the internet and security

32
THE INTERNET AND SECURITY Chapter 4

Upload: haroun

Post on 23-Feb-2016

34 views

Category:

Documents


0 download

DESCRIPTION

The Internet and Security. Chapter 4. six major roles and goals of IT. 1.Increase employee productivity by reducing time, errors and costs using 2.Enhance decision making 3.Improve team collaboration 4.Create business partnerships and alliances - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Internet and Security

 THE INTERNET AND SECURITY

Chapter 4

Page 2: The Internet and Security

2

SIX MAJOR ROLES AND GOALS OF IT

1. Increase employee productivity by reducing time, errors and costs using

2. Enhance decision making 3. Improve team collaboration 4. Create business partnerships and alliances 5. Enable global reach all over the world taking into

consideration the culture of each nation or society. 6. Facilitate organizational transformation as the

organization evolves and responds to the ever-changing marketplace.

Page 3: The Internet and Security

4-3

KEY TERMS______________________Transmission of all forms of communication including digital data, voice, fax, sound, and video from one location to another over some type of network

______________________A group of computers and peripheral devices connected by a communication channel capable of sharing information and other resources among users

______________________Is the carrying capacity of a telecommunications network. (i.e. the size of the telecommunications channel or pipeline)

Page 4: The Internet and Security

4-4

SAMPLE OF INTERPERSONAL USE OF TELECOMMUNICATIONS

Email with teeth

Page 5: The Internet and Security

4-5

SAMPLE OF INTERPERSONAL USE OF TELECOMMUNICATIONS

Page 6: The Internet and Security

4-6

SAMPLE OF BUSINESS USE OF TELECOMMUNICATIONS

Page 7: The Internet and Security

4-7

SAMPLE OF BUSINESS USE OF TELECOMMUNICATIONS

Page 8: The Internet and Security

4-8

HISTORY OF THE INTERNET

ARPANET 1960 (Advanced Research Project Agency Network)

NSFNET 1986(National Science Foundation Network)• Connected to ARPANET and many others (BITNET, CSNET,

etc) to become a major component of the Internet

Internet Support• Ongoing support comes from many universities, federal and

state governments, and national international research institutions and industry

Page 9: The Internet and Security

4-9

HOW THE INTERNET WORKS – PACKET SWITCHING

Packet Switching• Allows millions of users to send large and small chucks of

data across the Internet concurrently • Based on the concept of turn taking, packets from each user

are alternated in the shared network (below)• Networks connected to the Internet use this concept

Warriors

Page 10: The Internet and Security

4-10

HOW THE INTERNET WORKS – TCP/IP & ROUTERS

TCP – Transmission Control Protocol

IP – Internet Protocol

Routers• Connect one network to another• Identify each device on a network as unique using IP protocol• Serve as the “Traffic Cop” directing packets to their destination

TCP/IP Approach

Page 11: The Internet and Security

4-11

HOW THE INTERNET WORKS – CONNECTING NETWORKS

(Computer A) TCP - Breaks message into data packetsIP - Adds address of destination Computer D

Example: Sending a message from Computer A to D

(Computer D) TCP - Checks for missing packets, reassembles message,discards duplicatepackets

(Router) Reads IP Address of packet, routes message to Network 2 and Computer D

1 3

2

Page 12: The Internet and Security

4-12

HOW THE INTERNET WORKS – WEB ADDRESSES & DOMAINS

Domain• Identifies the Website (host)• Comes in many suffixes such

as:.edu (educational

institutions).org (organizations; non-

profit).mil (military).net (network organizations)

Example: microsoft.com(URL) Uniform Resource Locator• Identifies particular Web pages within a domain

Example: http://www.microsoft.com/security/default.mspx

IP Address• Each domain is associated

with one or more IP addresses• Format: a 32-bit address

written as 4 numbers (from 0-255) separated by periods

Example: 1.160.10.240

Page 13: The Internet and Security

4-13

HOW THE INTERNET WORKS – MANAGING THE INTERNETInternet Registry

• Central repository of all Internet-related information• Provides central allocation of all network system identifiers• Managed by Internet Assigned Numbers Authority (IANA)

Domain Name System (DNS)• Maintained by the Internet Registry• Used to associates hosts or domains with IP addresses• Root DNS database is replicated across the Internet

InterNic Registration Service• Assigns Internet Domains and IP addresses• Internet Corp. for Assigned Names and Number (ICANN) has

responsibility for managing IP addresses, domain names, and root server system management

Page 14: The Internet and Security

4-14

HOW THE INTERNET WORKS – CONNECTING TO THE INTERNET

Modem (stands for Modulate/Demodulate)

Internet Service Provider (ISP)

Network Access Points (NAPs)

Internet Backbone

Page 15: The Internet and Security

4-15

NETWORK CONNECTION TYPES

DSL (Digital Subscriber Line)

POTS (Plain Old Telephone Service)

ISDN (Integrated Services Digital Network)

Wireless• Fixed wireless• Mobile wireless

Cable Modem

IoS (Internet over Satellite)

Page 16: The Internet and Security

4-16

NETWORK CONNECTION TYPES

SONET (Synchronous Optical Network)

T1/T3 (Trunk Level 1 or 3)

