Download Networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Deep packet inspection wikipedia , lookup

Peering wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer security wikipedia , lookup

Wireless security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

Distributed firewall wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
NETWORKS
Lauren Hickman
Patrick McCamy
Morgan Pace
Noah Ryder
Objectives





Types of Networks
Components of Networks
Risks to Networks
Network Security/Controls
Auditing Networks
What is a Network?


Two or more connected computers that allow the
process of telecommunications to occur
Telecommunications is the transfer of text, audio,
video, or other data formats
Types of Networks

Characterized in 3 categories:
 Distance
 Ownership
 Client/Server
Networks
Distance

Local Area Network (LAN)
 Connected
computers within a short geographical
distance of one another

Wide Area Network (WAN)
 Connects
another
computer large geographic away from one
Ownership

Intranet
 Internal

network within a company
Extranet
 Connects

internal network to outside business partners
Virtual Private Network (VPN)
 Uses
public internet connection but achieves privacy
through encryption and authentication
Client/Server Networks


Network servers that manage the networks and host
applications that are shared with client computers
Two types:
 Two-tiered
 Three-tiered
Network Security and Controls

Authentication
 Process

of ensuring users are who they say they are
Encryption
 Scrambling
or coding data so that anyone who views
will not be able to decode it without a decryption key

Firewalls
 Hardware
network
and software to control outside access to the
Components of a Network




Computers and terminals
Telecommunication channels
Telecommunication processors
Routers and Switching devices
Computers and Terminals


Computers process data in a network and
send/receive information to and from terminals
Terminals serve as input/output devices
Telecommunications Channels



Transmit data from computer to computer
Physical transmitters
Wireless transmitters
Telecommunications Processors

Most common is a modem
 Transforms
digital communication signals to analog
signals for transfer and then back to digital signals

Digital communication networks
Routers and Switching Devices



Switches: connect network components and ensure
messages are delivered to appropriate destinations
Routers: similar to switches but with more complex
features based on protocols
Approaches to switching
 Message
switching
 Packet switching
 Circuit switching
Risks to Networks





Social Engineering
Physical Infrastructure Threats
Programmed Threats
Denial of Service Threats
Software Vulnerabilities
Social Engineering Diversion
“Soc-ing”



VoIP Vulnerabilities – Can open channel to network
that is not fire-walled
Phishing Scams – i.e. – emails from unknown persons
containing malicious links.
Cross Site Scripting (XSS) – leads to account
hijacking, changing of user settings, cookie
theft/poisoning, or false advertising
Network Security




Network manager and network security
administration
Authentication
Encryption
Firewalls
Auditing Networks



Perform risk assessment procedures to assess
vulnerabilities
Evaluate controls and their effectiveness
Auditing Network Security
 Network
diagrams
 Determine what assets, who has access, and understand
connections
 Penetration testing
 Benchmarking
Risk Assessment Procedures

Basic vulnerabilities of a network
 Interception-
transmitted data is intercepted by a third
party
 Availability- unavailability of the network could result
in losses for the firm
 Access/Entry points- a weak point in access can make
the information assets vulnerable to intruders
Evaluate Controls





Physical access controls
Transmitted information should be encrypted
Network should have sufficient management
Controls to limit the type of traffic
Passwords for everyone who has access
Auditing Networks





Network diagrams
Determine what assets
Who has access
Understand connections
Penetration testing
Questions?