SlideShare a Scribd company logo
1 of 12
UNIVERSITY OF ABOMEY-CALAVI
                 -o-o-o-o-o-o-o-o-
         ABOMEY-CALAVI POLYTECHNIC
                  -o-o-o-o-o-o-o-
 COMPUTER SCIENCE AND TELECOMMUNICATIONS
               DEPARTEMENT
OPTION: NETWORKS AND TELECOMMUNICATIONS 5
                     -o-o-o-
           Discipline: ENGLISH


           Network Basic Security


Presented by:                   Under the baton of:
RADJI Mohamed                   Mr Bienvenu OLORY
                                                 RADJI Mohamed
                  01/01/2013                                     1
Outline
                   INTRODUCTION
            1.   NETWORKING THREATS
            2.   METHODS OF ATTACK
            3.   SECURITY POLICY
            4.   USING FIREWALLS
                   CONCLUSION

Network Basic Security                 RADJI Mohamed
                          01/01/2013                   2
INTRODUCTION



 1. NETWORKING
     THREATS



  2. METHODS OF
      ATTACK

                            INTRODUCTION
3. SECURITY POLICY




4. USING FIREWALLS




  CONCLUSION



   Network Basic Security                  RADJI Mohamed
                            01/01/2013                     3
NETWORKING THREATS (1)
 INTRODUCTION
                           Hackers are intruders who gain access to a
                            network through the carelessness of network
 1. NETWORKING
     THREATS
                            users.
                           Attacks can come from both internal and
                            external sources. Internal attacks account for
  2. METHODS OF
      ATTACK                70% of security incidents.
                           Social engineering is a group of techniques
                            used to deceive internal users into performing
3. SECURITY POLICY
                            specific actions or revealing confidential
                            information.
4. USING FIREWALLS
                           Three types of social engineering attacks are:
                            pretexting, phishing and vishing.

  CONCLUSION


   Network Basic Security                                       RADJI Mohamed
                                    01/01/2013                                  4
NETWORKING THREATS (2)
 INTRODUCTION



 1. NETWORKING
     THREATS



  2. METHODS OF
      ATTACK



3. SECURITY POLICY




4. USING FIREWALLS




  CONCLUSION


   Network Basic Security                  RADJI Mohamed
                            01/01/2013                     5
METHODS OF ATTACK
 INTRODUCTION

                          Viruses are programs that once activated
 1. NETWORKING
                           spread by modifying other programs or files,
     THREATS               causing damage to files, or erasing them
                           completely.
  2. METHODS OF           A worm is similar to a virus except it runs
      ATTACK
                           independently and spreads by resending itself
                           an e-mail attachement or part of a network
3. SECURITY POLICY
                           message.
                          A Trojan horse is a program that appears
                           legitimate. Once initiated, it can damage a
4. USING FIREWALLS         hard drive or create a back door into a system
                           allowing hackers to gain access.

  CONCLUSION


   Network Basic Securityccbb                                   RADJI Mohamed
                                   01/01/2013                                   6
SECURITY POLICY (1)

 INTRODUCTION
                           A security policy should include identification
 1. NETWORKING
                            and authentication policies, password policies,
     THREATS                acceptable use policies, remote access policies,
                            and incident handling procedures.
  2. METHODS OF
      ATTACK
                           All users of network must support and follow
                            the security policy in order for it to be effective.
3. SECURITY POLICY
                           Keep software applications up-to-date with the
                            latest security patches and updates to help deter
                            threats.
4. USING FIREWALLS




  CONCLUSION


   Network Basic Security                                           RADJI Mohamed
                                     01/01/2013                                     7
SECURITY POLICY (2)

 INTRODUCTION


                           Antivirus software, installed on every computer,
 1. NETWORKING
     THREATS
                            detects and removes known viruses, worms and
                            Trojan horses.
  2. METHODS OF            Anti-spam software identifies spam and places it
      ATTACK
                            into a junk folder or deletes it.
                           Tools and applications used in securing a
3. SECURITY POLICY
                            network include: Software patches and updates –
                            Virus protection – Spyware protection – Spam
4. USING FIREWALLS          blockers – Pop-up blockers – Firewalls.


