SlideShare a Scribd company logo
1 of 39
Computer-Network Security
Bryley Systems Inc.
Bryley Communications Inc.
Synopsis
Are you worried about the security of your
computer network?
Learn the latest on protecting your system
from spyware, spam, and unauthorized
access. Discover what you need to do
to ensure the integrity of your
company’s valuable data.
Copyright 2005

2
Presenters
• Michael R. Carlson
- Chief Technical Officer
- Microsoft CSE and HP ASE
- Over 15 years in computer industry

Gavin H. Livingstone
- Over 25 years in computer industry

Copyright 2005

3
About Bryley
• Business Technology Solutions
• Established and incorporated 1987
• Full-service, end-to-end provider:
-

Computer networks
Network security
Telephone systems
Voice and data cabling

Copyright 2005

4
About Bryley (continued)
• Seasoned, experienced, friendly staff
• Flexible contract and service options
• Long-term, stable relationships

Copyright 2005

5
Agenda
I. Common Threats
II. Preventative measures
III. Questions and answers

Copyright 2005

6
I. Common Threats
•
•
•
•
•
•
•
I.
II.
III.

Viruses
Spyware
Spam
Phishing
Objectionable Content
External Threats
The Threat Within
Common Threats
Preventative measures
Questions and answers

Copyright 2005

7
Viruses
•
•
•
•

Self-replicating
Consumes system and network resources
Corrupts programs and data
Several types
–
–
–
–

Program and Macro viruses
Scripts
E-mail worms
Trojans

Copyright 2005

8
Spyware
•
•
•
•

Gathers information about computer use
patterns
Slows system response, may cause errors
and instability
Compromises user privacy
Often installed with the user’s permission

Copyright 2005

9
Spam
•
•
•
•
•

Unsolicited advertising e-mail
Also includes messages trying to spread
viruses and spyware
Wastes employees’ time distinguishing
legitimate e-mail from SPAM
Legitimate e-mail may be inadvertently
deleted.
Not unusual for a majority of e-mail to be
SPAM

Copyright 2005

10
Phishing
•

•

E-mail that insists that an account must be
updated or verified, usually for “security
reasons”
E-mail contains links to a web site that is
similar in design and name to the legitimate
web site

Copyright 2005

11
Objectionable Content
•
•
•

Spam-borne
Web-based
Liability issues

Copyright 2005

12
External Threats
•
•
•

Internet connected systems are often
scanned for know vulnerabilities
Compromised systems are used to send
SPAM or store illegal content
Targeted attacks

Copyright 2005

13
The Threat Within
•
•
•
•
•
•

Unnecessary access allows careless or malevolent
employees to move or delete data
Passwords which are easily guessed or written down
allow access to other employees’ accounts
Stolen or lost portable devices contain data and may
allow for unauthorized remote access
rnet connected systems are often scanned for know
vulnerabilities
Compromised systems are used to send SPAM or
store illegal content
Targeted attacks

Copyright 2005

14
II. Preventative Measures
•
•
•
•
•
•
•

Computer & Internet Use Policy
Security Policy
User Education
Security Technologies
Wireless Security
Backup
Disaster Recovery

Copyright 2005

15
Computer & Internet Use Policy
•
•
•
•
•

Defines how employees use while reducing
organization’s liability
As formal as other policy documents
Use company-approved software only
Do not share accounts and passwords
Do not write down passwords

Copyright 2005

16
Computer & Internet Use Policy
(continued)
•
•
•
•

PC and Internet access provided for businessuse only
Reduce or eliminate unproductive use
(personal shopping, entertainment)
Prohibit illegal use (downloading copyrighted
materials, gambling)
Limit legal liability (sexual harassment, illegal
activities)
Copyright 2005

17
Security Policy
•
•
•
•

Complements the Computer & Internet Use
policy
Defines from a technology standpoint what is
allowed and not allowed on the network
Defines the process for making changes,
including who authorizes changes
Needed when a firewall, anti-spam, or
Internet filtering solution is installed

Copyright 2005

18
User Education
•

Avoid virus infection and spyware installation
–
–
–
–

Do not open unexpected e-mail attachments
Do not install “free” or “ad-supported” software
Do not click on pop-up ads
Be careful when responding to requests to install
something from a web site. These requests might
be worded in a deceptive or misleading manner.

