12 tait hybridsecurity

Post on 14-Jan-2015

761 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Slides from Technology in Action for CompSci 203.

TRANSCRIPT

Technology In ActionHybrid of chapter 7+12: Networking and Security

http://www.sepguy.com

Computer Threats

• Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

Hackers

• Anyone who unlawfully accesses a computer system

• Types of hackers: – White-hat– Black-hat– Script kiddies

NB

What Hackers Do

• Steal information from computers:– Credit card numbers– Bank account numbers

• Internet packet sniffing• Commit identity theft

NB

Denial of Service Attacks

• Backdoor programs – Trojan horse

– Zombies

• Denial of service attacks

NB

How Hackers Gain Access

• Direct access:– Hacking software

• Indirect access:– Internet connection– Logical ports

NB

Computer SafeguardsFirewalls

• Software programs or hardware designed to close logical ports to invaders– A firewall is built into Windows XP– More robust firewalls are available

from other vendors.– Firewalls are critical if you have an

always-on broadband connection.

NB

Network Navigation Devices• Switches and Bridges

– Send data on a specific route through the network

– Bridges send data between collision domains

• Routers– Send information

between two networks

8

NB

Network Security Threats

• Human Errors and Mistakes– Accidents and mistakes

• Malicious Human Activity– Current and former employees hacking or

planting viruses

• Natural Events and Disasters– Hurricanes, floods, fire

9

NB

Network Security

• Authentication– User ID and password used to access the network– Use of a possessed object for access

• Access privileges– Enable access to certain network systems

• Physical protection measures– Restrict physical access to sensitive network equipment– Magnetic card readers– Biometric access devices

10

NB

Network Security• Firewalls

– Prevent access to the network by unauthorized users

– Composed of software and/or hardware– Screen and validate data packets– Bastion host/proxy server

11

NB

Network Firewall Layout

12

NB

top related