Chapter 4: The Internet and Security

Download Report

Transcript Chapter 4: The Internet and Security

THE INTERNET AND SECURITY
Chapter 4
SIX MAJOR ROLES AND GOALS OF
IT
 1.
Increase employee productivity by reducing time,
errors and costs using
 2.
Enhance decision making
 3.
Improve team collaboration
 4.
Create business partnerships and alliances
 5.
Enable global reach all over the world taking into
consideration the culture of each nation or society.
 6.
Facilitate organizational transformation as the
organization evolves and responds to the ever-changing
marketplace.
2
KEY TERMS
______________________
Transmission of all forms of communication including digital
data, voice, fax, sound, and video from one location to another
over some type of network
______________________
A group of computers and peripheral devices connected by
a communication channel capable of sharing information
and other resources among users
______________________
Is the carrying capacity of a telecommunications
network. (i.e. the size of the telecommunications channel
or pipeline)
4-3
SAMPLE OF INTERPERSONAL USE OF
TELECOMMUNICATIONS
Email with teeth
4-4
SAMPLE OF INTERPERSONAL USE OF
TELECOMMUNICATIONS
4-5
SAMPLE OF BUSINESS USE OF
TELECOMMUNICATIONS
4-6
SAMPLE OF BUSINESS USE OF
TELECOMMUNICATIONS
4-7
HISTORY OF THE INTERNET
NSFNET 1986(National Science Foundation Network)
• Connected to ARPANET and many others (BITNET, CSNET,
etc) to become a major component of the Internet
Internet Support
• Ongoing support comes from many universities, federal and
state governments, and national international research
institutions and industry
4-8
ARPANET 1960 (Advanced Research Project Agency Network)
HOW THE INTERNET WORKS – PACKET SWITCHING
Warriors
Packet Switching
• Allows millions of users to send large and small chucks of
data across the Internet concurrently
• Based on the concept of turn taking, packets from each user
are alternated in the shared network (below)
• Networks connected to the Internet use this concept
4-9
HOW THE INTERNET WORKS – TCP/IP &
ROUTERS
TCP/IP Approach
TCP – Transmission Control Protocol
IP – Internet Protocol
Routers
• Connect one network to another
• Identify each device on a network as unique using IP protocol
• Serve as the “Traffic Cop” directing packets to their destination
4-10
HOW THE INTERNET WORKS – CONNECTING NETWORKS
Example: Sending a message from Computer A to D
2 (Router)
Reads IP Address of
packet, routes message to
Network 2 and Computer
D
1 (Computer A)
3 (Computer D)
TCP - Breaks message
into data packets
IP - Adds address of
destination Computer D
TCP - Checks
for missing packets,
reassembles message,
discards duplicate
packets
4-11
HOW THE INTERNET WORKS – WEB
ADDRESSES & DOMAINS
IP Address
• Each domain is associated
with one or more IP addresses
• Format: a 32-bit address
written as 4 numbers (from 0255) separated by periods
Example: 1.160.10.240
Domain
• Identifies the Website (host)
• Comes in many suffixes such
as:
.edu
.org
.mil
.net
(educational institutions)
(organizations; non-profit)
(military)
(network organizations)
Example: microsoft.com
(URL) Uniform Resource Locator
• Identifies particular Web pages within a domain
Example: http://www.microsoft.com/security/default.mspx
4-12
HOW THE INTERNET WORKS – MANAGING
Internet Registry THE INTERNET
• Central repository of all Internet-related information
• Provides central allocation of all network system identifiers
• Managed by Internet Assigned Numbers Authority (IANA)
Domain Name System (DNS)
• Maintained by the Internet Registry
• Used to associates hosts or domains with IP addresses
• Root DNS database is replicated across the Internet
InterNic Registration Service
• Assigns Internet Domains and IP addresses
• Internet Corp. for Assigned Names and Number (ICANN) has
responsibility for managing IP addresses, domain names, and
root server system management
4-13
HOW THE INTERNET WORKS – CONNECTING
TO THE INTERNET
Modem (stands for Modulate/Demodulate)
Internet Service Provider (ISP)
Network Access Points (NAPs)
Internet Backbone
4-14
NETWORK CONNECTION TYPES
POTS (Plain Old Telephone Service)
ISDN (Integrated Services Digital Network)
DSL (Digital Subscriber Line)
Cable Modem
IoS (Internet over Satellite)
Wireless
• Fixed wireless
• Mobile wireless
4-15
NETWORK CONNECTION TYPES
T1/T3 (Trunk Level 1 or 3)
ATM (Asynchronous Transfer Mode)
SONET (Synchronous Optical Network)
4-16
CURRENT STATE OF THE INTERNET
4-17
WORLD WIDE WEB
4-18
HTTP (Hypertext Transfer Protocol)
• A _____________ used to process user
requests for displaying Web pages from a
Web server
Web Servers
• A special computer that is specifically
designed to store and “_____________”
Web pages
• This machine contains special
_____________ and _____________ to
perform its many specialized functions
INFORMATION SYSTEM SECURITY
Managerial Methods
Several techniques are commonly used to manage information
systems security:
• _____________ Assessment
• Controlling _____________
• Organizational Policies and Procedures
• Backups and _____________
4-19
_____________
Precautions taken to keep all aspects of information systems
safe from unauthorized access
INFORMATION SYSTEM SECURITY –
MANAGERIAL TECHNIQUES
Assessing Risk
Security Audit
• Risk Analysis
• Alternatives based on Risk Analysis:
• Risk Reduction
• Risk _____________
• Risk Transference –
Controlling Access
Keeping information safe by only allowing access to those that
require it to do their jobs
• _____________ –
• Access Control –
4-20
INFORMATION SYSTEM SECURITY –
MANAGERIAL TECHNIQUES
_____________ Policies and Procedures
• Acceptable Use Policies – formally document how systems
should be used, for what, and penalties for non-compliance
_____________ and _____________ Recovery
• Backups – taking periodic snapshots of critical systems data and
storing in a safe place or system (e.g. backup tape)
• Disaster Recovery Plans – spell out detailed procedures to be used
by the organization to restore access to critical business systems
(e.g. viruses or fire)
• Disaster Recovery – executing Disaster Recovery procedures
using backups to restore the system to the last backup if it was
totally lost
4-21
Identity theft
STATE OF IS SECURITY - SECURITY THREATS
Security Threats& TECHNOLOGIES
• _____________ Theft –
• _____________ _____________–
• Others: Spyware, Spam, Wireless Access, Viruses
Security Technologies
Companies and research organizations continue to develop and
refine technologies to prevent security breaches. Some Include:
• _____________
• _____________
• _____________ and Encryption
4-22
IS SECURITY: TECHNOLOGY
4-23
_____________
A system of software, hardware or both designed to detect
intrusion and prevent unauthorized access to or from a private
network
Firewall Techniques
• Packet Filter – examine each packet entering and leaving network
and accept/reject based on rules
• Application Level Control – Performs certain security measures
based on a specific application (e.g. file transfer)
• Circuit Level Control – detects certain types of connections or
circuits on either side of the firewall
• Proxy Server – acts as, or appears as, an alternative server that
hides the true network addresses
FIREWALL CAPABILITY
Firewall can



