You're about to create your best presentation ever

A Free Network Security Presentation Template

Create your presentation by reusing one of our great community templates.

network security presentation

Transcript: Rhys Jordan Network Security Presentation Malware is very dangerous to any user of technology, especially those without the right protection. People will create these malware to receive personal information, steal money or just destroy the technology. This presentation will explain the different types of malware, what is does and how to stop the malware. Introduction Introduction Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware Spyware Solution You can install anti-spyware software on your computer, and the anti-spyware capabilities are included in many anti-virus or anti-malware packages. You can also use a firewall. Solution A computer virus is a program that replicates itself by modifying other programs and creating its own code to mess up your computer Viruses Viruses Solution Computer networks in seven major regional hospitals were locked down for more 24 hours after a widespread computer virus attack shut booking systems, delayed surgeries and reignited fears over patient information security. Solution In computing, a Trojan horse, or Trojan, is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. Trojans Trojans A computer worm is a computer program that replicates itself in order to get to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms Worms In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. DDOS Attacks DDOS attacks Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Ransomware Ransomware In conclusion learning about software is an easier way to prevent from malware giving out personal information to another user. Conclusion Conclusion

Network Security Presentation

Transcript: Prepared by: Fajer Al.Mousawi Computer Engineering Student College of Engineering & Petroleum Kuwait University IT & Internet Three Main Topics - Importance of the Information Technology (IT) & the Internet. - But Be Careful (BBC): Types of Computer Threats. - How to protect your computer. Importance of the Internet & IT *A kind of global meeting place where people from all parts of the world can communicate with each other. *The "internet" is a gigantic library, as well as a world-wide message board, telephone network, and publishing medium. *It is open 24 hours a day, and you can find anything you want there; information about almost any subject is available in depth and up to date. Some of the things that you can do via the Internet are: E-mail: send and receive instant electronic messages, which works like writing letters. Your messages are delivered instantly to people anywhere in the world. Access Information: Any kind of information on any topic under the sun is available on the Internet. The ‘search engines’ on the Internet can help you to find data on any subject that you need. Online Shopping: There are many online stores and sites that can be used to look for products as well as buy them using your credit card. You do not need to leave your house and can do all your shopping from the convenience of your home. Downloading Software: download games, music, videos, movies, and a host of other entertainment software from the Internet, most of which are free. Information Technology is related to studying, designing and developing the information related to computers. In business: There are many businesses which are in need of the software packages for satisfying their operational as well as functional needs. Education: helps the students as well as the teachers in studying the course material easily because of fast access. Studying the subjects with the help of online libraries and dictionaries has made grasping and increasing the knowledge easy for the students. Computer Security Threats As Internet and e-mail become an ever-increasing part of our 21st-century lives, the myriad dangers and risks that come with them are increasing too. What is a hacker? The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam. Types of hacking and threats Viruses A software virus is a parasitic program written intentionally to alter the way your computer operates without your permission or knowledge. A virus attaches copies of itself to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk. A virus may spread through email and instant messenger attachments, through infected files on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows. Macro Viruses Macro viruses are malicious macro programs that are designed to replicate themselves from file to file and can cause damage to the files on your computer. They spread whenever you open an infected file. Macros can be written in documents created by Microsoft Word, in spreadsheets created by Microsoft Excel and in many other kinds of documents. Trojan Horses Trojan horses are programs that appear to serve some useful purpose or provide entertainment, which encourages you to run them. But these programs also serve a covert purpose, which may be to damage files, to place a virus on your computer or to allow a hacker to gain access to your machine. More commonly these days, you can be enticed into running a Trojan by clicking a link on a viral web site or in an email. Worms Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect. Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email. Zombies A Zombie is a dormant program that lies inactive on a computer. It can be activated remotely to aid a collective attack on another computer. Zombies don’t normally damage the computer on which they reside but can damage other computers. Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated. Phishing A Phishing attack is when you are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers,