  CONCLUSION


   Network Basic Security                                        RADJI Mohamed
                                    01/01/2013                                   8
USING FIREWALLS (1)

 INTRODUCTION



 1. NETWORKING
     THREATS



  2. METHODS OF
      ATTACK               Packet Filtering –controls access based on IP or
                            MAC addresses.
3. SECURITY POLICY
                           Application/web Site Filtering controls access
                            based on the application.
                           Statefull Packet Inspection (ISP) ensures
4. USING FIREWALLS
                            incoming packets are legitimate responses to
                            requests from internal hosts. SPI can recognize
  CONCLUSION                and filter out attacks such as DoS.

   Network Basic Security                                        RADJI Mohamed
                                    01/01/2013                                   9
USING FIREWALLS (2)

 INTRODUCTION



 1. NETWORKING
                            A DMZ is an area of the network that is
     THREATS                 accessible to both internal and external users.
                            If the wireless access point is unsecured, anyone
  2. METHODS OF
      ATTACK                 who connects to it is considered part of the
                             internal network and is on the protected side of
3. SECURITY POLICY
                             the firewall.


4. USING FIREWALLS




  CONCLUSION


   Network Basic Securityc                                        RADJI Mohamed
                                     01/01/2013                                   10
INTRODUCTION



 1. NETWORKING
     THREATS



  2. METHODS OF
      ATTACK                 CONCLUSION
3. SECURITY POLICY




4. USING FIREWALLS




  CONCLUSION


   Network Basic Security                 RADJI Mohamed
                            01/01/2013                    11
INTRODUCTION

                            THANK YOU FOR YOUR KIND
 1. NETWORKING
     THREATS                       ATTENTION.
  2. METHODS OF
      ATTACK



3. SECURITY POLICY       YOUR QUESTIONS AND
                      SUGGESTIONS ARE WELCOME.
4. USING FIREWALLS




  CONCLUSION


   Network Basic Security                     RADJI Mohamed
                                01/01/2013                    12

More Related Content

What's hot

5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
5 Tips For Preventing Ransomware On Your Network
5 Tips For Preventing Ransomware On Your Network5 Tips For Preventing Ransomware On Your Network
5 Tips For Preventing Ransomware On Your NetworkNetFort
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 

What's hot (20)

5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Cyber security
Cyber securityCyber security
Cyber security
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
5 Tips For Preventing Ransomware On Your Network
5 Tips For Preventing Ransomware On Your Network5 Tips For Preventing Ransomware On Your Network
5 Tips For Preventing Ransomware On Your Network
 
Network security
Network securityNetwork security
Network security
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 

Similar to Network basic security

Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1Ryan Mc Donagh
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxpriestmanmable
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhdtopiccom
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...VOROR
 
Discovery Home S B Chapter 8
Discovery  Home  S B  Chapter  8Discovery  Home  S B  Chapter  8
Discovery Home S B Chapter 8tinwerf
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threatsTIKAJ
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a CrimeNovizul Evendi
 

Similar to Network basic security (20)

Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docx
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Network security
Network securityNetwork security
Network security
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Discovery Home S B Chapter 8
Discovery  Home  S B  Chapter  8Discovery  Home  S B  Chapter  8
Discovery Home S B Chapter 8
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a Crime
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 