Copyright 2005

19
User Education (continued)
•

Avoid using “remember password”, especially
on portable devices that may be lost or
stolen.
To avoid phishing and other scams:

•
–
–
–
–

Be skeptical of requests for personal info
Do not respond to suspicious e-mail
If concerned, contact the company through a
previously established channel
Review credit-card and bank statements carefully

Copyright 2005

20
Security Technologies
•
•
•
•
•
•
•
•

Operating System Security
Firewall
VPN
Virus and Spyware Protection
SPAM Filtering
Internet-Site Blocking
Intrusion Detection & Prevention
Layering

Copyright 2005

21
Security Technologies –
Operating System Security

•
•
•
•
•
•
•
•
•
•
•
•

All users should have their own username and password
Require minimum password length and periodic password
changes
Use file and directory security to limit user access
Enable auditing and/or encryption on sensitive files and
directories
Operating System Security
Firewall
VPN
Virus and Spyware Protection
SPAM Filtering
Internet-Site Blocking
Intrusion Detection & Prevention
Layering

Copyright 2005

22
Security Technologies –

Operating System Security (continued)
•
•
•

Administrative access should be limited
If at all possible, administrators should use a
non-privileged account for day to day work
Install vendor-supplied security patches
Layering

Copyright 2005

23
Security Technologies –
•
•
•

Firewall

Controls network traffic between its interfaces
(typically LAN and Internet)
Default rules block inbound traffic, allow
outbound traffic
Stateful packet inspection

Copyright 2005

24
Security Technologies –
•
•
•

Firewall (continued)

Additional interfaces
Other technologies included in firewall
Software firewalls

Copyright 2005

25
Security Technologies –
•
•
•
•

VPN

Encrypted connection over the Internet
Primary is always a hardware device
Remote hardware devices
Software client

Copyright 2005

26
Security Technologies –
•
•
•
•

Virus and Spyware Protection

Spyware detection is often available as an
add-on to an antivirus package
Compares files or e-mail messages against
known signatures
Subscription for updates is a necessity
Multiple protection points

Copyright 2005

27
Security Technologies –
SPAM Filtering

•
•
•
•
•

ISP mail filtering
Single user
Subscription service
Onsite mail filtering
Some anti-spam options:
–
–
–

McAfee Anti-Spam
Postini
SurfControl

Copyright 2005

28
Security Technologies –
•
•
•
•

Internet-Site Blocking

Restrict access to non-productive web-sites
on the Internet
Log only or log and block
PC-based, firewall-based, separate device
Site categorization subscription

Copyright 2005

29
Security Technologies –

•
•
•
•
•

Intrusion Detection & Prevention

Examines network traffic against a database
of known attacks
Rules-based escalation process
Dynamically configures routers and firewalls
to ignore traffic from attacking sites
Available on some firewalls
Sensors can be placed on the LAN to detect
and block virus activity internally

Copyright 2005

30
Security Technologies –
•
•

Layering

Multiple, redundant levels of protection
Multi-vendor solutions at key areas

Copyright 2005

31
Wireless Security
•
•
•
•
•

Non-secured wireless networks allow
unauthorized users to connect
Enable the best security compatible with all
devices
Do not broadcast SSID
WPA if possible, otherwise WEP
Access points and firewalls that support VPN

Copyright 2005

32
Backup
•
•

Store all data on servers
Data-backup plan:
–
–
–
–

•

Who manages the process
What gets backed-up and how often
Schedule off-site rotation
Review backup logs

Ask for our free Server-Backup Guide

Copyright 2005

33
Disaster Recovery
•
•
•
•

Create & distribute a contingency plan
Backup data often and rotate media
Test restoration of backup data
Build redundancy into all business-critical
systems: Phone, computer-network, networksecurity, etc.