Network security presentation

Transcript: It is difficult to predict as it needs a lot of work Speed is most particular problem to keep up to pace for security devices Another challenge security faces is ubiquity; even other devices will need security implemented like automobiles, cell phones, digital assistants and refrigerators. Joshi et al. [JOS01] states there are seven different models that could be used for access control in network applications What is a network? network consists of the combination of more than one system in place. If one system fails it does not block users to continue. If this occurs, computing tasks are shifted to another system to continue tasks at hand. Increased reliability What is a network Advantages of computing networks Types of threats Security controls Future of security Network Threats Anonymity- when attacker is not in direct contact of the system and attacks from far locations. Many points of attack- file is stored in a network which is remote from user. The file then passes through other hosts to be received by the user. Sharing- more easier approach when attacking networks. they enable their resources making more users to have the access not just on single computers but to the networked system. complexity of the system unknown perimeter unknown path- sending a file may not be received through traveling to many hosts and attacker gains access Advantages of networks Most important tool used in network security –Encryption can be used to secure an entire network –Or to secure a specific communication difficult for anyone to alter data encrypted unless breaking through encryption but takes long process to figure Type of encryption – Link encryption: protection between two hosts – End-to-end encryption: between two applications By Jason Patto 17766526 Outline of presentation Leads to reducing maintenance + storage cost by gaining improved access to all users Purchasing device individually may be expensive but to share the resources can be worth the purchase References Example of future network security Strong authentication Access control lists are implemented through routers –deny any access of any hosts which are being spammed with packets. Routers are configured and could remove all packets within that specific host. Routers observed as good point for access control through handling packets that are received and sent out within a subnetwork. Firewalls better approach with large-scale + general traffic screening than routers. Future of network security Distributing workload Types of networks Daya, B, n.d., network security: history, importance, and future, University of Florida Department of Electrical and Computer Engineering, viewed 04 October 2014, <http://web.mit.edu/~bdaya/www/Network%20Security.pdf>. Pfleeger, C, and Pfleeger, S, Security in computing, 3rd edn Sharing Addition of new nodes and not having to involve the manager to undertake special actions. Expandability Encryption Connection of two or more devices over a medium through use of hardware and software which communication gets enabled. Encryption Strong authentication Access controls Wireless security Controls of security Network Security The amount of usage within single system varies through amount of users that join but also leave a network. Shifting the workload that is within a heavily loaded system to a underutilized one can benefit the network. Access controls Most difficult to keep secure One-Time Password – Protect against replay attacks – Session Token: valid for only one login session – Challenge-Response System Authentication in Distributed System

Network Security

Transcript: Things you need to know about Network attacks Types: Eavsdropping IP Spoofing Man in the Middle Denial of Service Sniffer Attack Easvsdropping The unaurthized real-time interception of a private message. ex. a phone call A text or a videoconferance Encription and Decription IP Spoofing the act of replacing the IP address information in a packet with fake information. By replacing the true originating IP address with a fake one a hacker can mask the true source of an attack or force the destination IP address to reply to a different machine and possibly cause a denial of service. (More Later) Protection: Use authentication based on key exchange between the machines on your network Ex:IPsec Man in the Middle For Protection downloud... Internet explorer 7 or higher FireFox 3 or higher Google Chrome or Safari Denial of Service an explicit attempt by attackers to prevent legitimate users of a service from using that service. Ex. attempts to "flood" a network ex. attempts to disrupt connections between two machines Ex. attempts to prevent a particular individual from accessing a service or attempts to disrupt service to a specific system or person Protection: Use Tripwire or a similar tool to detect changes in configuration, information or other files. Sniffer Attck application of a device that can read, monitor, and capture network data exchanges and read network packets. For protection encript and sign the data stream Network Security The End By William Sanguinetti attackers intrude into communication the and inject false Protection: and intercept information an existing exchanged data of attacks Cyber Science

Now you can make any subject more engaging and memorable