You are on page 1of 17

Network Security 101 – A Refresher Course

How to keep your network safe NOW or be sorry later!

By Allan Pratt, MBA


Cyber-Tech Security Pro
itczar@att.net
There are two extremes in Network safety:
Absolute Security and Absolute open

Absolute security is: unplugged from the network


and power, locked in a safe, and thrown to the
bottom of the ocean1
4 Simple Rules
& Always keep your virus and Windows software updates “on”

& Always keep your firewall “on”

& Back up, Back up, Back up

& Always keep your passwords and key phrases safe


Better Safe Than Sorry
1 Do not use common words or phrases for passwords

1 Do not keep your passwords written on a post-it taped to


your computer monitor

1 Back-up, back-up, back-up


Strange But True
1 You cannot secure a laptop until you secure the laptop
1 Make sure everyone follows the security plan, even the boss
1 Smart people can be stupid too, even HR
1 Who launched that virus?
Human Nature

Also Called Social Engineering

Everyone Wants To Help

Passwords are meant to be a SECRET!


Password Discovery Table
Keep Your Email Safe
Make sure to scan all email messages!

1 Do not open email from unknown sources or that you are


not expecting
1 Once they are in, only unplugging and reinstalling OS
will work
1 New Type of Attack, Spear-Phising4
Spear-Phishing
• Net Reconnaissance
– Studying public Data
– The email address is made to look like it is from a logical
sender
• Harvesting The Data
– Steals info and sends data to a Command and Control
Server4
Keeping your data safe
• Identify and Authenticate
• Use a Surge Protector
• Safeguard against Unauthorized Access
• Server-side protection
• Password protect3
Cyber Cafés can be harmful to your data’s health

• Open networks make for easy theft


• Turn off all file share protocols
• Make sure your software firewall and virus protection is active
Wireless Networks
• Turn off the SSID broadcast
• Password protect your router
• Do not leave MAC addresses open to others
• Leave your hardware firewall on
• Use matching vendors
• Never use WEP protocols only the newer WPA2 and above
Unprotected? Do you feel lucky?
• One Security Expert maintains that 50% of unprotected
computers are compromised by an intruder within 12 minutes

• Two devastating worms, Slammer and Nimda wreaked world-


wide havoc in 10 and 30 minutes, respectively3
Things to watch out for…
1 System Crashes
1 Attempts to write to the system
1 Data Modification
1 Unexplained Poor System Performance6
Best Practices

1. Do not pay more for your security than your


data is worth!

2. Password protect all of your important data!


Final reminders:
• Back-up, Back-up, Back-up
• Never open a strange file or attachment
• Always allow automatic updates
• You can never be too careful
• It’s not IF you lose your data, but a matter of
WHEN you lose your data
Works Cited
1. Curtin Matt, Introduction to Network Security, March 1997, page 8.
2. Curtin Matt, Snake Oil Warning Signs: Encryption Software to Avoid
©1996 -1998, page 5.
3. Vermaat, Discovering Computers, Fundamentals, Third Edition, Chapter
10, pages 364, 368, 369, 374.
4. BusinessWeek, “Anatomy of a Spear-Phish,” April 21, 2008, page 38.
5. [Fraser 1997] Ed Fraser, RFC 2196, “Site Security Handbook”,
September 1997.
6. Checking Microsoft Windows® Systems for Signs of Compromise,
Simon Baker, UCL Computer Security Team; Patrick Green, OXCERT
Thomas Meyer, Garaidh Cochrane Version: 1.3.4, 10/28/2005.
7. DEPARTMENT OF DEFENSE, STANDARD DEPARTMENT OF
DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION
CRITERIA, DECEMBER l985 (DOD Orange book),
8. http://en.wikipedia.org/wiki/Network_security#column-one.

You might also like