Transcript: A firewall can be software or hardware based but it is mainly used to keep the network safe from hackers and viruses. Is a type of security which keeps people out also known as windows and doors also gates and fences. Firewall Perimeter protection A user name is a name that is either your real name or your nickname that is used to log into your account on a school network for instance, but you cant log in unless you also use a password which is made by your choice. IP blocking prevents connecting a server or website with certain IP addresses. IP blocking bans or stops unwanted addresses from connecting. NAT NAT stands for Network Address Translation which is used to modify a network address information. Network Security Anti virus software is used to keep viruses, malware, worms or any type of software that is harmful to your computer. IP block Renee Harris 10DE User name and password Anti virus software
Transcript: Things you need to know about Network attacks Types: Eavsdropping IP Spoofing Man in the Middle Denial of Service Sniffer Attack Easvsdropping The unaurthized real-time interception of a private message. ex. a phone call A text or a videoconferance Encription and Decription IP Spoofing the act of replacing the IP address information in a packet with fake information. By replacing the true originating IP address with a fake one a hacker can mask the true source of an attack or force the destination IP address to reply to a different machine and possibly cause a denial of service. (More Later) Protection: Use authentication based on key exchange between the machines on your network Ex:IPsec Man in the Middle For Protection downloud... Internet explorer 7 or higher FireFox 3 or higher Google Chrome or Safari Denial of Service an explicit attempt by attackers to prevent legitimate users of a service from using that service. Ex. attempts to "flood" a network ex. attempts to disrupt connections between two machines Ex. attempts to prevent a particular individual from accessing a service or attempts to disrupt service to a specific system or person Protection: Use Tripwire or a similar tool to detect changes in configuration, information or other files. Sniffer Attck application of a device that can read, monitor, and capture network data exchanges and read network packets. For protection encript and sign the data stream Network Security The End By William Sanguinetti attackers intrude into communication the and inject false Protection: and intercept information an existing exchanged data of attacks Cyber Science
Transcript: NETWORK S E C U R I T Y SECURITY by Brad Ewing EAVESDROPPING ATTACKERS WATCH YOUR COMMUNICATION IDENTITY SPOOFING RECREATE YOUR IP ADDRESS ONCE THE ARE THROUGH THEY CAN MODIFY REROUTE OR DELETE YOUR DATA MAN IN THE MIDDLE SOMEONE BETWEEN YOU AND THE PERSON WHO WATCHES YOUR COMMUNICATION DENIAL OF S E R V I C E HACKERS CHANGE YOUR INFO SO YOU ARE UNABLE TO USE YOUR COMPUTER YOUR INFO CHANGE YOUR INFO
Transcript: Example of a Jeopardy Template By: Laken Feeser and Rachel Chapman When creating without a template... http://www.edtechnetwork.com/powerpoint.html https://www.thebalance.com/free-family-feud-powerpoint-templates-1358184 Example of a Deal or No Deal Template PowerPoint Game Templates There are free templates for games such as jeopardy, wheel of fortune, and cash cab that can be downloaded online. However, some templates may cost more money depending on the complexity of the game. Classroom Games that Make Test Review and Memorization Fun! (n.d.). Retrieved February 17, 2017, from http://people.uncw.edu/ertzbergerj/msgames.htm Fisher, S. (n.d.). Customize a PowerPoint Game for Your Class with These Free Templates. Retrieved February 17, 2017, from https://www.thebalance.com/free-powerpoint-games-for-teachers-1358169 1. Users will begin with a lot of slides all with the same basic graphic design. 2. The, decide and create a series of questions that are to be asked during the game. 3. By hyper linking certain answers to different slides, the game jumps from slide to slide while playing the game. 4. This kind of setup is normally seen as a simple quiz show game. Example of a Wheel of Fortune Template https://www.teacherspayteachers.com/Product/Wheel-of-Riches-PowerPoint-Template-Plays-Just-Like-Wheel-of-Fortune-383606 Games can be made in order to make a fun and easy way to learn. Popular game templates include: Family Feud Millionaire Jeopardy and other quiz shows. http://www.free-power-point-templates.com/deal-powerpoint-template/ Quick video on template "Millionaire" PowerPoint Games Some games are easier to make compared to others If users are unsure whether or not downloading certain templates is safe, you can actually make your own game by just simply using PowerPoint. add logo here References Example of a Family Feud Template PowerPoint Games are a great way to introduce new concepts and ideas You can create a fun, competitive atmosphere with the use of different templates You can change and rearrange information to correlate with the topic or idea being discussed. Great with students, workers, family, etc. For example: With games like Jeopardy and Family Feud, players can pick practically any answers. The person who is running the game will have to have all of the answers in order to determine if players are correct or not. However, with a game like Who Wants to be a Millionaire, the players only have a choice between answers, A, B, C, or D. Therefore, when the player decides their answer, the person running the game clicks it, and the game will tell them whether they are right or wrong.
