Transcript: A firewall can be software or hardware based but it is mainly used to keep the network safe from hackers and viruses. Is a type of security which keeps people out also known as windows and doors also gates and fences. Firewall Perimeter protection A user name is a name that is either your real name or your nickname that is used to log into your account on a school network for instance, but you cant log in unless you also use a password which is made by your choice. IP blocking prevents connecting a server or website with certain IP addresses. IP blocking bans or stops unwanted addresses from connecting. NAT NAT stands for Network Address Translation which is used to modify a network address information. Network Security Anti virus software is used to keep viruses, malware, worms or any type of software that is harmful to your computer. IP block Renee Harris 10DE User name and password Anti virus software
Transcript: Rhys Jordan Network Security Presentation Malware is very dangerous to any user of technology, especially those without the right protection. People will create these malware to receive personal information, steal money or just destroy the technology. This presentation will explain the different types of malware, what is does and how to stop the malware. Introduction Introduction Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware Spyware Solution You can install anti-spyware software on your computer, and the anti-spyware capabilities are included in many anti-virus or anti-malware packages. You can also use a firewall. Solution A computer virus is a program that replicates itself by modifying other programs and creating its own code to mess up your computer Viruses Viruses Solution Computer networks in seven major regional hospitals were locked down for more 24 hours after a widespread computer virus attack shut booking systems, delayed surgeries and reignited fears over patient information security. Solution In computing, a Trojan horse, or Trojan, is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. Trojans Trojans A computer worm is a computer program that replicates itself in order to get to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms Worms In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. DDOS Attacks DDOS attacks Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Ransomware Ransomware In conclusion learning about software is an easier way to prevent from malware giving out personal information to another user. Conclusion Conclusion
Transcript: Prepared by: Fajer Al.Mousawi Computer Engineering Student College of Engineering & Petroleum Kuwait University IT & Internet Three Main Topics - Importance of the Information Technology (IT) & the Internet. - But Be Careful (BBC): Types of Computer Threats. - How to protect your computer. Importance of the Internet & IT *A kind of global meeting place where people from all parts of the world can communicate with each other. *The "internet" is a gigantic library, as well as a world-wide message board, telephone network, and publishing medium. *It is open 24 hours a day, and you can find anything you want there; information about almost any subject is available in depth and up to date. Some of the things that you can do via the Internet are: E-mail: send and receive instant electronic messages, which works like writing letters. Your messages are delivered instantly to people anywhere in the world. Access Information: Any kind of information on any topic under the sun is available on the Internet. The ‘search engines’ on the Internet can help you to find data on any subject that you need. Online Shopping: There are many online stores and sites that can be used to look for products as well as buy them using your credit card. You do not need to leave your house and can do all your shopping from the convenience of your home. Downloading Software: download games, music, videos, movies, and a host of other entertainment software from the Internet, most of which are free. Information Technology is related to studying, designing and developing the information related to computers. In business: There are many businesses which are in need of the software packages for satisfying their operational as well as functional needs. Education: helps the students as well as the teachers in studying the course material easily because of fast access. Studying the subjects with the help of online libraries and dictionaries has made grasping and increasing the knowledge easy for the students. Computer Security Threats As Internet and e-mail become an ever-increasing part of our 21st-century lives, the myriad dangers and risks that come with them are increasing too. What is a hacker? The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam. Types of hacking and threats Viruses A software virus is a parasitic program written intentionally to alter the way your computer operates without your permission or knowledge. A virus attaches copies of itself to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk. A virus may spread through email and instant messenger attachments, through infected files on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows. Macro Viruses Macro viruses are malicious macro programs that are designed to replicate themselves from file to file and can cause damage to the files on your computer. They spread whenever you open an infected file. Macros can be written in documents created by Microsoft Word, in spreadsheets created by Microsoft Excel and in many other kinds of documents. Trojan Horses Trojan horses are programs that appear to serve some useful purpose or provide entertainment, which encourages you to run them. But these programs also serve a covert purpose, which may be to damage files, to place a virus on your computer or to allow a hacker to gain access to your machine. More commonly these days, you can be enticed into running a Trojan by clicking a link on a viral web site or in an email. Worms Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect. Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email. Zombies A Zombie is a dormant program that lies inactive on a computer. It can be activated remotely to aid a collective attack on another computer. Zombies don’t normally damage the computer on which they reside but can damage other computers. Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated. Phishing A Phishing attack is when you are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers,
