Network Security BY : SARA ALFURAIHY

advertisement
Network
Security
BY : SARA ALFURAIHY
There are two extremes in
Network safety:
Absolute Security and
Absolute open
Absolute security is:
unplugged from the
network and power,
locked in a safe, and
thrown to the bottom
of the ocean
How to keep your
network safe
NOW or be sorry
later!
4 Simple Rules
Always keep your virus and Windows software updates “on”
Always keep your firewall “on”
Back up, Back up, Back up
Always keep your passwords and key phrases safe
Better Safe Than Sorry
 Do not use common words or phrases for
passwords
Do not keep your passwords written
on a post-it taped to your computer monitor
Back-up, back-up, back-up
Strange But True
•You cannot secure a laptop
until you securethe laptop
•Make sure everyone follows
the security plan, even the boss
•Smart people can be stupid too
, even HR
Human Nature
Also Called Social Engineering
Everyone Wants To Help
Passwords are meant to be a SECRET !
Password Discovery Table
Keep Your Email Safe
Make sure to scan all
email messages!
Do not open email from
unknown sources or that
you are not expecting
Once they are in, only
unplugging and
reinstalling OS will work
New Type of Attack,
Spear-Phising4
Keeping your data safe
Identify and Authenticate
Use a Surge Protector
Safeguard against Unauthorized Access
Server-side protection
Password protect
Wireless Networks
Turn off the SSID broadcast
Password protect your router
Do not leave MAC addresses open to others
Leave your hardware firewall on
Use matching vendors
Never use WEP protocols only the newer WPA2
and above
Best Practices
Do not pay more for your security
than your data is worth!
Password protect all of your
important data!
What is a computer virus?
Computer virus is a program designed to
spread itself by first infecting executable files
or the system areas of hard and floppy disks
and then making copies of itself. Viruses
usually operate without the knowledge or
desire of the computer user.
What kind of files can
spread viruses?
Viruses have the potential to infect any type of executable
code, not just the files that are commonly called 'program files'.
For example, some viruses infect executable code in the boot
sector of floppy disks or in system areas of hard drives. Another
type of virus, known as a 'macro'
virus, can infect word processing and spreadsheet documents
that use macros. And it's possible for HTML documents
containing JavaScript or other types of executable code to
spread viruses or other malicious code.
How do viruses spread?
When you execute program code that's infected by a virus, the
virus code will also run and try to infect other programs, either on
the same computer or on other computers connected to it over
a network. And the newly infected programs will try to infect yet
more programs.
When you share a copy of an infected file with other computer
users, running the file may also infect their computers; and files
from those computers may spread the infection to yet more
computers.
Where is the virus located?
Boot sector viruses alter the program that is in the
first sector (boot sector) of every DOS-formatted
disk. Generally, a boot sector infector executes its
own code (which usually infects the boot sector or
partition sector of the hard disk), and then continues
the PC bootup (start-up) process. In most cases, all
write-enabled floppies used on that PC from then on
will become infected
How can I avoid infection?
There is no way to guarantee that you will avoid infection.
However, the potential damage can be minimized by taking
the following precautions:
* Make sure you have a clean boot disk - test with whatever
(up-to-date!) antivirus software you can get hold of and make
sure it is (and stays) write-protected. Boot from it and make a
couple of copies.
* Use reputable, up-to-date and properly-installed anti-virus
software regularly. (See below) If you use a shareware
package for which payment and/or registration is required, do
it. Not only does it encourage the writer and make you feel
virtuous, it means you can legitimately ask for technical
support in a crisis.
Download