Network Security

Download Report

Transcript Network Security

By: Brett Belin
 Used to be only tackled by highly trained professionals
 As the internet grew, more and more people became
familiar with securing a network
 Typically involves all activities that an organization,
enterprise, or institutions undertake to protect their
assets
 Consists of two or more computers that are linked
together in order to share certain resources
 They can be linked by cables, wires, waves, or satellites
 Two basic types of networks
 LAN
 WAN
 Known as Local Area Network
 Typically confined to a small area
 Computers on this network are rarely over a mile a part
in distance
 WAN stands for Wide Area Networks
 They are used to connect a much bigger network
 Involves more extensive wiring since the network is a
lot bigger than LAN
 Designed to read and process requests sent from one
machine to another machine
 Also known as the host that is deployed to execute one
or more programs
 Usually have more processing power, memory, and
hard disk space than clients
 Prevent people from gaining access to your network
that should not be viewing your files
 It can lead to Breaches in Confidentiality
 Data destruction can take place if someone gets into
your system
 In addition, data manipulation can happen where they
tamper with your numbers or important information
 Technology Weakness
 Could be a protocol weakness
 Also a weakness within the operating system
 Configuration Weakness
 Wired unsecured
 Username and passwords are known to various amounts
of people
 Policies
 Lack of written security policy
 Sometimes lacks continuity
 Denial of Service (DoS)
 Unauthorized Access
 Spoofing
 Eavesdropping
 Probably the nastiest and most difficult to address
 They are easy to launch and usually very difficult to
track
 Basically what it does is sends more information than
the machine can handle
 Can be done in a variety of different attacks
 Usually just means that someone or something is
trying to gain access or resources from your machine
that should not be allowed to
 Create a Network Diagram
 This consists of symbols or pictures that tells you where
the computers and things are set up
 Could also include information such as what brand the
products are or how they are connected
 Understand the Network
 Who uses the network?
 What type of hardware?
 What is the internet connection like?
 Can regular patrons log onto the system?
 Log into the internet and type in the IP address of your
router into the address bar
 Go to the wireless tab and enter the SSID this number
should be located on the sticker of the router
 Next, go to the wireless tab/wireless security and
choose enable
 Choose either WEP or WEA encryption. WEA is a more
secure choice
 Choose either 64 or 128 bit encryption, once again the 128
bit is the more secure.
 Next you want to generate a passphrase
 By doing this, you only people that have the passphrase are
able to access the router and use your internet connection
 Another great way to secure your network
 Requires each person who should have access to have a
distinct name that he or she may log in with
 In addition, each name has a password or pin possibly
that only they should know
 This will minimize the chance of an unauthorized user
gaining access to your system and getting information
 Another great way to protect your network against
harmful attacks
 It is part of a computer system or network that is
designed to block unauthorized access while
permitting authorized users to communicate still
 Can be implemented in either hardware or software or
even a combination of both
 Application Gateways
 These were the first types of firewalls
 Sometimes known as proxy gateways
 Run special Software to act as a proxy server
 It is run on the Application layer of the ISO/OSI model
which is where it gets the name
 Clients must know how to use the proxy in order to use
the Internet services
 Packet Filtering
 Routers by default will pass all traffic sent it, and do so
with out and restrictions
 By implementing this, you now have a restriction on
what type of outside things can gain access to your
network
 Must be implemented in layers in order to localize all
traffic in order to get to the host itself
 Lots of options are out there to choose from
 It is important to look at your diagram that you made
earlier in order to figure out which one is best for you
 They are good because you can protect a bunch of
computers behind the same firewall
 Also, you can put a firewall on the individual computer
as well as put it on the network itself
 Network security is a very vital component not only to
large business, but also your own home
 A lot of information that is sent and received across
networks is confidential and not everyone should have
access to it
 If the wrong person gets a hold of the data they can
tamper it an alter it that may directly or indirectly
affect a lot of people
 In order to properly protect your network, you may
need to use a variety of different things
 For example, make it so that everyone has to have
some sort of code in order to gain access to the system
whether it by a username or biometrics
 Next, incorporate firewalls that make it more difficult
for an outside user to gain access to the system
 http://www.interhack.net/pubs/network-security/
 http://www.pcworld.com/article/130330/how_to_secu
re_your_wireless_network.html
 http://www.cisco.com/web/about/ac123/ac147/ac174/a
c200/about_cisco_ipj_archive_article09186a00800c85
ae.html
 http://fcit.usf.edu/network/