network security
TRANSCRIPT
Network Security
By: Tyrone Turner
What is Network Security?
• JUST THAT, IT IS SECURING THE NETWORK!
• It follows the four types of information assurance.
Types of Information Assurance
• Confidentiality• Integrity• Authentication• Availability
How do you secure your network?
• Firewalls• IDS/IPS• DMZ• Honey pots• Proxy servers• Protocol analyzers
Firewalls
• Block traffic• Controls and monitors access between
networks
Firewalls cont’d
• Offers 5 service and security features– Packet filtering– Stateful inspection– Access and authentication– Application layer filtering– Network Address Translation (NAT)
IDS/IPS
• IDS (Intrusion Detection Systems)– Used to see if someone is on your network
• IPS (Intrusion Prevention Systems)– Attempts to stop an unauthorized user before they
get in
DMZ
• DMZ (Demilitarized Zone)– Light protection between the internet and firewall
Honey pots
• Separate server or service that is used to attract hackers to attack it
Proxy servers
• These are network servers that accept and forwards from the clients and from servers
Protocol analyzers
• These applications monitor everything down to the frame.
• It can give you the information on Layers 7,5,3,2
What threatens a network?• Viruses -Attacks that particular system being used and there are 8 types:
– Boot Sector Viruses- infects the boot sector or partition table of the disk.– Companion Viruses- disguises itself as a legitimate using a legitimate program name but a different
extension – File infector Viruses- infects files that generally has the extension .com or .exe– Macro Viruses- attacks programs like excel and word– Memory Resident Viruses- when a system is infected by a virus that stays resident in the systems
memory, the virus will continue to stay in memory and infect other files– Polymorphic Viruses- changes itself with each infection. Created to confuse virus scan programs– Metamorphic Viruses- has the ability to change its form and the code keeps changing each time the virus
changes.– Stealth Viruses- hides itself from virus protection software by encrypting its code.
• Trojan Horse -A program that hides on your computer and waits to be executed.• Logic Bombs- Are distributed primarily by worms and viruses.
What threatens a network?Cont’d
• Worms- Is like a virus except it doesn’t need a person to be present to execute.
• Adware & Spyware– Adware monitors the websites you visit the most and use the
information gathered to create targeted advertisements.– Spyware is a program that sends information about what you are
doing or about your system over the internet.• Root kit- A type of back door program that is inserted into application
software• Botnets- Short for robot network. A bot is typically a type of computer
system that is attached to a network whose security has been compromised and runs malicious software completely unknown to the user.
• Privilege escalation- Exploits bugs in software to gain access.
Summary
• 4 types of Info Assurances• 6 types of ways to secure your network• 8 threats of a network
Thank You!