SlideShare a Scribd company logo
1 of 19
General Introduction
Network Security
Scanning

10/23/13

1
Outline
1: Introduction to Network Security
2: basics of network
4: Network Structure
5: Data packets
6: Virtual Private Networks
7: Defending against Virus Attacks
8 Defending against Trojan Horses and Spyware
9: Computer-based Espionage and Terrorism

10/23/13

2
Introduction
The growth of the Internet has brought many
ways in which networks can be
compromised and data stolen.
Legislators are working to prevent identity
theft and ways to reduce the effects of
viruses and worms and others.

10/23/13

3
The Basics of a Network
• You need to understand the following:
– Basic network structure
– Data packets
– What does this mean for security?

10/23/13

4
10/23/13

5
Basic Network Structure
• The fundamental purpose of networks is
for communication
• Part of the network structure includes:
– NICs (network information card), hubs,
switches, routers, and firewalls

• Network architecture comprises the format
in which these devices are connected

10/23/13

6
Data Packets
• When a workstation wishes to send data, it
uses the client network software to enclose
the data in a 'packet' containing a 'header'
and a 'trailer'.
• The header and trailer contain information for
the destination computer. For example, the
header contains the address of the
destination computer.
• The exact form the packets take is determined
by the protocol the network uses.
10/23/13

7
Data Packets
• This is the package that holds the data
and transmission information
• Ultimately formatted in binary
• Information included in packets:
– Source and destination (IP Address)
information
– Packet size (in bytes) and type (e.g. Ethernet)
– Data and other header information
10/23/13

8
• When a data packet is put onto the network by a
workstation, each computer on the network
examines the packet to see who it is intended
for. The packet quickly dissipates if it is not
recognized, allowing other packets to be sent.
The rate at which packets can be sent is called
the 'bandwidth' (this has a somewhat different
meaning to how bandwidth is normally used).
As an example, a bandwidth of 10 Megabits per
second means that ten million individual 1s and
0s can pass through the network in one second.
10/23/13

9
What Does This Mean for Security?
• There are two points of attack:
– The data packet itself
– The devices that connect the network

• These are also the points of security
– Protect the data (encryption)
– Secure the network devices

10/23/13

10
Port scanning
• A port scanner is a handy tool that scans a
computer looking for active ports. With this utility,
a potential “hacker” can figure out what services
are available on a targeted computer from the
responses the port scanner receives.
• These tools scan large IP spaces and report on
the systems they encounter, the ports available,
and other information, such as OS types.
• The most popular port scanner is Network
Mapper (Nmap).
10/23/13

11
Nmap
Nmap (“Network Mapper”) is an open source
utility for network exploration or security
auditing. It was designed to rapidly scan large
networks, although it works fine against single
hosts. Nmap uses raw IP packets to determine
what hosts are available on the network, what
services (ports) they are offering, what operating
system (and OS version) they are running, what
type of packet filters/firewalls are in use, and
dozens of other characteristics. Nmap runs
10/23/13

12
Vulnerability Scanners
Tools available for scanning vulnerable systems.
Vulnerability scanners look for a specific
vulnerability or scan a system for all potential
vulnerabilities. Vulnerability tools are freely
available. The most popular and best-maintained
vulnerability scanner available, Nessus.

10/23/13

13
•

I have often heard that the best approach to
computer security is to use a layered approach.
Can you describe this approach and how an IDS
fits in?
The security model that will protect your organization
should be built upon the following layers:
1. Security policy of your organization
2. Host system security
3. Auditing
4. Router security
5. Firewalls
6. Intrusion detection systems
7. Incident response plan
10/23/13

14
Threats to Network Security
• Insecure Architectures
A misconfigured network is a primary entry point for
unauthorized users. Leaving a trust-based, open local
network vulnerable to the highly-insecure Internet
– Centralized Servers
– Broadcast Networks

10/23/13

15
Threats to Server Security

•Unused Services and Open Ports
•Unpatched Services

10/23/13

16
• Technical Controls
– Encryption
– Smart cards
– Network authentication
– Access control lists (ACLs)
– File integrity auditing software

10/23/13

17
Summary
• Approaches to securing your network:
– Proactive vs. reactive
– Perimeter: focus is on perimeter devices,
internal devices are still vulnerable
– Layered: focus includes both perimeter and
individual computers within the network
– Hybrid: combination of multiple security
paradigms
10/23/13

