12 tait hybridsecurity
DESCRIPTION
Slides from Technology in Action for CompSci 203.TRANSCRIPT
Technology In ActionHybrid of chapter 7+12: Networking and Security
http://www.sepguy.com
Computer Threats
• Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.
Hackers
• Anyone who unlawfully accesses a computer system
• Types of hackers: – White-hat– Black-hat– Script kiddies
NB
What Hackers Do
• Steal information from computers:– Credit card numbers– Bank account numbers
• Internet packet sniffing• Commit identity theft
NB
Denial of Service Attacks
• Backdoor programs – Trojan horse
– Zombies
• Denial of service attacks
NB
How Hackers Gain Access
• Direct access:– Hacking software
• Indirect access:– Internet connection– Logical ports
NB
Computer SafeguardsFirewalls
• Software programs or hardware designed to close logical ports to invaders– A firewall is built into Windows XP– More robust firewalls are available
from other vendors.– Firewalls are critical if you have an
always-on broadband connection.
NB
Network Navigation Devices• Switches and Bridges
– Send data on a specific route through the network
– Bridges send data between collision domains
• Routers– Send information
between two networks
8
NB
Network Security Threats
• Human Errors and Mistakes– Accidents and mistakes
• Malicious Human Activity– Current and former employees hacking or
planting viruses
• Natural Events and Disasters– Hurricanes, floods, fire
9
NB
Network Security
• Authentication– User ID and password used to access the network– Use of a possessed object for access
• Access privileges– Enable access to certain network systems
• Physical protection measures– Restrict physical access to sensitive network equipment– Magnetic card readers– Biometric access devices
10
NB
Network Security• Firewalls
– Prevent access to the network by unauthorized users
– Composed of software and/or hardware– Screen and validate data packets– Bastion host/proxy server
11
NB
Network Firewall Layout
12
NB