Focus for security _____________
Enforce security _____________
Log internet _____________
Limit _____________

keeps one section of intranet separate from another
Firewall can not




Protect
Protect
Protect
Protect
against
against
against
against
malicious _____________
connections that do not go through it
new _____________
_____________
24

SECURITY THREAT: SPYWARE, SPAM, AND
COOKIES
_____________
Any software that covertly gathers information about a user
through an Internet connection without the user’s knowledge
_____________
Electronic junk mail or junk newsgroup postings usually for
purpose of advertising some product and/or service
_____________
A message passed to a browser from a Web server. Used by
legitimate programs to store state and user information
4-25
Biometrics
SECURITY TECHNOLOGY: _____________
_____________
A sophisticated authentication technique used to restrict
access to systems, data and/or facilities
• Uses biological characteristics to identify individuals such
as fingerprints, retinal patterns in the eye, etc. that are not
easily counterfeited
4-26
SECURITY THREAT: ACCESS TO WIRELESS
Unauthorized Access to Wireless Networks
With the prevalence in use of wireless networks this threat is
increasing
• Problems - _____________ _____________ - an attacker
accesses the network, intercepts data from it, and can use network
services and/or send attack instructions without entering the
building
• Prevention - _____________ between network and user
devices
4-27
28
On 8 February, 1587 Elizabeth I of England
SECURITY TECHNOLOGY: VPN AND
_____________
_____________
The process of encoding messages before they enter the
network or airwaves, and then decoding at the receiving
end
• _____________ - known and used to scramble messages
(SSL)
• _____________ - not known and used by receiver to
descramble
• _____________– a third party that issues keys
4-29
HOW ENCRYPTION WORKS
4-30
VIRTUAL PRIVATE NETWORK

Virtual private network (VPN): a secure _____________
between two points across the Internet
_____________ : the process by which VPNs transfer information
by encapsulating traffic in IP packets over the Internet
31
SECURITY THREAT: VIRUSES
Viruses
Programs that can attack a computer and/or a network and delete
information, disable software, use up system resources, etc.
Prevention Steps:
AntiVirus software:
No Disk Sharing –
Delete Suspicious Email Messages –
Report Viruses –
4-32