Transcript: Network Security eavesdropping niffing reading Man in the Middle impersonation Identity Spoofing Bogus Emails Thiefs sniffer attack monitor capture denial of service Flood password-based attack repititive attempts cryptography Disrupts
Transcript: Networking is the interconnection of devices to share information. The largest Network is the internet (World-Wide Web). Networking - Software Security! Physical Security! It prevents theft of an entire machine, damage or theft to important components of the computer and it also prevents people simply hitting the restart or switch off button The End! What is physical security? Security Software is required to prevent your computer from getting viruses. It stops hackers from being able to access your files. Scammers!!!! Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media What is Networking? There are 2 main types of Security software: Anti-Virus and Spyware removal. Anti-Virus removes harmful viruses before they infect your computer, while Spyware removal scans for unwanted "spy" software and deletes it. What is Security Software? Why is physical security important? Norton 360 - £50ish Mcafee Pro - £40ish Kaspersky - £50ish Networking Examples of physical security How much Do I have to Pay?? Electric fencing Security guards Cameras Motion detecters Light beams PHYSICAL SECURITY IS VITAL! USE IT!!!! Why Should You Have it?
Transcript: Why Do We Need Network Security... We need security, so that our personal details stay safe and can't be accessed by anyone else. So no one hacks into our system and destroys our data. To block viruses from accessing our computers and damaging them. So that users cannot see other users' files unlike on stand alone machines. We can install antivirus softwares and buy security softwares to prevent our computers from harm. By Blocking cookies and pop ups. By Zara and Mehmoona
Transcript: Network security Advanced ID measures - Some systems use biometric systems to ID authorsied users. That means they store data about fingerprints, voices or people's eye on special smart cards DNA Fingerprint scanning is a standard biometric method that authenticates a user’s identity based upon who they are. Even though authentication using fingerprint scanning attempts to verify identities by using a completely unique characteristic, it is not 100% secure or reliable. A user’s fingerprint consists of a number of ridges and valleys on the top layer of skin. A fingerprint scanner plate using optics or capacitors collects a print sample of the pattern of peaks and valleys, converts the pattern to a number or algorithm, and compares it to other stored templates. Dynamic network analysis (DNA) varies from traditional social network analysis in that it can handle large dynamic multi-mode, multi-link networks with varying levels of uncertainty. The Dynamic Network Analysis Section focuses on advancing our understanding of social networks through DNA. The section will organize meetings, newsletters, websites, mailing lists and/or special journal issues to achieve its objectives, including the fostering of rich dialog among DNA researchers. For network security you could use a iris/retina scanner, because of the complex structure of the capillaries that supply the retina with blood, each person's retina is unique. combines technologies from several fields including, computer vision, pattern recognition, statistical interference, and optics. Finger print scanning Eye- Retina & Iris Eye- Retina & Iris Finger print scanning
Description: Add some color to your quarterly business review with this vibrant business presentation template. The bold visuals in this business template will make your next QBR a memorable one.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Now you can make any subject more engaging and memorable