18
Thank you

10/23/13

19

More Related Content

What's hot

Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile ComputingNitin Ujgare
 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1Sujesh Lal
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1arjun0222
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computingaazeem689
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingFaindra Jabbar
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 

What's hot (19)

Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
Nomadic Computing
Nomadic ComputingNomadic Computing
Nomadic Computing
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computing
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Manika
ManikaManika
Manika
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer Networking
 
niceData com.
niceData com.niceData com.
niceData com.
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Viewers also liked

Incentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in IndiaIncentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in IndiaVinnir Enterprises
 
Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)I4MS_eu
 
Rpp kelas 4 2013
Rpp kelas 4 2013Rpp kelas 4 2013
Rpp kelas 4 2013yudiyunika
 
1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_port1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_portNauticgarraf
 
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)I4MS_eu
 
Francis Wray, Scapos, UK
Francis Wray, Scapos, UKFrancis Wray, Scapos, UK
Francis Wray, Scapos, UKI4MS_eu
 
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...I4MS_eu
 
Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)Afdal Anwar
 
Oscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ESOscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ESI4MS_eu
 
Prophetic leadership quality
Prophetic leadership qualityProphetic leadership quality
Prophetic leadership qualityIman Ali
 
historia de la tipografia
historia de la tipografiahistoria de la tipografia
historia de la tipografiaAndres Castillo
 
Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014I4MS_eu
 
Nikos Kexagias
Nikos KexagiasNikos Kexagias
Nikos KexagiasI4MS_eu
 
презентация решения Si 10.13
презентация решения Si 10.13презентация решения Si 10.13
презентация решения Si 10.13Alexey Korotaev
 
Carles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ESCarles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ESI4MS_eu
 
Rpp kelas 5 2013
Rpp kelas 5  2013Rpp kelas 5  2013
Rpp kelas 5 2013yudiyunika
 

Viewers also liked (18)

Incentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in IndiaIncentives and Support scheme for R&D Units in India
Incentives and Support scheme for R&D Units in India
 
Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)Stefan Lender, Invent, DE (Intefix)
Stefan Lender, Invent, DE (Intefix)
 
Rpp kelas 4 2013
Rpp kelas 4 2013Rpp kelas 4 2013
Rpp kelas 4 2013
 
1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_port1 dossier a5_unificat_portada_port
1 dossier a5_unificat_portada_port
 
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
Alessandro Arcidiacono, Enginsoft, IT (Fortissimo)
 
Matriks putta
Matriks puttaMatriks putta
Matriks putta
 
Francis Wray, Scapos, UK
Francis Wray, Scapos, UKFrancis Wray, Scapos, UK
Francis Wray, Scapos, UK
 
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
Max Lemke | Innovation actions in Horizon 2020 Fostering collaboration with M...
 
Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)Persentase kenaikan dau 2015 2016 indonesia (autosaved)
Persentase kenaikan dau 2015 2016 indonesia (autosaved)
 
Oscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ESOscar Gonzalo, Tekniker, ES
Oscar Gonzalo, Tekniker, ES
 
Prophetic leadership quality
Prophetic leadership qualityProphetic leadership quality
Prophetic leadership quality
 
historia de la tipografia
historia de la tipografiahistoria de la tipografia
historia de la tipografia
 
Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014Webinar Fortissimo - 15/05/2014
Webinar Fortissimo - 15/05/2014
 
Andrés salazar
Andrés salazarAndrés salazar
Andrés salazar
 
Nikos Kexagias
Nikos KexagiasNikos Kexagias
Nikos Kexagias
 
презентация решения Si 10.13
презентация решения Si 10.13презентация решения Si 10.13
презентация решения Si 10.13
 
Carles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ESCarles Oriach Font, Monocrom, ES
Carles Oriach Font, Monocrom, ES
 
Rpp kelas 5 2013
Rpp kelas 5  2013Rpp kelas 5  2013
Rpp kelas 5 2013
 

Similar to Securitych1

A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSKatie Robinson
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information SecurityRachel Phillips
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
CSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayCSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayRochelle Schear
 

Similar to Securitych1 (20)

Network security
Network securityNetwork security
Network security
 
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLSA CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
A CASE STUDY ON VARIOUS NETWORK SECURITY TOOLS
 
