Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
BAB 7
NETWORK CONTROL
IT SECURITY
Network Comunication Control
Session Overview
d Jargon d Networks risks, security d issues and controls' d Internet security
Network Revision
Comunication Devices
Transmission Media
Twisted pair
Coaxial cable fibre
optic Wi-Fi
Bluetooth
Protocols OSI Model
Thrects and Risks - Malware Virus
Worm
Trojan hors Logic Bomb
Mobile Code
Backdoor
Zommbie
Keystroke Logger
Rottkit
Phising
Virus Hoaxes
Spyware
IT Reats and Risks (Contd)
Attacker Toolkits
Reconnaissance Attacker
Attacker on Integrity
Denial of services (DOS) Attacker
Comunication and Network Controls
Network Policy and
procedures
Denial of services protecion
Boundory Protecion devices
Comunication and Network Control (Col’ltd)
Restricted remote Acess
Virtual Private Network (VPNs)
Malware Prevention and Handling
Instrustion and Prevention (IOP System)
Security of WLAN
IEEE 802.11 I WPA 2
Prefereed Over IEEE 802.11 a/big and WPA
Coundary Protection Devices
oPacket filter firewall
oStateful inspection firewall
oAplication – poxcy gateway firewall
oDedicated proxcy servers
oHost-based Firewall
oPersonal firewall personal firewall appliance
Voice Over IP ( VOIP) Security Considerations
•Increased vulnearbility Over POTS
•Logical separation of voice and data networks
•Firewall designed for VOIP protocols
May Security Planing
Mail server OS and aplication
deploment,configuration,and management
Patch /hotfix management
Encryption (at least for user authentication)
Malware Protection
Backup and testing
Admission Integrity
Error detectoin and correction
controls
Loop/ echo checks
Redundancy check
Parity Checks