firewalls and antivirus software </li></ul>
    4. 4. What is a Home Network? <ul><li>Two or more computers in the home that are interconnected for file sharing and/or Internet access. </li></ul>
    5. 5. <ul><li>The main advantage of a network is that multiple users can simultaneously interact with each other and share resources, for example the internet connection </li></ul><ul><li>After the home network is created, if using a wireless router many wireless devices such as laptops can connect to it. </li></ul><ul><li>Set up can be easy for those who are computer savvy - we will be explaining later on how simple it can be </li></ul><ul><li>You can also add devices to the network like a printer. This will allow anyone with access rights to be able to print a file on any of the computers connected to the network </li></ul>Advantages and Disadvantages of Home Networks SOME ADVANTAGES SOME DISADVANTAGES <ul><li>Equipment can add up and be costly </li></ul><ul><li>Set up can be challenging for those who are not computer savvy </li></ul><ul><li>If wireless on the router is not secured, anyone within range could be stealing the Internet connection and potentially result other outside users access to personal data. (we will discuss firewalls later in presentation) </li></ul>
    6. 6. What is a Firewall? <ul><li>Secure internet gateway that is used in order to interconnect a private network to the internet. </li></ul><ul><li>A system designed to prevent unauthorized access to or from a private network. </li></ul><ul><li>Firewalls can be implemented in both hardware and software, or a combination of both. </li></ul><ul><li>Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. </li></ul>
    7. 7. You Lock Your House Doors and Windows – Why Not Your Network
    8. 8. What does a firewall do? <ul><li>It keeps harmful packets of data from entering or exiting your local area network (LAN) </li></ul><ul><li>Blocks humans or programs from entering your LAN </li></ul><ul><li>Administrators set guidelines or rules for what is allowed in or out </li></ul><ul><li>A firewall is an integral part of a home network security system but more is needed </li></ul><ul><li>If a user tells the system that certain data or applications are “OK” to pass through the firewall, it will not stop those information packets from entering </li></ul>
    9. 9. How does a firewall work? <ul><li>A perfect firewall would allow no information to enter your network and no information to leave </li></ul><ul><li>Administrator must determine a set of guidelines for the firewall to follow – usually to start out, it is safe to disallow everything and then only allow those data transactions which are necessary and you know are safe </li></ul><ul><li>Firewalls are customizable using the following criteria: </li></ul><ul><ul><li>IP address </li></ul></ul><ul><ul><li>Domain names </li></ul></ul><ul><ul><li>Protocols FTP, SMTP, UDP, etc. </li></ul></ul><ul><ul><li>Ports port 20 or port 21, echo 7, telnet 23 </li></ul></ul><ul><ul><li>Specific keywords or phrases “X-rated” “Viagra” </li></ul></ul>
    10. 10. How does a firewall work? <ul><li>The firewall uses one or more of the following techniques: </li></ul><ul><ul><li>packet filtering or static packet filtering </li></ul></ul><ul><ul><ul><li>Checks the header of every packet of </li></ul></ul></ul><ul><ul><ul><li>information as it enters or exits the network </li></ul></ul></ul><ul><ul><ul><li>– only allows packets that are approved </li></ul></ul></ul><ul><ul><li>proxy server or application layer firewall </li></ul></ul><ul><ul><li>stateful inspection or dynamic packet filtering </li></ul></ul><ul><ul><ul><li>Monitors header and application level of each packet </li></ul></ul></ul><ul><ul><ul><li>Tracks accepted and denied packet in a table for finer sorting of data transfer or blockage </li></ul></ul></ul><ul><ul><ul><li>More involved and active filtering than static packet filtering </li></ul></ul></ul>Internet Proxy Server
    11. 12. How to find my Firewall? <ul><li>A firewall is a piece of software or hardware that sits between a private network and a public network. </li></ul><ul><li>A personal firewall is included with Windows XP/ VISTA/ Mac. </li></ul><ul><li>It will block inbound attacks but will not control network access to programs running on your computer. </li></ul><ul><li>It is a valuable security tool and should be enabled on most Windows XP/ VISTA/ Mac computers. </li></ul>
    12. 13. How to Find My Firewall continued <ul><li>Windows Vista or Windows XP Service Pack 2 </li></ul><ul><li>Click &quot;Start,&quot; then &quot;Control Panel.“ </li></ul><ul><li>Click &quot;Security Center.“ </li></ul><ul><li>Click &quot;Windows Firewall.&quot; </li></ul><ul><li>Mac Operating System </li></ul><ul><li>Click the Apple icon, then &quot;System Preferences.“ </li></ul><ul><li>Select &quot;View,&quot; then &quot;Sharing,&quot; then &quot;Firewall.“ </li></ul><ul><li>Select &quot;Security&quot; if you have Mac OS X 10.5 (Leopard), </li></ul><ul><li>Then click the &quot;Firewall&quot; tab. </li></ul><ul><li>Windows XP </li></ul><ul><li>Click &quot;Start,&quot; then &quot;Control Panel.“ </li></ul><ul><li>Click &quot;Network and Internet Connections,&quot; </li></ul><ul><li>Then &quot;Network Connections.“ </li></ul><ul><li>Click the icon of the connection you wish to protect, such as Dial-Up or LAN or High Speed Internet. </li></ul><ul><li>On the left, under &quot;Network Tasks,&quot; </li></ul><ul><li>Click &quot;Change settings of this connection“ </li></ul><ul><li>Select &quot;Internet Connection Firewall.&quot; </li></ul>