CY.pptx
CY.pptxCY.pptx
CY.pptx
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
G011123539
G011123539G011123539
G011123539
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
50120140501013
5012014050101350120140501013
50120140501013
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Modules1
Modules1Modules1
Modules1
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
CSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment EssayCSEC 610 Individual Assignment Essay
CSEC 610 Individual Assignment Essay
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Securitych1

  • 2. Outline 1: Introduction to Network Security 2: basics of network 4: Network Structure 5: Data packets 6: Virtual Private Networks 7: Defending against Virus Attacks 8 Defending against Trojan Horses and Spyware 9: Computer-based Espionage and Terrorism 10/23/13 2
  • 3. Introduction The growth of the Internet has brought many ways in which networks can be compromised and data stolen. Legislators are working to prevent identity theft and ways to reduce the effects of viruses and worms and others. 10/23/13 3
  • 4. The Basics of a Network • You need to understand the following: – Basic network structure – Data packets – What does this mean for security? 10/23/13 4
  • 6. Basic Network Structure • The fundamental purpose of networks is for communication • Part of the network structure includes: – NICs (network information card), hubs, switches, routers, and firewalls • Network architecture comprises the format in which these devices are connected 10/23/13 6
  • 7. Data Packets • When a workstation wishes to send data, it uses the client network software to enclose the data in a 'packet' containing a 'header' and a 'trailer'. • The header and trailer contain information for the destination computer. For example, the header contains the address of the destination computer. • The exact form the packets take is determined by the protocol the network uses. 10/23/13 7
  • 8. Data Packets • This is the package that holds the data and transmission information • Ultimately formatted in binary • Information included in packets: – Source and destination (IP Address) information – Packet size (in bytes) and type (e.g. Ethernet) – Data and other header information 10/23/13 8
  • 9. • When a data packet is put onto the network by a workstation, each computer on the network examines the packet to see who it is intended for. The packet quickly dissipates if it is not recognized, allowing other packets to be sent. The rate at which packets can be sent is called the 'bandwidth' (this has a somewhat different meaning to how bandwidth is normally used). As an example, a bandwidth of 10 Megabits per second means that ten million individual 1s and 0s can pass through the network in one second. 10/23/13 9
  • 10. What Does This Mean for Security? • There are two points of attack: – The data packet itself – The devices that connect the network • These are also the points of security – Protect the data (encryption) – Secure the network devices 10/23/13 10
  • 11. Port scanning • A port scanner is a handy tool that scans a computer looking for active ports. With this utility, a potential “hacker” can figure out what services are available on a targeted computer from the responses the port scanner receives. • These tools scan large IP spaces and report on the systems they encounter, the ports available, and other information, such as OS types. • The most popular port scanner is Network Mapper (Nmap). 10/23/13 11
  • 12. Nmap Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs 10/23/13 12
  • 13. Vulnerability Scanners Tools available for scanning vulnerable systems. Vulnerability scanners look for a specific vulnerability or scan a system for all potential vulnerabilities. Vulnerability tools are freely available. The most popular and best-maintained vulnerability scanner available, Nessus. 10/23/13 13
  • 14. • I have often heard that the best approach to computer security is to use a layered approach. Can you describe this approach and how an IDS fits in? The security model that will protect your organization should be built upon the following layers: 1. Security policy of your organization 2. Host system security 3. Auditing 4. Router security 5. Firewalls 6. Intrusion detection systems 7. Incident response plan 10/23/13 14
  • 15. Threats to Network Security • Insecure Architectures A misconfigured network is a primary entry point for unauthorized users. Leaving a trust-based, open local network vulnerable to the highly-insecure Internet – Centralized Servers – Broadcast Networks 10/23/13 15
  • 16. Threats to Server Security •Unused Services and Open Ports •Unpatched Services 10/23/13 16
  • 17. • Technical Controls – Encryption – Smart cards – Network authentication – Access control lists (ACLs) – File integrity auditing software 10/23/13 17
  • 18. Summary • Approaches to securing your network: – Proactive vs. reactive – Perimeter: focus is on perimeter devices, internal devices are still vulnerable – Layered: focus includes both perimeter and individual computers within the network – Hybrid: combination of multiple security paradigms 10/23/13 18

Editor's Notes

  1. Securing the data and the network devices are covered in later chapters. This is the basic purpose of this book, to secure the data and the network devices that allow communication between and among organizations.