Transcript: It is difficult to predict as it needs a lot of work Speed is most particular problem to keep up to pace for security devices Another challenge security faces is ubiquity; even other devices will need security implemented like automobiles, cell phones, digital assistants and refrigerators. Joshi et al. [JOS01] states there are seven different models that could be used for access control in network applications What is a network? network consists of the combination of more than one system in place. If one system fails it does not block users to continue. If this occurs, computing tasks are shifted to another system to continue tasks at hand. Increased reliability What is a network Advantages of computing networks Types of threats Security controls Future of security Network Threats Anonymity- when attacker is not in direct contact of the system and attacks from far locations. Many points of attack- file is stored in a network which is remote from user. The file then passes through other hosts to be received by the user. Sharing- more easier approach when attacking networks. they enable their resources making more users to have the access not just on single computers but to the networked system. complexity of the system unknown perimeter unknown path- sending a file may not be received through traveling to many hosts and attacker gains access Advantages of networks Most important tool used in network security –Encryption can be used to secure an entire network –Or to secure a specific communication difficult for anyone to alter data encrypted unless breaking through encryption but takes long process to figure Type of encryption – Link encryption: protection between two hosts – End-to-end encryption: between two applications By Jason Patto 17766526 Outline of presentation Leads to reducing maintenance + storage cost by gaining improved access to all users Purchasing device individually may be expensive but to share the resources can be worth the purchase References Example of future network security Strong authentication Access control lists are implemented through routers –deny any access of any hosts which are being spammed with packets. Routers are configured and could remove all packets within that specific host. Routers observed as good point for access control through handling packets that are received and sent out within a subnetwork. Firewalls better approach with large-scale + general traffic screening than routers. Future of network security Distributing workload Types of networks Daya, B, n.d., network security: history, importance, and future, University of Florida Department of Electrical and Computer Engineering, viewed 04 October 2014, <http://web.mit.edu/~bdaya/www/Network%20Security.pdf>. Pfleeger, C, and Pfleeger, S, Security in computing, 3rd edn Sharing Addition of new nodes and not having to involve the manager to undertake special actions. Expandability Encryption Connection of two or more devices over a medium through use of hardware and software which communication gets enabled. Encryption Strong authentication Access controls Wireless security Controls of security Network Security The amount of usage within single system varies through amount of users that join but also leave a network. Shifting the workload that is within a heavily loaded system to a underutilized one can benefit the network. Access controls Most difficult to keep secure One-Time Password – Protect against replay attacks – Session Token: valid for only one login session – Challenge-Response System Authentication in Distributed System
Transcript: Things you need to know about Network attacks Types: Eavsdropping IP Spoofing Man in the Middle Denial of Service Sniffer Attack Easvsdropping The unaurthized real-time interception of a private message. ex. a phone call A text or a videoconferance Encription and Decription IP Spoofing the act of replacing the IP address information in a packet with fake information. By replacing the true originating IP address with a fake one a hacker can mask the true source of an attack or force the destination IP address to reply to a different machine and possibly cause a denial of service. (More Later) Protection: Use authentication based on key exchange between the machines on your network Ex:IPsec Man in the Middle For Protection downloud... Internet explorer 7 or higher FireFox 3 or higher Google Chrome or Safari Denial of Service an explicit attempt by attackers to prevent legitimate users of a service from using that service. Ex. attempts to "flood" a network ex. attempts to disrupt connections between two machines Ex. attempts to prevent a particular individual from accessing a service or attempts to disrupt service to a specific system or person Protection: Use Tripwire or a similar tool to detect changes in configuration, information or other files. Sniffer Attck application of a device that can read, monitor, and capture network data exchanges and read network packets. For protection encript and sign the data stream Network Security The End By William Sanguinetti attackers intrude into communication the and inject false Protection: and intercept information an existing exchanged data of attacks Cyber Science
Transcript: NETWORK S E C U R I T Y SECURITY by Brad Ewing EAVESDROPPING ATTACKERS WATCH YOUR COMMUNICATION IDENTITY SPOOFING RECREATE YOUR IP ADDRESS ONCE THE ARE THROUGH THEY CAN MODIFY REROUTE OR DELETE YOUR DATA MAN IN THE MIDDLE SOMEONE BETWEEN YOU AND THE PERSON WHO WATCHES YOUR COMMUNICATION DENIAL OF S E R V I C E HACKERS CHANGE YOUR INFO SO YOU ARE UNABLE TO USE YOUR COMPUTER YOUR INFO CHANGE YOUR INFO
Transcript: IT2774 Network Security The Informers Our Group Team Members Team Members About Mirai What is Mirai Botnet? How Mirai started? How Mirai started? The Mirai botnet was first found in August 2016 It is determined that the attack was the work of “script kiddies” (amateurs) that mingle on so-called Hack Forums A member of a hacker forum called Anna-senpai’ leaked the source code for Mirai Mirai is now an open-source script which can be found online How does Mirai infect IoT? How does Mirai infect IoT? Mirai propagates by bruteforcing telnet servers with a list of 62 horribly insecure default passwords, starting with the infamous admin:admin. Mirai will attempt to kill and block anything running on ports 22, 23, and 80, essentially locking out the user from their own device and preventing infection by other malware History Vunerability Today Expanded First major product Established Testimonials Testimonials Products & services Products & services
Transcript: Networking is the interconnection of devices to share information. The largest Network is the internet (World-Wide Web). Networking - Software Security! Physical Security! It prevents theft of an entire machine, damage or theft to important components of the computer and it also prevents people simply hitting the restart or switch off button The End! What is physical security? Security Software is required to prevent your computer from getting viruses. It stops hackers from being able to access your files. Scammers!!!! Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media What is Networking? There are 2 main types of Security software: Anti-Virus and Spyware removal. Anti-Virus removes harmful viruses before they infect your computer, while Spyware removal scans for unwanted "spy" software and deletes it. What is Security Software? Why is physical security important? Norton 360 - £50ish Mcafee Pro - £40ish Kaspersky - £50ish Networking Examples of physical security How much Do I have to Pay?? Electric fencing Security guards Cameras Motion detecters Light beams PHYSICAL SECURITY IS VITAL! USE IT!!!! Why Should You Have it?
Description: For program proposals, grant requests, or any other nonprofit or education presentation, this beautiful world map-inspired creative Prezi template will engage and captivate your audience. All Prezi education templates and Prezi nonprofit templates are easy to customize.
Description: Impactful presentations need stunning visuals and a meaningful metaphor to show high-level concepts and the smaller details. This customizable presentation template uses a classic world map visual to help you navigate complex information while staying grounded in your presentation’s core message.
Description: Structuring your syllabus doesn't have to be a huge headache with this customizable lesson plan presentation template. With a classic chalkboard theme and adaptable structure, it's easy to add new subjects, assessments, assignments, and more.
Now you can make any subject more engaging and memorable