School of Engineering and Architecture - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

School of Engineering and Architecture

Description:

School of Engineering and Architecture. Networking and Network Security ... Bastion Host. Router. ACL (Access Control List) DMZ (DeMilitarized Zone) Router and ACL ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 15
Provided by: raedh
Category:

less

Transcript and Presenter's Notes

Title: School of Engineering and Architecture


1
LEBANESE AMERICAN UNIVERSITY
  • School of Engineering and Architecture
  • Networking and Network Security
  • Presented by Mohamad Haidar

2
Table of Contents
  • Introduction to Networking
  • TCP/IP
  • Risk Management (Security)
  • Types and Sources of Network Threats
  • Firewalls
  • Conclusion

3
Introduction to Networking
  • What is a network ?
  • The ISO/OSI Reference Model

4
(continued)
  • What are some popular Networks?
  • UUCP (Unix-to-Unix CoPy)
  • Batch-Oriented Processing
  • Implementation Environment

  • Sample UUCP Network

5
(continued)
  • The Internet Worlds largest network of networks
  • Simple LAN(Local Area Network)
    Network line

6
The Internet
  • This is a wider view of Internet-connected
    Networks

7
TCP/IP The Language of the Internet
  • IP (Internet Protocol)
  • Understanding IP
  • Attacks Against IP
  • IP Spoofing
  • IP Session Hijacking
  • TCP (Transport Control Protocol)
  • Guaranteed Packet Delivery
  • UDP (User Datagram Protocol)
  • Lower Overhead than TCP

8
Risk Management The Game of Security
  • - Two extremes Absolute Security and Absolute
    Access
  • - Every organization needs to decide for itself
    where between the two extremes of total security
    and total access they need to be.

9
Types and Sources of Network Threats
  • DoS (Denial-of-Service)
  • Solution
  • 1. Not running your visible-to-the-world servers
    at a level too close to capacity.
  • 2. Packet Filtering to prevent obviously forged
    packets from entering into your network address
    space.
  • Unauthorized Access
  • Executing Commands Illicitly

10
(continued)
  • Destructive Behavior
  • Data Diddling
  • Data Destruction
  • Where do they come from ?
  • Any connection that you have to the outside world
  • Lessons learned
  • Have Backups.
  • Dont put data where it doesnt need to be.
  • Avoid systems with single point of failure.
  • Have someone familiar with security practices.

11
Firewalls
  • Number of terms specific to Firewalls
  • Bastion Host
  • Router
  • ACL (Access Control List)
  • DMZ (DeMilitarized Zone)

12
(continued)
  • Router and ACL

13
Conclusion
  • It is important to build systems and networks in
    such a way that the user is not continuously
    reminded of the security system around him.
  • Security is everybodys business, and only with
    everyones cooperation, an intelligent policy
    will it be achievable.

14
Thank You !!
Write a Comment
User Comments (0)
About PowerShow.com