jaden terry. to obtain privacy and protect data from other people. o businesses customer/employee...

6
Jaden Terry

Upload: timothy-hutchinson

Post on 03-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Jaden Terry

To obtain privacy and protect data from other people. o Businesses

• Customer/Employee information• Credit card numbers• To gain a competitive advantage

o Government• Protect information from other countries• Protect classified information.

o Personal• Privacy

To prevent hackerso Viruses, malware etc.o Could potentially shut down computers or networks.

September 2012 bankso Shut down websites for many well known banks by

sending outrageous amounts of data to the websites. Sony PlayStation network

o Stealing account information and credit card numbers from about 77 million users.

o Shut down the PlayStation network for about 2 weeks. RAT (Remote Access Tool)

o Stealing government information

Passive Wiretapping

o Device that plugs into the network and allows someone to listen or see the network traffic.

o Another device allows them to read encrypted data.

Port Scanningo Identifies open ports on

a computer to see if they are accessible.

Active Spoofing

o Impersonating or concealing the IP address of another computer.

Denial of Serviceo Making a computer or

network unavailable. Buffer Overflow

o When the buffer is overrun with data, the extra data can be sent elsewhere.

Firewall – system that controls the incoming and outgoing traffic and determines whether or not packets should be allowed through.o Network layer: Packet filters that allow packets to pass

through if they match a certain rule set. Mac Address Filtering – Security method where MAC

addresses are used to determine if the network is accessible.o MAC addresses can be spoofed.

WPA/WPA2 (Wireless Protected Access) – Encrypts packets.o WPA2 uses AES (Advanced Encryption Standard)

protocol for encrypting packets.

Keep your computer updated – Some updates have improved security and reliability.

Use a Firewall and Anti-virus. Change passwords frequently and make them

strong. Use a network security key for a wireless

network, which will turn on encryption.