Network basic security

  • 1. UNIVERSITY OF ABOMEY-CALAVI -o-o-o-o-o-o-o-o- ABOMEY-CALAVI POLYTECHNIC -o-o-o-o-o-o-o- COMPUTER SCIENCE AND TELECOMMUNICATIONS DEPARTEMENT OPTION: NETWORKS AND TELECOMMUNICATIONS 5 -o-o-o- Discipline: ENGLISH Network Basic Security Presented by: Under the baton of: RADJI Mohamed Mr Bienvenu OLORY RADJI Mohamed 01/01/2013 1
  • 2. Outline INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK 3. SECURITY POLICY 4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 2
  • 3. INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK INTRODUCTION 3. SECURITY POLICY 4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 3
  • 4. NETWORKING THREATS (1) INTRODUCTION  Hackers are intruders who gain access to a network through the carelessness of network 1. NETWORKING THREATS users.  Attacks can come from both internal and external sources. Internal attacks account for 2. METHODS OF ATTACK 70% of security incidents.  Social engineering is a group of techniques used to deceive internal users into performing 3. SECURITY POLICY specific actions or revealing confidential information. 4. USING FIREWALLS  Three types of social engineering attacks are: pretexting, phishing and vishing. CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 4
  • 5. NETWORKING THREATS (2) INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK 3. SECURITY POLICY 4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 5
  • 6. METHODS OF ATTACK INTRODUCTION  Viruses are programs that once activated 1. NETWORKING spread by modifying other programs or files, THREATS causing damage to files, or erasing them completely. 2. METHODS OF  A worm is similar to a virus except it runs ATTACK independently and spreads by resending itself an e-mail attachement or part of a network 3. SECURITY POLICY message.  A Trojan horse is a program that appears legitimate. Once initiated, it can damage a 4. USING FIREWALLS hard drive or create a back door into a system allowing hackers to gain access. CONCLUSION Network Basic Securityccbb RADJI Mohamed 01/01/2013 6
  • 7. SECURITY POLICY (1) INTRODUCTION  A security policy should include identification 1. NETWORKING and authentication policies, password policies, THREATS acceptable use policies, remote access policies, and incident handling procedures. 2. METHODS OF ATTACK  All users of network must support and follow the security policy in order for it to be effective. 3. SECURITY POLICY  Keep software applications up-to-date with the latest security patches and updates to help deter threats. 4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 7
  • 8. SECURITY POLICY (2) INTRODUCTION  Antivirus software, installed on every computer, 1. NETWORKING THREATS detects and removes known viruses, worms and Trojan horses. 2. METHODS OF  Anti-spam software identifies spam and places it ATTACK into a junk folder or deletes it.  Tools and applications used in securing a 3. SECURITY POLICY network include: Software patches and updates – Virus protection – Spyware protection – Spam 4. USING FIREWALLS blockers – Pop-up blockers – Firewalls. CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 8
  • 9. USING FIREWALLS (1) INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK  Packet Filtering –controls access based on IP or MAC addresses. 3. SECURITY POLICY  Application/web Site Filtering controls access based on the application.  Statefull Packet Inspection (ISP) ensures 4. USING FIREWALLS incoming packets are legitimate responses to requests from internal hosts. SPI can recognize CONCLUSION and filter out attacks such as DoS. Network Basic Security RADJI Mohamed 01/01/2013 9
  • 10. USING FIREWALLS (2) INTRODUCTION 1. NETWORKING  A DMZ is an area of the network that is THREATS accessible to both internal and external users.  If the wireless access point is unsecured, anyone 2. METHODS OF ATTACK who connects to it is considered part of the internal network and is on the protected side of 3. SECURITY POLICY the firewall. 4. USING FIREWALLS CONCLUSION Network Basic Securityc RADJI Mohamed 01/01/2013 10
  • 11. INTRODUCTION 1. NETWORKING THREATS 2. METHODS OF ATTACK CONCLUSION 3. SECURITY POLICY 4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 11
  • 12. INTRODUCTION THANK YOU FOR YOUR KIND 1. NETWORKING THREATS ATTENTION. 2. METHODS OF ATTACK 3. SECURITY POLICY YOUR QUESTIONS AND SUGGESTIONS ARE WELCOME. 4. USING FIREWALLS CONCLUSION Network Basic Security RADJI Mohamed 01/01/2013 12