Title: Network Security
1Network Security
- Keeping your office network and computers secure
from outside threats
2Network Security Agenda/Overview
- Why do I need network security?
- What kinds of computers and networks should be
secured? - How do I secure my computer or network?
- Glossary of Terms
- References
3Network Security
- Why do I need network security?
4Network Security Why to secure
- Threats to your computer can occur in many ways,
but they can be boiled down to - Threats originating from within (inside your
office/network) - Threats originating from without (outside of your
office/network)
5Network Security Why to secure
- Threats originating from within can consist of
- Theft of files/info/equipment
- Malicious or accidental deletion of files
- Abuse of email/Internet access
- Power failures and surges
- Hardware failures
- And so on
6Network Security Why to secure
- Although there are steps you can take to help
avoid these threats from within, that is not the
focus of this presentation
7Network Security Why to secure
- This presentation will focus on threats that
originate from the outside. These can include - Viruses sent via email
- Identity theft
- Use of your computer in a Denial of Service (DoS)
attack - Accessing info stored on your hard drive
8Network Security Why to secure
- Using your computer to forge emails
- Maliciously deleting files or changing data
- Monitoring your activity on the Internet
- Accessing back doors and Remote Administration
to get into your computer - And so on
9Network Security Why to secure
- Any time a computer is connected to the Internet,
it becomes vulnerable to these outside threats - Even if a computer does NOT connect to the
Internet, it is still vulnerable to getting a
virus from a floppy disk or another computer that
DOES connect to the Internet
10Network Security
- What kinds of computers and networks need to be
secured? - We will look at several different configurations
that are typical of small offices
11Network Security What to secure
- Single or Multiple Computers no Internet
connectivity - Possible Threat Virus from a floppy disk or a CD
made from a computer that is infected - Additional Threat Virus can migrate from
infected computer to others on the network
12Network Security What to secure
- Stand-alone computers may still become infected
with a virus transferred through floppies and CDs
13Network Security What to secure
- Viruses can infect additional computers that are
on a common network
14Network Security What to secure
- Single Computer with Dial-up Access to the
Internet - Possible Threat Intruders from outside can
possibly break in while computer is on-line - Additional Threat Since the computer is on-line,
viruses can also come in from email
15Network Security What to secure
- Even with just dial-up service to the Internet, a
hacker can gain access to your computer while it
is on-line - Also faces threats from email-based viruses
16Network Security What to secure
- Single or Multiple Computers with Broadband
Access to the Internet - Possible Threat With broadband connections,
computers are connected to Internet whenever they
are on, so attacks from hackers are more likely - Additional Threat Email-based viruses are still
a problem
17Network Security What to secure
- A computer connected to the Internet with a cable
or DSL modem is most vulnerable to intruders - Since it is always attached to the Internet, it
gives hackers many opportunities to attempt to
break into it
18Network Security What to secure
- Multiple computers usually must use a ROUTER to
connect through a cable or DSL modem. This offers
some protection against intruders
19Network Security What to secure
- In summary, whether you have
- Just one computer or many
- Stand-alone or networked
- Connected to the Internet or not
- Dial-up or broadband
- You need to secure your computers!
20Network Security
- How do I secure my computer or network?
- We will look at several different products, both
hardware and software, that protect different
aspects of a computer or a network
21Network Security How to secure
- There are many products available that help to
secure an individual computer or a whole network - There are also some common sense things you can
do to help keep intruders out and your data safe
22Network Security How to secure
- To protect against viruses
- Use a good Anti-Virus software package on all of
your computers - You MUST keep it updated with the latest virus
definitions (requires Internet access)
23Network Security How to secure
- To protect against viruses (cont.)
- Practice Common Sense email usage
- Dont open file attachments without scanning them
for viruses - Dont open file attachments that are programs
- Dont open file attachments from questionable
sources - Dont forward email attachments or hoaxes before
checking them out - Scan floppies or home-made CDs before using them
24Network Security How to secure
- To protect against outside attacks
- Check the Windows website for known security
problems. Do not update your OS without checking
with your billing software vendor! (requires
Internet access) - This will keep you posted on security holes that
attackers like to exploit.