Copyright 2005

34
III. Questions and Answers

Copyright 2005

35
V. Solving problems

Copyright 2005

36
VI. Questions and Answers

Copyright 2005

37
Copyright 2005

38
Copyright 2005

39

More Related Content

What's hot

Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research PaperPankaj Jha
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Computer security
Computer securityComputer security
Computer security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 

Viewers also liked

A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Bryley - 201 CMR17 Presentation -- 11-11-2009
Bryley  - 201 CMR17 Presentation -- 11-11-2009Bryley  - 201 CMR17 Presentation -- 11-11-2009
Bryley - 201 CMR17 Presentation -- 11-11-2009Bryley Systems Inc.
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionJOLLUSUDARSHANREDDY
 
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...a001
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 

Viewers also liked (20)

Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Security issues
Security issuesSecurity issues
Security issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Bryley - 201 CMR17 Presentation -- 11-11-2009
Bryley  - 201 CMR17 Presentation -- 11-11-2009Bryley  - 201 CMR17 Presentation -- 11-11-2009
Bryley - 201 CMR17 Presentation -- 11-11-2009
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Network security
Network securityNetwork security
Network security
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
 
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Similar to Computer Network Security

Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareKareo
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 

Similar to Computer Network Security (20)

Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based Software
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Week 12
Week 12Week 12
Week 12
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Computer Network Security

