SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Network Security 101 – A Refresher Course
How to keep your network safe NOW or be sorry later!




                  By Allan Pratt, MBA
                Cyber-Tech Security Pro
                    itczar@att.net
There are two extremes in Network safety:
Absolute Security and Absolute open

Absolute security is: unplugged from the network
and power, locked in a safe, and thrown to the
bottom of the ocean1
4 Simple Rules
 Always keep your virus and Windows software updates “on”

 Always keep your firewall “on”

 Back up, Back up, Back up

 Always keep your passwords and key phrases safe
Better Safe Than Sorry
 Do not use common words or phrases for passwords

 Do not keep your passwords written on a post-it taped to
 your computer monitor

 Back-up, back-up, back-up
Strange But True
 You cannot secure a laptop until you secure the laptop
 Make sure everyone follows the security plan, even the boss
 Smart people can be stupid too, even HR
 Who launched that virus?
Human Nature

Also Called Social Engineering

Everyone Wants To Help

Passwords are meant to be a SECRET!
Password Discovery Table
Keep Your Email Safe
Make sure to scan all email messages!

      Do not open email from unknown sources or that you are
      not expecting
      Once they are in, only unplugging and reinstalling OS
      will work
      New Type of Attack, Spear-Phising4
Spear-Phishing
•   Net Reconnaissance
     – Studying public Data
     – The email address is made to look like it is from a logical
       sender
•   Harvesting The Data
     – Steals info and sends data to a Command and Control
       Server4
Keeping your data safe
•   Identify and Authenticate
•   Use a Surge Protector
•   Safeguard against Unauthorized Access
•   Server-side protection
•   Password protect3
Cyber Cafés can be harmful to your data’s health

•   Open networks make for easy theft
•   Turn off all file share protocols
•   Make sure your software firewall and virus protection is active
Wireless Networks
•   Turn off the SSID broadcast
•   Password protect your router
•   Do not leave MAC addresses open to others
•   Leave your hardware firewall on
•   Use matching vendors
•   Never use WEP protocols only the newer WPA2 and above
Unprotected? Do you feel lucky?
•   One Security Expert maintains that 50% of unprotected
    computers are compromised by an intruder within 12 minutes

•   Two devastating worms, Slammer and Nimda wreaked world-
    wide havoc in 10 and 30 minutes, respectively3
Things to watch out for…
 System Crashes
 Attempts to write to the system
 Data Modification
 Unexplained Poor System Performance6
Best Practices

1. Do not pay more for your security than your
   data is worth!

2. Password protect all of your important data!
Final reminders:
•   Back-up, Back-up, Back-up
•   Never open a strange file or attachment
•   Always allow automatic updates
•   You can never be too careful
•   It’s not IF you lose your data, but a matter of
    WHEN you lose your data
Works Cited
 1.   Curtin Matt, Introduction to Network Security, March 1997, page 8.
 2.   Curtin Matt, Snake Oil Warning Signs: Encryption Software to Avoid
      ©1996 -1998, page 5.
 3.   Vermaat, Discovering Computers, Fundamentals, Third Edition, Chapter
      10, pages 364, 368, 369, 374.
 4.   BusinessWeek, “Anatomy of a Spear-Phish,” April 21, 2008, page 38.
 5.   [Fraser 1997] Ed Fraser, RFC 2196, “Site Security Handbook”,
      September 1997.
 6.   Checking Microsoft Windows® Systems for Signs of Compromise,
      Simon Baker, UCL Computer Security Team; Patrick Green, OXCERT
      Thomas Meyer, Garaidh Cochrane Version: 1.3.4, 10/28/2005.
 7.   DEPARTMENT OF DEFENSE, STANDARD DEPARTMENT OF
      DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION
      CRITERIA, DECEMBER l985 (DOD Orange book),
 8.   http://en.wikipedia.org/wiki/Network_security#column-one.

