SlideShare a Scribd company logo
1 of 8
Modern Network
Security Threats
‫المدرب‬:‫م‬/‫إبراهيم‬‫العديني‬
‫المتدربين‬:
‫العمودي‬ ‫رامي‬
‫الدين‬ ‫عماد‬
Submitted
Security curriculum emphasizes core security
technologies, the installation, troubleshooting and
monitoring of network devices to maintain integrity,
confidentiality and availability of data and devices,
and competency in the technologies that uses in its
security structure.
Code Red
In the earlier variant of the worm, victim hosts experienced the
following defacement on all pages requested from the server
Methods of Treatment
Restart your machine. You may need to format
Captain Crunch (John Draper)
sends large quantities of unsolicited email messages .
Must also know about various security organizations which provide
help on:
Detecting and responding to both established and emerging
information security threats.
Operating system weaknesses.
Three of the more well-established network security organizations are:
Computer Emergency Response Team (CERT)
SysAdmin, Audit, Network, Security (SANS) and cisco (SIO)
Polices :
There must be policies to deter intruders
We should have a strong policy of penetration difficult
Using encryption that meets the data security needs of the
organization without imposing an excessive burden on the system
resources or the users.
Using switched networks
Malware:
A worm installs itself using an exploit vector on a vulnerable system.
Propagation mechanism
After gaining access to devices, a worm replicates and selects new targets.
targets.
Payload .
A virus can only spread from one computer to another by:
Sending it over a network as a file or as an email payload.
Carrying it on a removable medium.
A pop-up programs :
A Trojan horse is a program that appears, to the user, to
perform a desirable function but, in fact, facilitates
unauthorized access to the user's computer system.
Hacker
It is a person who penetrates either destroyed or for the
money .
To make the protected network:
Filled firewall
Buy firewall device
Take a copy of your information
Install reliable programs
Continuously update for protection software
CCNAS Ch01

More Related Content

What's hot

Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
Ayed Al Qartah
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
maranan_zyra
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 

What's hot (18)

Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Malicious
MaliciousMalicious
Malicious
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Safeguarding Your Data
Safeguarding Your DataSafeguarding Your Data
Safeguarding Your Data
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Lab 2
Lab 2Lab 2
Lab 2
 
Network security
Network securityNetwork security
Network security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Network security
Network securityNetwork security
Network security
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 

Viewers also liked

Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)
CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)
CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)
The Linux Foundation
 
Inetrnational brands management
Inetrnational brands managementInetrnational brands management
Inetrnational brands management
Mou Mukherjee-Das
 

Viewers also liked (19)

Google - NOAH13 London
Google - NOAH13 LondonGoogle - NOAH13 London
Google - NOAH13 London
 
Marketing management notes @ mba
Marketing management notes @ mba Marketing management notes @ mba
Marketing management notes @ mba
 
CGHANSAH1_FINANCIALANALYSIS
CGHANSAH1_FINANCIALANALYSISCGHANSAH1_FINANCIALANALYSIS
CGHANSAH1_FINANCIALANALYSIS
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)
CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)
CIF16: Solo5: Building a Unikernel Base From Scratch (Dan Williams, IBM)
 
Rosin Research
Rosin ResearchRosin Research
Rosin Research
 
Litosfer 1
Litosfer 1Litosfer 1
Litosfer 1
 
Integrating ONE Automation with Business Systems with the API
Integrating ONE Automation with Business Systems with the APIIntegrating ONE Automation with Business Systems with the API
Integrating ONE Automation with Business Systems with the API
 
Resource packs with EFL activities for child centered practices
Resource packs with EFL activities for child centered practicesResource packs with EFL activities for child centered practices
Resource packs with EFL activities for child centered practices
 
Personal Income Tax 2016 Guide Part 2
Personal Income Tax 2016 Guide Part 2Personal Income Tax 2016 Guide Part 2
Personal Income Tax 2016 Guide Part 2
 
Innovation Driven Procurement
Innovation Driven ProcurementInnovation Driven Procurement
Innovation Driven Procurement
 
شبكات و أمن المعلومات 3
شبكات و أمن المعلومات 3شبكات و أمن المعلومات 3
شبكات و أمن المعلومات 3
 
Profil Perusahaan
Profil PerusahaanProfil Perusahaan
Profil Perusahaan
 
Business process automation: The past, present and future
Business process automation: The past, present and futureBusiness process automation: The past, present and future
Business process automation: The past, present and future
 
Un apéro ou des apéros : une histoire de générations ?
Un apéro ou des apéros : une histoire de générations ?Un apéro ou des apéros : une histoire de générations ?
Un apéro ou des apéros : une histoire de générations ?
 
Teaching styles and development interpersonal skill
Teaching styles and development interpersonal skillTeaching styles and development interpersonal skill
Teaching styles and development interpersonal skill
 
2 litosfer
2   litosfer2   litosfer
2 litosfer
 
Inetrnational brands management
Inetrnational brands managementInetrnational brands management
Inetrnational brands management
 
Student Presentation: To Kill a Mockingbird
Student Presentation: To Kill a MockingbirdStudent Presentation: To Kill a Mockingbird
Student Presentation: To Kill a Mockingbird
 

Similar to CCNAS Ch01

Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
ANUSREEASHOK5
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
AsmaaLafi1
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 

Similar to CCNAS Ch01 (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
امن شبكات ccnas
امن شبكات ccnasامن شبكات ccnas
امن شبكات ccnas
 
امن الشبكات _ccnas
امن الشبكات _ccnasامن الشبكات _ccnas
امن الشبكات _ccnas
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsBreak the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdf
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Apt zero day malware
Apt zero day malwareApt zero day malware
Apt zero day malware
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 

Recently uploaded (16)

Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 

CCNAS Ch01

  • 2. Submitted Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that uses in its security structure.
  • 3. Code Red In the earlier variant of the worm, victim hosts experienced the following defacement on all pages requested from the server Methods of Treatment Restart your machine. You may need to format Captain Crunch (John Draper) sends large quantities of unsolicited email messages . Must also know about various security organizations which provide help on: Detecting and responding to both established and emerging information security threats. Operating system weaknesses.
  • 4. Three of the more well-established network security organizations are: Computer Emergency Response Team (CERT) SysAdmin, Audit, Network, Security (SANS) and cisco (SIO) Polices : There must be policies to deter intruders We should have a strong policy of penetration difficult Using encryption that meets the data security needs of the organization without imposing an excessive burden on the system resources or the users. Using switched networks
  • 5. Malware: A worm installs itself using an exploit vector on a vulnerable system. Propagation mechanism After gaining access to devices, a worm replicates and selects new targets. targets. Payload . A virus can only spread from one computer to another by: Sending it over a network as a file or as an email payload. Carrying it on a removable medium.
  • 6. A pop-up programs : A Trojan horse is a program that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system. Hacker It is a person who penetrates either destroyed or for the money .
  • 7. To make the protected network: Filled firewall Buy firewall device Take a copy of your information Install reliable programs Continuously update for protection software