This document discusses network security. It outlines the four types of information assurance: confidentiality, integrity, authentication, and availability. It also describes six common ways to secure a network, including firewalls, IDS/IPS, DMZ, honey pots, proxy servers, and protocol analyzers. Finally, it lists eight common threats to networks such as viruses, worms, adware/spyware, root kits, botnets, and privilege escalation.
6. Firewalls cont’d Offers 5 service and security features Packet filtering Stateful inspection Access and authentication Application layer filtering Network Address Translation (NAT)
7. IDS/IPS IDS (Intrusion Detection Systems) Used to see if someone is on your network IPS (Intrusion Prevention Systems) Attempts to stop an unauthorized user before they get in
9. Honey pots Separate server or service that is used to attract hackers to attack it
10. Proxy servers These are network servers that accept and forwards from the clients and from servers
11. Protocol analyzers These applications monitor everything down to the frame. It can give you the information on Layers 7,5,3,2
12. What threatens a network? Viruses -Attacks that particular system being used and there are 8 types: Boot Sector Viruses- infects the boot sector or partition table of the disk. Companion Viruses- disguises itself as a legitimate using a legitimate program name but a different extension File infector Viruses- infects files that generally has the extension .com or .exe Macro Viruses- attacks programs like excel and word Memory Resident Viruses- when a system is infected by a virus that stays resident in the systems memory, the virus will continue to stay in memory and infect other files Polymorphic Viruses- changes itself with each infection. Created to confuse virus scan programs Metamorphic Viruses- has the ability to change its form and the code keeps changing each time the virus changes. Stealth Viruses- hides itself from virus protection software by encrypting its code. Trojan Horse -A program that hides on your computer and waits to be executed. Logic Bombs- Are distributed primarily by worms and viruses.
13. What threatens a network?Cont’d Worms- Is like a virus except it doesn’t need a person to be present to execute. Adware & Spyware Adware monitors the websites you visit the most and use the information gathered to create targeted advertisements. Spyware is a program that sends information about what you are doing or about your system over the internet. Root kit- A type of back door program that is inserted into application software Botnets- Short for robot network. A bot is typically a type of computer system that is attached to a network whose security has been compromised and runs malicious software completely unknown to the user. Privilege escalation- Exploits bugs in software to gain access.
14. Summary 4 types of Info Assurances 6 types of ways to secure your network 8 threats of a network