25Network Security How to secure
- To protect against outside attacks
- For dial-up computers or a single computer
connected via broadband, purchase or download a
software Firewall (Zone Alarm, Check Point,
BlackICE, etc. - This protects the computer while it is connected
to the Internet and blocks attackers from
accessing your computer
26Network Security How to secure
27Network Security How to secure
- To protect against outside attacks
- For multiple computers connected via broadband,
purchase a hardware Firewall router (Linksys,
Netgear, D-Link, Cisco, WatchGuard, etc.) - A software or hardware Firewall monitors and
blocks incoming packets if it determines they are
coming from an attacker
28Network Security How to secure
29Network Security How to secure
- Remember!
- Use Anti-Virus software and keep it updated
- Use a software or hardware firewall to protect
your computer or network - Practice common sense email usage
- Do not update your operating system unless your
billing software vendor permits it. - Backup your critical data regularly to CD-Rs, Zip
disks, or streaming tape - Store the backups off-site if possible
30Network Security
31Network Security Glossary
- Anti-Virus Software
- Software that runs on a computer designed to
protect that computer from any suspicious files
or programs that try to run that could harm the
computer - Anti-virus software is only as good as its virus
definitions - As new viruses are created, the anti-virus
software must be updated in order to be able to
keep protecting the computer
32Network Security Glossary
- Broadband Connection
- Broadband is a general term used to refer to
high-speed connections to the Internet - Cable and DSL are two types of broadband
connections that are much faster than a dial-up
connection
33Network Security Glossary
- Cable Internet Access
- Cable Internet access comes over the cable TV
(CATV) lines - A cable modem takes the signal off of the CATV
line and converts it into Ethernet - Cable is commonly considered a form of
broadband connection to the Internet - Continued
34Network Security Glossary
- Cable Internet Access (cont.)
- Typically about 10 times faster than dial-up
modems - Your cable company becomes your Internet Service
Provider (ISP) - Not all cable providers offer Internet access
35Network Security Glossary
- Dial-up Internet Access
- Dial-up Internet access uses a standard phone
line to dial an Internet Service Provider (ISP) - Dial-up access ties up the phone line while it is
in use - Typical connection speeds are around 40 to 50
thousand bits per second (kbps) - Dial-up access will use an internal or external
dial-up modem
36Network Security Glossary
- DSL Internet Access
- DSL stands for Digital Subscriber Line
- DSL Internet access comes over the standard phone
line or a special dedicated phone line - If it is over a standard phone line, it rides on
top of the standard voice portion and does not
interfere with incoming or outgoing calls - Continued
37Network Security Glossary
- DSL Internet Access (cont.)
- A DSL modem takes the signal off of the phone
line and converts it into Ethernet - DSL is commonly considered a form of broadband
connection to the Internet - Typically about 10 times faster than dial-up
modems - You must typically be within 2 to 3 miles of the
central phone switch office to use DSL
38Network Security Glossary
- Ethernet
- A standards-based method of attaching devices
together so that they can communicate at a given
data rate, forming a Local Area Network (LAN) - The standard defines the type of cabling, how it
connects to devices, and the speed at which the
data travels
39Network Security Glossary
- Firewalls
- Software Firewall specialized software running
on a computer to protect a single computer - Hardware Firewall a network device designed to
protect one or more computers - Firewalls monitor incoming data to determine if
it was requested by the user or if it is
originating from a hacker (not requested)
40Network Security Glossary
- Internet Service Provider (ISP)
- The company responsible for providing access and
services to the Internet for end users - For Dial-up access this is the company your
computer calls with a modem - For Cable access this is typically the cable TV
provider - For DSL access this is typically the local
phone company, but it doesnt have to be
41Network Security Glossary
- Local Area Network (LAN)
- A group of computers within one office or
building that are connected on a common Ethernet
wiring segment
42Network Security Glossary
- Virus
- A program designed to do something counter
productive or destructive
43Network Security Glossary
- Wide Area Network (WAN)
- Two or more LANs connected together, over a
larger area, such as cities, states or countries
44Network Security
45Network Security - References
- Reference URLs
- http//www.cert.org
- http//www.secinf.net
- http//www.mcafee.com
- http//www.symantec.com
- http//www.faqs.org/faqs/firewalls-faq/
- http//hoaxbusters.ciac.org
- http//www.f-secure.com
- http//www.clock.org/jss/glossary/
46Network Security