12 tait hybridsecurity

12
Technology In Action Hybrid of chapter 7+12: Networking and Security http://www.sepguy.com

Upload: university-of-calgary-school-of-creative-and-performing-arts

Post on 14-Jan-2015

764 views

Category:

Technology


1 download

DESCRIPTION

Slides from Technology in Action for CompSci 203.

TRANSCRIPT

Page 1: 12 Tait Hybridsecurity

Technology In ActionHybrid of chapter 7+12: Networking and Security

http://www.sepguy.com

Page 2: 12 Tait Hybridsecurity

Computer Threats

• Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

Page 3: 12 Tait Hybridsecurity

Hackers

• Anyone who unlawfully accesses a computer system

• Types of hackers: – White-hat– Black-hat– Script kiddies

NB

Page 4: 12 Tait Hybridsecurity

What Hackers Do

• Steal information from computers:– Credit card numbers– Bank account numbers

• Internet packet sniffing• Commit identity theft

NB

Page 5: 12 Tait Hybridsecurity

Denial of Service Attacks

• Backdoor programs – Trojan horse

– Zombies

• Denial of service attacks

NB

Page 6: 12 Tait Hybridsecurity

How Hackers Gain Access

• Direct access:– Hacking software

• Indirect access:– Internet connection– Logical ports

NB

Page 7: 12 Tait Hybridsecurity

Computer SafeguardsFirewalls

• Software programs or hardware designed to close logical ports to invaders– A firewall is built into Windows XP– More robust firewalls are available

from other vendors.– Firewalls are critical if you have an

always-on broadband connection.

NB

Page 8: 12 Tait Hybridsecurity

Network Navigation Devices• Switches and Bridges

– Send data on a specific route through the network

– Bridges send data between collision domains

• Routers– Send information

between two networks

8

NB

Page 9: 12 Tait Hybridsecurity

Network Security Threats

• Human Errors and Mistakes– Accidents and mistakes

• Malicious Human Activity– Current and former employees hacking or

planting viruses

• Natural Events and Disasters– Hurricanes, floods, fire

9

NB

Page 10: 12 Tait Hybridsecurity

Network Security

• Authentication– User ID and password used to access the network– Use of a possessed object for access

• Access privileges– Enable access to certain network systems

• Physical protection measures– Restrict physical access to sensitive network equipment– Magnetic card readers– Biometric access devices

10

NB

Page 11: 12 Tait Hybridsecurity

Network Security• Firewalls

– Prevent access to the network by unauthorized users

– Composed of software and/or hardware– Screen and validate data packets– Bastion host/proxy server

11

NB

Page 12: 12 Tait Hybridsecurity

Network Firewall Layout

12

NB