IT NETWORKS AND

slicedmitesSécurité

16 févr. 2014 (il y a 3 années et 5 mois)

76 vue(s)

IT NETWORKS AND
SECURITY

October 24,
2013

Amy Kamerdze, CISSP

Terms and Terminology


Routers and Switches


Forward packets, form backbone of computer networks



LAN


Local Area Network


WAN


Wide Area Network



Intranet


Company’s internal network


Extranet


E
xtension of company’s network that allows controlled access



Terms and Terminology


Firewall


System designed to prevent unauthorized access to or from a
private network



Intrusion
Detection and Intrusion Prevention Systems
(IDS and IPS
)


A device or application that monitors network or computer activity
for malicious behavior




Virtual Private Network


Dedicated connection between two sites (usually an encrypted
tunnel session)


How Computer Networking Works

http://www.cellbiol.com/bioinformatics_web
_development/lib/exe/detail.php/chapter_1
_
-
_internet_networks_and_tcp
-
ip/data_transmission_over_the_internet_th
rough_tcp
-
ip.png?id=chapter_1_
-
_internet_networks_and_tcp
-
ip%3A1
-
2_the_tcp
-
ip_family_of_internet_protocols

Basic Network Diagram


Extended Network Diagram

Computer Attacks and Hacks

Computer Attacks and Hacks


Phishing


Email fraud scam used for identity and information theft



Spear phishing


Email fraud scams that target organizations (usually for financial
gain or confidential information)



Malware


Viruses
,
Worms


Trojans
, Botnets




Advanced Persistent Threats


Computer Attacks and Hacks

C&C Controller

IT Security Safeguards


Security policy


http://www.sans.org/critical
-
security
-
controls/



Secure architecture and
infrastructure


Patch & update servers
and machines (CVE
notifications, Microsoft
updates)



Security awareness
education


IT Security Resources

US
-
CERT

http://
www.us
-
cert.gov/related
-
resources


SANS

http://
www.sans.org/it_security.php


Annual CSI Computer Crime and Security Survey


IC3 / NW3C

http://
www.nw3c.org/services/ic3/ic3
-
annual
-
reports


SC Magazine

http://www.scmagazine.com
/


Info Security Magazine

http://www.infosecurity
-
magazine.com
/






Questions?

Thank you for your time!



Amy Kamerdze

axsari04@yahoo.com



Citations & References



Slide 4
-

http://www.cellbiol.com/bioinformatics_web_development/lib/exe/detail.php/chapter_1_
-
_internet_networks_and_tcp
-
ip/data_transmission_over_the_internet_through_tcp
-
ip.png?id=chapter_1_
-
_internet_networks_and_tcp
-
ip%3A1
-
2_the_tcp
-
ip_family_of_internet_protocols



Slide 7 sources
(in order from Top Left pie chart)


2010/2011 Computer Crime and Security Survey,
The Guardian (Adobe article), Forbes (Are You Prepared article), 2012 IC3 Internet Crime Report, NSBA 2013
Technology Survey, Seattle Times (3 charged in computer virus attacks article)



Slide 9


Botnets, backdoor
trojans

(Green); viruses, worms and some
trojans

(Red)



Slide 10


CIA Triad: http://en.wikipedia.org/wiki/Information_security