Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

SCDT43

Networking and Cyber


Security Fundamentals
Network Types and an Introduction to Cyber Security
Aims
• Finalise the Introduction to Networking:
• Introduction to Cisco Packet Tracer (CPT)
• Traditional and Converged Networks
• Fault Tolerance and Quality of Service (QoS)

• Start digital cybersecurity threats blockchain bitcoin cloud 5G


• Security: Threats and Solutions
Converged Networks
• We’ve previously discussed how hardware servers may run multiple
different software clients (one hardware device  many clients)

• Networks are similar in design, where a collection of protocols and


standards can be utilised across a business network
• Ethernet is used for IP connections to the Internet/servers
• Businesses use IP phones that utilise the same Ethernet connections
• Some businesses will cache satellite transmissions and transmit the video data
to TV’s or machines using Ethernet and IP
Traditional Networks
• Traditionally, it would have taken three separate connections in a room
to achieve
• Network connection  Ethernet
• Phone connection  Telephone cable
• TV connection  Aerial patch cable

• As an example, this would have – in theory – tripled costs and added


complexity
Research Task – 5 Minutes
• Research several benefits of using converged networks

• Work together 

• ‘Converged networks’ is also a term used for virtually managing


infrastructure, make sure your research is accurate
Fault Tolerant Networks
• With a home network, we have a single point of failure: the router
• If the router fails, we will have no network or Internet access

• In large organisations, a single point of failure would be an extreme


risk and could cost thousands in terms of downtime/data loss

• Networks must be designed with redundancy in mind, both physically


and logically
Fault Tolerance – Redundancy
• Perhaps the simplest form of ensuring higher fault tolerance is to
have multiple backups of hardware devices

• In the College, multiple servers are used to provide network


resources; if one fails, we may lose some performance, however,
there is still availability

• Alongside this, redundant connections between key components


should be in place, to account for cable failures
• Or dodgy builders
Fault Tolerance – Intelligent Routing
• When routing each individual packet of data, the router will take into
account the latency and signal strength of potential routes

• This helps to identify the best - most efficient and most reliable –
route for the packet(s) to take

• If a network has redundant connections and hardware, this will allow


for packets to be efficiently switched through the network
Task: Pros and Cons of Each Design (5 Minutes)

 Vs. 
Security: Business
Vulnerabilities
Open Firewall Ports
• Aimlessly following Internet guides to troubleshoot software, etc.

• This can allow incoming and outgoing traffic of the router

• The port can be open even if there is no traffic flowing through it

• If found, a hacker can use this port to access the network

• If malware finds its way onto the system, it may scan for opened ports to
allow for Internet access without prompting the user further
File Permissions
• Enforcing on a file or folder basis the specific access that is permitted

• Linux is much better at this, with access modifiers for reading, writing
and executing on a user basis

• Windows server does do this, however, it can become confusing very


quickly and errors can occur where Administrator groups cannot
access files
Insecure Users
• User accounts with privileges they should not have
• You can access the principal’s hard drive!

• “Root access”

• Again, malware can take advantage of this by testing read/write


privileges on the machine to understand what access the user may
have
Trojans
• Malware disguised as legitimate software you may want to install

• Nearly always some element, however basic, of social engineering

• “Your bank requires you to download new authentication software for


the encryption”, with the attachment: “BarclaysEncryptionV2.exe”

• Jargon-heavy explanations to make non-tech users feel it is important


[Spear] Phishing
• Phishing takes many forms, however, it is a type of social engineering
• “Using the victim as the weapon”, perhaps their naivety or personal situation

• A general example would be an Email sent to thousands of users,


stating that they are eligible for millions of pounds, but must secure
the money by transferring £2000 to the solicitor…

• Spear Phishing is much more targeted and generally part of more


professional, organised crime
[Spear] Phishing
• Within the NHS, Practice Managers may be sent a convincing Email,
perhaps replying to managers within the NHS, that the hospital owes
a debt to a building company for recent works

• It would take the attacker time to find a reasonable scenario and


generate a long Email chain to make the attack look legitimate
Activity – Phishing Email!
• Use Criggs626’s phishing Email template emporium to download and
create your own phishing Email!

• https://github.com/criggs626/PhishingTemplates/tree/master/emails
Activity
• How can we secure against these identified threats?
• Insecure users
• Bad file permissions
• Trojans
• Phishing

• Assume we are a medium-sized business!

You might also like