    13. 14. How Do I Enable Windows XP Internet Connection Firewall? <ul><li>Note : </li></ul><ul><li>If you don't have an  Advanced Tab : </li></ul><ul><li>right-click  Local Area Connection  again </li></ul><ul><li>Click  Remove from Bridge . </li></ul><ul><li>Then go back to  Properties  and  Advanced Tab . </li></ul><ul><li>Check the box labeled &quot;Protect my computer and network by limiting or preventing access to this computer from the Internet&quot;. </li></ul><ul><li>Click OK </li></ul><ul><li>To enable Firewall: </li></ul><ul><li>Click  Start </li></ul><ul><li>Click  Control Panel . </li></ul><ul><li>Click  Network and Internet Connections </li></ul><ul><li>Click the  Network Connections  Control Panel Icon </li></ul><ul><li>Right-click  Local Area Connection  and </li></ul><ul><li>select  Properties </li></ul><ul><li>Click the  Advanced  Tab </li></ul>
    14. 15. Do I have one already? How to Find My Firewall <ul><li>Click &quot;Start,&quot; </li></ul><ul><li>Then click &quot;All Programs.“ </li></ul><ul><li>Search for the firewall program. (third-party firewall programs include McAfee, Symantec and Tiny Personal Firewall) </li></ul><ul><li>Find the third party software program </li></ul><ul><li>Select the program icon in the bottom right-hand corner of the computer screen. </li></ul>
    15. 16. Hardware firewall vs. Software firewalls <ul><li>  Software firewalls </li></ul><ul><li>Provide level of protection to keep safe from hackers and other unwanted intrusions. </li></ul><ul><li>Software is far easier for computer novices to customize. </li></ul><ul><li>Some top software firewall packages include anti-spam, antivirus, even anti-popup ad software. </li></ul><ul><li>Some software firewalls include parental controls – websites children visit. </li></ul><ul><li>Some packages allow you to block photos and specific text content . </li></ul><ul><li>The features are suited to smaller home networks. </li></ul><ul><li>Hardware firewall </li></ul><ul><li>A small metal box filled with plug openings, or ports. </li></ul><ul><li>You hook the computer network into the box then set it up on your computer. </li></ul><ul><li>Hardware firewalls are typically found in broadband routers. </li></ul><ul><li>A hardware firewall is less vulnerable than a software firewall. </li></ul><ul><li>Hardware firewalls are best suited to businesses and large networks . </li></ul>
    17. 18. Third-Party Personal Software <ul><li>Basic Features: </li></ul><ul><li>-Block incoming and outgoing threats </li></ul><ul><li>. computer might have outgoing threats when its infected by viruses, Trojans, or spyware </li></ul><ul><li>-Distinguish between threats and legitimate software </li></ul><ul><li>. include a list of safe software for the firewall to check </li></ul><ul><li>. malware to block it </li></ul><ul><li>. issue a pop up alert for the user asking for advice on what to do </li></ul><ul><li>Recommended personal firewalls with links to vendors: </li></ul><ul><li>Online Armor </li></ul><ul><li>Checkpoint ZoneAlarm Firewall </li></ul><ul><li>PC Tools Firewall Plus </li></ul><ul><li>Private Firewall </li></ul><ul><li>Comodo Firewall Pro </li></ul><ul><li>Agnitum Outpost Firewall Pro </li></ul>
    18. 19. <ul><li>Basic Features: </li></ul><ul><li>- Include two or more security features: </li></ul><ul><li>. Personal Firewall </li></ul><ul><li>. Anti-Virus </li></ul><ul><li>. Anti-Spyware </li></ul><ul><li>Recommended Internet security (IS) suites with links to vendors: </li></ul><ul><li>Norton Internet Security 2011 Norton 360 V 5.0 </li></ul><ul><li>Kaspersky IS 2011 </li></ul><ul><li>BitDefender IS 2011 </li></ul><ul><li>Webroot IS Complete </li></ul>Internet Security Software Suites
    19. 20. Hardware Firewalls <ul><li>Basic Features: </li></ul><ul><li>-Based on “NAT” which hides your computer from the internet </li></ul><ul><li>. “NAT” Plus can be purchased for more protection </li></ul><ul><li>-Three basic types of hardware devices: </li></ul><ul><li>. Wired Routers </li></ul><ul><li>. Wireless Routers </li></ul><ul><li>. Broadband Gateways </li></ul><ul><li>Recommended hardware firewall products with links to vendors: </li></ul><ul><li>D-Link 655 Xtreme N Wireless Router with QoS and Gigabit Ports </li></ul><ul><li>ZoneAlarm Secure Wireless Router </li></ul>
    20. 21. Source List <ul><li> </li></ul><ul><li> </li></ul><ul><li>http:// </li></ul><ul><li>http:// </li></ul><ul><li> </li></ul><ul><li>http:// =6UtiQwCX2wU&feature=related </li></ul><ul><li>http:// / </li></ul><ul><li>http:// </li></ul><ul><li>http:// </li></ul><ul><li> </li></ul><ul><li> </li></ul>