  • 1. Computer-Network Security Bryley Systems Inc. Bryley Communications Inc.
  • 2. Synopsis Are you worried about the security of your computer network? Learn the latest on protecting your system from spyware, spam, and unauthorized access. Discover what you need to do to ensure the integrity of your company’s valuable data. Copyright 2005 2
  • 3. Presenters • Michael R. Carlson - Chief Technical Officer - Microsoft CSE and HP ASE - Over 15 years in computer industry Gavin H. Livingstone - Over 25 years in computer industry Copyright 2005 3
  • 4. About Bryley • Business Technology Solutions • Established and incorporated 1987 • Full-service, end-to-end provider: - Computer networks Network security Telephone systems Voice and data cabling Copyright 2005 4
  • 5. About Bryley (continued) • Seasoned, experienced, friendly staff • Flexible contract and service options • Long-term, stable relationships Copyright 2005 5
  • 6. Agenda I. Common Threats II. Preventative measures III. Questions and answers Copyright 2005 6
  • 7. I. Common Threats • • • • • • • I. II. III. Viruses Spyware Spam Phishing Objectionable Content External Threats The Threat Within Common Threats Preventative measures Questions and answers Copyright 2005 7
  • 8. Viruses • • • • Self-replicating Consumes system and network resources Corrupts programs and data Several types – – – – Program and Macro viruses Scripts E-mail worms Trojans Copyright 2005 8
  • 9. Spyware • • • • Gathers information about computer use patterns Slows system response, may cause errors and instability Compromises user privacy Often installed with the user’s permission Copyright 2005 9
  • 10. Spam • • • • • Unsolicited advertising e-mail Also includes messages trying to spread viruses and spyware Wastes employees’ time distinguishing legitimate e-mail from SPAM Legitimate e-mail may be inadvertently deleted. Not unusual for a majority of e-mail to be SPAM Copyright 2005 10
  • 11. Phishing • • E-mail that insists that an account must be updated or verified, usually for “security reasons” E-mail contains links to a web site that is similar in design and name to the legitimate web site Copyright 2005 11
  • 13. External Threats • • • Internet connected systems are often scanned for know vulnerabilities Compromised systems are used to send SPAM or store illegal content Targeted attacks Copyright 2005 13
  • 14. The Threat Within • • • • • • Unnecessary access allows careless or malevolent employees to move or delete data Passwords which are easily guessed or written down allow access to other employees’ accounts Stolen or lost portable devices contain data and may allow for unauthorized remote access rnet connected systems are often scanned for know vulnerabilities Compromised systems are used to send SPAM or store illegal content Targeted attacks Copyright 2005 14
  • 15. II. Preventative Measures • • • • • • • Computer & Internet Use Policy Security Policy User Education Security Technologies Wireless Security Backup Disaster Recovery Copyright 2005 15
  • 16. Computer & Internet Use Policy • • • • • Defines how employees use while reducing organization’s liability As formal as other policy documents Use company-approved software only Do not share accounts and passwords Do not write down passwords Copyright 2005 16
  • 17. Computer & Internet Use Policy (continued) • • • • PC and Internet access provided for businessuse only Reduce or eliminate unproductive use (personal shopping, entertainment) Prohibit illegal use (downloading copyrighted materials, gambling) Limit legal liability (sexual harassment, illegal activities) Copyright 2005 17
  • 18. Security Policy • • • • Complements the Computer & Internet Use policy Defines from a technology standpoint what is allowed and not allowed on the network Defines the process for making changes, including who authorizes changes Needed when a firewall, anti-spam, or Internet filtering solution is installed Copyright 2005 18
  • 19. User Education • Avoid virus infection and spyware installation – – – – Do not open unexpected e-mail attachments Do not install “free” or “ad-supported” software Do not click on pop-up ads Be careful when responding to requests to install something from a web site. These requests might be worded in a deceptive or misleading manner. Copyright 2005 19
  • 20. User Education (continued) • Avoid using “remember password”, especially on portable devices that may be lost or stolen. To avoid phishing and other scams: • – – – – Be skeptical of requests for personal info Do not respond to suspicious e-mail If concerned, contact the company through a previously established channel Review credit-card and bank statements carefully Copyright 2005 20
  • 21. Security Technologies • • • • • • • • Operating System Security Firewall VPN Virus and Spyware Protection SPAM Filtering Internet-Site Blocking Intrusion Detection & Prevention Layering Copyright 2005 21
  • 22. Security Technologies – Operating System Security • • • • • • • • • • • • All users should have their own username and password Require minimum password length and periodic password changes Use file and directory security to limit user access Enable auditing and/or encryption on sensitive files and directories Operating System Security Firewall VPN Virus and Spyware Protection SPAM Filtering Internet-Site Blocking Intrusion Detection & Prevention Layering Copyright 2005 22
  • 23. Security Technologies – Operating System Security (continued) • • • Administrative access should be limited If at all possible, administrators should use a non-privileged account for day to day work Install vendor-supplied security patches Layering Copyright 2005 23
  • 24. Security Technologies – • • • Firewall Controls network traffic between its interfaces (typically LAN and Internet) Default rules block inbound traffic, allow outbound traffic Stateful packet inspection Copyright 2005 24
  • 25. Security Technologies – • • • Firewall (continued) Additional interfaces Other technologies included in firewall Software firewalls Copyright 2005 25
  • 26. Security Technologies – • • • • VPN Encrypted connection over the Internet Primary is always a hardware device Remote hardware devices Software client Copyright 2005 26
  • 27. Security Technologies – • • • • Virus and Spyware Protection Spyware detection is often available as an add-on to an antivirus package Compares files or e-mail messages against known signatures Subscription for updates is a necessity Multiple protection points Copyright 2005 27
  • 28. Security Technologies – SPAM Filtering • • • • • ISP mail filtering Single user Subscription service Onsite mail filtering Some anti-spam options: – – – McAfee Anti-Spam Postini SurfControl Copyright 2005 28
  • 29. Security Technologies – • • • • Internet-Site Blocking Restrict access to non-productive web-sites on the Internet Log only or log and block PC-based, firewall-based, separate device Site categorization subscription Copyright 2005 29
  • 30. Security Technologies – • • • • • Intrusion Detection & Prevention Examines network traffic against a database of known attacks Rules-based escalation process Dynamically configures routers and firewalls to ignore traffic from attacking sites Available on some firewalls Sensors can be placed on the LAN to detect and block virus activity internally Copyright 2005 30
  • 31. Security Technologies – • • Layering Multiple, redundant levels of protection Multi-vendor solutions at key areas Copyright 2005 31
  • 32. Wireless Security • • • • • Non-secured wireless networks allow unauthorized users to connect Enable the best security compatible with all devices Do not broadcast SSID WPA if possible, otherwise WEP Access points and firewalls that support VPN Copyright 2005 32
  • 33. Backup • • Store all data on servers Data-backup plan: – – – – • Who manages the process What gets backed-up and how often Schedule off-site rotation Review backup logs Ask for our free Server-Backup Guide Copyright 2005 33
  • 34. Disaster Recovery • • • • Create & distribute a contingency plan Backup data often and rotate media Test restoration of backup data Build redundancy into all business-critical systems: Phone, computer-network, networksecurity, etc. Copyright 2005 34
  • 35. III. Questions and Answers Copyright 2005 35
  • 37. VI. Questions and Answers Copyright 2005 37