network security by quontra solutions uk
TRANSCRIPT
![Page 1: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/1.jpg)
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
QUONTRA SOLUTIONS
http://www.quontrasolutions.co.uk
Call us : 20-3734-1498/99
Network Security
![Page 2: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/2.jpg)
Network Security
Security DevicesFirewallsNetwork Access SecurityUser AuthenticationDevice SecurityCommon Security Threats
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 3: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/3.jpg)
Security DevicesExplain the function Of Hardware and
Software security devices.
Network Based Firewall Host Based FirewallIDS IPSVPN Concentrator
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 4: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/4.jpg)
Host Based FirewallSoftware Based Protection on a
deviceSees all the TrafficDifficult to manage
large groups
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 5: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/5.jpg)
Windows Firewall with Advanced [email protected]
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 6: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/6.jpg)
Network Based FirewallFilters Traffic By Port NumberCan Encrypt traffic in/out of the network.Can proxy trafficMost firewalls can be Layer 3 devices
(routers).
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 7: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/7.jpg)
Network Based FirewallAdvantages
Protects many devices at onceHigh-speed
DisadvantagesLimited Visibility into encrypted Information
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 8: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/8.jpg)
IDS/IPSIntrusion Detection SystemIntrusion Prevention System
IntrusionsExploits against Operating Systems , applications
etc.Bufferoverflows and other vulnerabilities
Detection Vs PreventionDetection – Alarm or AlertPrevention – Stop it before it gets into the network.
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 9: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/9.jpg)
IDS/IPSAdvantages
Watches all traffic through a network linkCan completely stop bad traffic
DisadvantagesLimited Visibility into encrypted DataYet Another device on the Network
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 10: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/10.jpg)
VPN concentrator
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 11: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/11.jpg)
Identify Common Security Threats and Mitigations
Security ThreatsDos ,viruses, worms ,attackers ,Man in
the middle attack ,Smurf ,Social engineering (phishing)
Mitigation TechniquesPolicies and Procedures ,user
training ,patch and updates
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 12: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/12.jpg)
Denial Of ServiceAnything that prevents a device from providing
normal services
DoS /DDoS Denial Of Service /Distributed Denial of service
Smurf AttacksPing sents to a broadcast address were
duplicated to all IP addresses on the subnets by the routers We fixed that in 1999
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 13: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/13.jpg)
Viruses and WormsViruses infect files and duplicate by
copying themselves with other documents
Worms don’t need any other files or programs in order to infect other devices
Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 14: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/14.jpg)
Man in the Middle AttackA form of electronic eavesdropping
Especially useful for encrypted communication
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 15: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/15.jpg)
Man in the Middle AttackA form of electronic eavesdropping
Especially useful for encrypted communication
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 16: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/16.jpg)
Social EngineeringMajor Threats
Electronically UndetectableSuspicious Telephone Call
Don’t give any information over the Telephone
Look out for unattended personsBadgesProcesses
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 17: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/17.jpg)
Phishing Electronic Version Of Social Engineering
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 18: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/18.jpg)
Mitigation Techniques
Policies and Procedures
User Training
Patches and Updates
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 19: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/19.jpg)
SummaryDoS (Denial Of Service) or DDoS
(Distributed DoS) prevent a device from providing normal services.
Man in the Middle Attack method can hackers use to intercept encrypted communication between stations
Phishing is the electronic method of social engineering to gather personal information.
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
![Page 20: Network security by quontra solutions uk](https://reader036.vdocuments.site/reader036/viewer/2022062704/556105e5d8b42a8c388b58e7/html5/thumbnails/20.jpg)
www.quontrasolutions.co.uk Call us : 20-3734-1498/99
TO KNOW MORE IN-DEPTH KNOWLEDGE CONTACT US
Call : 20-3734-1498/99
Email: [email protected]
http://www.quontrasolutions.co.uk
QUONTRA SOLUTIONS