ATM (Asynchronous Transfer Mode)

Page 17: The Internet and Security

4-17

CURRENT STATE OF THE INTERNET

Page 18: The Internet and Security

4-18

WORLD WIDE WEBHTTP (Hypertext Transfer Protocol)• A _____________ used to process user

requests for displaying Web pages from a Web server

Web Servers• A special computer that is specifically

designed to store and “_____________” Web pages

• This machine contains special _____________ and _____________ to perform its many specialized functions

Page 19: The Internet and Security

4-19

INFORMATION SYSTEM SECURITY

_____________ Precautions taken to keep all aspects of information systems safe from unauthorized access

Managerial MethodsSeveral techniques are commonly used to manage information systems security:

• _____________ Assessment• Controlling _____________• Organizational Policies and Procedures • Backups and _____________

Page 20: The Internet and Security

4-20

INFORMATION SYSTEM SECURITY – MANAGERIAL TECHNIQUES

Assessing RiskSecurity Audit

• Risk Analysis• Alternatives based on Risk Analysis:

• Risk Reduction• Risk _____________• Risk Transference –

Controlling AccessKeeping information safe by only allowing access to those that require it to do their jobs

• _____________ –• Access Control –

Page 21: The Internet and Security

4-21

INFORMATION SYSTEM SECURITY – MANAGERIAL TECHNIQUES

_____________ Policies and Procedures• Acceptable Use Policies – formally document how systems should be used, for what, and penalties for non-compliance

_____________ and _____________ Recovery• Backups – taking periodic snapshots of critical systems data and

storing in a safe place or system (e.g. backup tape)• Disaster Recovery Plans – spell out detailed procedures to be

used by the organization to restore access to critical business systems (e.g. viruses or fire)

• Disaster Recovery – executing Disaster Recovery procedures using backups to restore the system to the last backup if it was totally lost

Page 22: The Internet and Security

4-22

STATE OF IS SECURITY - SECURITY THREATS & TECHNOLOGIES

Security TechnologiesCompanies and research organizations continue to develop and refine technologies to prevent security breaches. Some Include:• _____________• _____________• _____________ and Encryption

Security Threats• _____________ Theft – • _____________ _____________– • Others: Spyware, Spam, Wireless Access, Viruses

Identity theft

Page 23: The Internet and Security

4-23

IS SECURITY: TECHNOLOGY

Firewall Techniques• Packet Filter – examine each packet entering and leaving

network and accept/reject based on rules• Application Level Control – Performs certain security measures

based on a specific application (e.g. file transfer)• Circuit Level Control – detects certain types of connections or

circuits on either side of the firewall• Proxy Server – acts as, or appears as, an alternative server that

hides the true network addresses

_____________ A system of software, hardware or both designed to detect intrusion and prevent unauthorized access to or from a private network

Page 24: The Internet and Security

24

FIREWALL CAPABILITYFirewall can Focus for security _____________ Enforce security _____________ Log internet _____________ Limit _____________

keeps one section of intranet separate from another

Firewall can not Protect against malicious _____________ Protect against connections that do not go

through it Protect against new _____________ Protect against _____________

Page 25: The Internet and Security

4-25

SECURITY THREAT: SPYWARE, SPAM, AND COOKIES

_____________ A message passed to a browser from a Web server. Used by legitimate programs to store state and user information

_____________ Any software that covertly gathers information about a user through an Internet connection without the user’s knowledge

_____________ Electronic junk mail or junk newsgroup postings usually for purpose of advertising some product and/or service

Page 26: The Internet and Security

4-26

SECURITY TECHNOLOGY: _____________

_____________ A sophisticated authentication technique used to restrict

access to systems, data and/or facilities

• Uses biological characteristics to identify individuals such as fingerprints, retinal patterns in the eye, etc. that are not easily counterfeited

Biometrics

Page 27: The Internet and Security

4-27

SECURITY THREAT: ACCESS TO WIRELESS

Unauthorized Access to Wireless NetworksWith the prevalence in use of wireless networks this threat is increasing• Problems - _____________ _____________ - an attacker accesses the network, intercepts data from it, and can use network services and/or send attack instructions without entering the building • Prevention - _____________ between network and user devices

Page 28: The Internet and Security

28

On 8 February, 1587 Elizabeth I of England

Page 29: The Internet and Security

4-29

SECURITY TECHNOLOGY: VPN AND _____________

_____________ The process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end

•_____________ - known and used to scramble messages (SSL)

•_____________ - not known and used by receiver to descramble

•_____________– a third party that issues keys

Page 30: The Internet and Security

4-30

HOW ENCRYPTION WORKS

Page 31: The Internet and Security

31

VIRTUAL PRIVATE NETWORK

Virtual private network (VPN): a secure _____________ between two points across the Internet

_____________ : the process by which VPNs transfer information by encapsulating traffic in IP packets over the Internet

Page 32: The Internet and Security

4-32

SECURITY THREAT: VIRUSES

VirusesPrograms that can attack a computer and/or a network and delete information, disable software, use up system resources, etc.

Prevention Steps:

AntiVirus software:

No Disk Sharing –

Delete Suspicious Email Messages –

Report Viruses –