Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Network Security

No description
by

Joe McGowan

on 9 December 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Network Security

Network
Security
Security threats to a network
Viruses and worms
trojan horses
spam
phishing
packet sniffing
malicously coded websites
password attacks
botnets and zombie computers


Viruses
trojan horses
SPAM
Network Security
A virus is a program or piece of code that is loaded onto a computer without the owner knowing about it.
Viruses can cause a huge amount of damage to computers
An example of where a virus might be opened is with a email which contains a malicous piece of code hidden inside which could cause your computer to crash and freeze.
If a virus is downloaded onto a computer in a network the network would be affected also because the virus would duplicate itself and spread.
SPAM is flooding the internet with many copies of the same message in an attempt to force the message on people who wouldnt otherwise recieve it.
It isnt the biggest risk to a network because even though it may get annoying and plentiful it still doesnt destroy any physical elements of the network.
Spam filters are an effective way to stop spam these filters will come with most email service providers such as google or yahoo but if needs be you can also buy spam filters.
Worms
A worm is similar to a virus but the big difference between the two is that a worm can run itself whereas a virus needs a host program to run it.
To solve the problem of viruses and worms install a security suite such as Kaspersky or AVG that prtects the computer against threats such as viruses and worms
A Trojan horse is a program in which malicious or potentially harmful code is contained inside what would appear to be harmless data in such a way that it can get control and do its damage.
An example of damage it can do is ruin the file allocation table on the hard disk.
In a network if a trojan horse is installed on a computer and alters the file allocation table it could cause massive damage to all the computers on the network
The solution is a security suite which will prevent you from downloading trojan horses and will notfiy you of the problem.

Phishing
phishing is an email fraud method in which the perpetrator sends out legitimate looking messages in an attempt to gather personal or financial information from recipients.
in my opinion phishing is one of the worst security threats over a network becuase a lot of people that use computers linked up to a network are amateurs and would be very vulnerable to giving out information that could cause situations such as theft of money or identity theft.
solution similar to spam filters can be used to filter out this unwanted mail and to prevent the threat.
Packet sniffers
A packet sniffer is a device or program that allows eavesdropping on traffic travelling between networked computers. The packet sniffer will capture data that is addressed to other machines saving it for analysis.
in a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft so this is a major security threat to a network
solution for this is when strong encryption is used all packets are practically unreadable to any but the desination address making the packet tracer useless.
Password attacks
password attacks are done by hackers that are able to determine passwords or find passwords to different protected areas.
many systems on a network are password protected and hence it would be easy for a hacker to hack into the systems and steal data.
It is one of the easiest ways to obtain private information because you are able to get software online
There is no software soltution at present to prevent password attacks

Hardware loss and residual data fragments
Hardware loss and residual data fragments are a growing worry for companies and governments
an example is if a number of laptops get stolen from a bank that have client details on them enabling the theives to get personal information from clients and maybe steal the clients identities
the only solution to this is strict surveillance

A zombie computer or drone is a computer that has been secretly compromised by hacking tools which allow a third party to control themputer and its resources remotely.
a hacker could control a computer and obtain the data stored on it.
A bot net is a number of internet comouters that although their owners are unaware of it have been set up to foward transmissions to other computers on the internet.
This is a major security threat on a network becasue the network could be acting as a hub that fowards malicious files to other computers
solution the network intrusion prevention systems can help prevent botnets and anti virus software can help prevent zombie computers.

Zombie computes and botnets
Password attacks
password attacks are done by hackers that are able to determine passwords or find passwords to different protected areas.
many systems on a network are password protected and hence it would be easy for a hacker to hack into the systems and steal data.
It is one of the easiest ways to obtain private information because you are able to get software online
There is no software soltution at present to prevent password attacks

Current Network
Revised Network
Design
Full transcript