Más contenido relacionado

La actualidad más candente

Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

La actualidad más candente (20)

Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Network Security
Network SecurityNetwork Security
Network Security
 
System security
System securitySystem security
System security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Cloud security
Cloud securityCloud security
Cloud security
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Email security
Email securityEmail security
Email security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Software security
Software securitySoftware security
Software security
 

Destacado

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmissionBZU lahore
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 

Destacado (9)

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmission
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 

Similar a Network Security Presentation

Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Network security primer
Network security primerNetwork security primer
Network security primeraeroman7
 
Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Andrew Clark
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?Simone Crete
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 

Similar a Network Security Presentation (20)

Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
Internet
InternetInternet
Internet
 
Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 

Network Security Presentation

  • 1. Network Security 101 – A Refresher Course How to keep your network safe NOW or be sorry later! By Allan Pratt, MBA Cyber-Tech Security Pro itczar@att.net
  • 2. There are two extremes in Network safety: Absolute Security and Absolute open Absolute security is: unplugged from the network and power, locked in a safe, and thrown to the bottom of the ocean1
  • 3. 4 Simple Rules Always keep your virus and Windows software updates “on” Always keep your firewall “on” Back up, Back up, Back up Always keep your passwords and key phrases safe
  • 4. Better Safe Than Sorry Do not use common words or phrases for passwords Do not keep your passwords written on a post-it taped to your computer monitor Back-up, back-up, back-up
  • 5. Strange But True You cannot secure a laptop until you secure the laptop Make sure everyone follows the security plan, even the boss Smart people can be stupid too, even HR Who launched that virus?
  • 6. Human Nature Also Called Social Engineering Everyone Wants To Help Passwords are meant to be a SECRET!
  • 8. Keep Your Email Safe Make sure to scan all email messages! Do not open email from unknown sources or that you are not expecting Once they are in, only unplugging and reinstalling OS will work New Type of Attack, Spear-Phising4
  • 9. Spear-Phishing • Net Reconnaissance – Studying public Data – The email address is made to look like it is from a logical sender • Harvesting The Data – Steals info and sends data to a Command and Control Server4
  • 10. Keeping your data safe • Identify and Authenticate • Use a Surge Protector • Safeguard against Unauthorized Access • Server-side protection • Password protect3
  • 11. Cyber Cafés can be harmful to your data’s health • Open networks make for easy theft • Turn off all file share protocols • Make sure your software firewall and virus protection is active
  • 12. Wireless Networks • Turn off the SSID broadcast • Password protect your router • Do not leave MAC addresses open to others • Leave your hardware firewall on • Use matching vendors • Never use WEP protocols only the newer WPA2 and above
  • 13. Unprotected? Do you feel lucky? • One Security Expert maintains that 50% of unprotected computers are compromised by an intruder within 12 minutes • Two devastating worms, Slammer and Nimda wreaked world- wide havoc in 10 and 30 minutes, respectively3
  • 14. Things to watch out for… System Crashes Attempts to write to the system Data Modification Unexplained Poor System Performance6
  • 15. Best Practices 1. Do not pay more for your security than your data is worth! 2. Password protect all of your important data!
  • 16. Final reminders: • Back-up, Back-up, Back-up • Never open a strange file or attachment • Always allow automatic updates • You can never be too careful • It’s not IF you lose your data, but a matter of WHEN you lose your data
  • 17. Works Cited 1. Curtin Matt, Introduction to Network Security, March 1997, page 8. 2. Curtin Matt, Snake Oil Warning Signs: Encryption Software to Avoid ©1996 -1998, page 5. 3. Vermaat, Discovering Computers, Fundamentals, Third Edition, Chapter 10, pages 364, 368, 369, 374. 4. BusinessWeek, “Anatomy of a Spear-Phish,” April 21, 2008, page 38. 5. [Fraser 1997] Ed Fraser, RFC 2196, “Site Security Handbook”, September 1997. 6. Checking Microsoft Windows® Systems for Signs of Compromise, Simon Baker, UCL Computer Security Team; Patrick Green, OXCERT Thomas Meyer, Garaidh Cochrane Version: 1.3.4, 10/28/2005. 7. DEPARTMENT OF DEFENSE, STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA, DECEMBER l985 (DOD Orange book), 8. http://en.wikipedia.org/wiki/Network_security#column-one.