SlideShare a Scribd company logo
1 of 10
NETWORK SECURITY OVER
ETHERNET
BY
Syed Ubaid Ali Jaffery
CEO Uj Consultant & solution
Provider
Information Security Expert
2
ETHERNET TECHNOLOGY
Band Specification
________________
802.3
802.5
802.6
802.11
802.11b, 802.11g
802.11a
802.16
802.16m , 802.16e
Technology
____________
Ethernet LAN
Token Ring
Man(Fiber
distributed
data interface)
WLAN
WLAN (2.4 Ghz)
WLAN (5 Ghz)
Wi-Max
Wi-Max(Mobile)
Physical/Logical
____________
Physical
Physical
Physical
Physical
Logical
Logical
Physical
Logical
Guided/Unguided
______________
Guided
Guided
Guided
Unguided
Unguided
Unguided
Unguided
Unguided
3
Inside An Operating System
Security Level
OS Name Security Percentage
• Windows 95 39%
• Windows 98 46%
• Windows ME 50%
• Windows 2000 57.46%
• Windows XP Sp1 63.33%
• Windows XP Sp2 68.0%
• Windows 7 Ultimate 70%
• Windows Vista Ultimate 73%
• Linux RadHat 60%
• Linux Fedora 73%
• Linux Distribution All 80-84%
• Linux Distro Backtrack 94%
4
Outside An Operating System Security
Levels
5
WHAT ?
• What an Intruder Seek?
• What an intruder do with that
information?
• What should be protected?
• What resources are required
to protect?
What Information are required to
Attack a user?
The security level for a user is become incredibly low. An attack
can be made by having these information:
1) An IP Address
2) Operating System Vulnerability
3) Vulnerability Exploit and
4) A connection Oriented Session
7
How Attacks are Performed
• Port Scanning
• Network Scanning
• Information Gathering
• Vulnerabilities Assessment
• Trace Route.
• Steganography
8
Covering Tracks
• Root kits
• System log Removal
• Databases Injection
9
THANK YOU
9
THANK YOU

More Related Content

What's hot

Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายหน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายsoifha
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSylvie Boube-Politano
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bSylvain Martinez
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityDeepakraj Sahu
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityChris Sistrunk
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015CODE BLUE
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Yuichi Ito
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 

What's hot (20)

Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Wireless security
Wireless securityWireless security
Wireless security
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายหน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
 
Cisco CCNA module 3
Cisco CCNA module 3Cisco CCNA module 3
Cisco CCNA module 3
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Cisco CCNA module 8
Cisco CCNA module 8Cisco CCNA module 8
Cisco CCNA module 8
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 

Viewers also liked

Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri
 
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...Todd Nilson
 
Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)Todd Nilson
 

Viewers also liked (6)

Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
Career Changer Mindset, Strategy, Branding and Execution: Getting Your Ducks ...
 
Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)Tweet your way to a new job (Web version)
Tweet your way to a new job (Web version)
 

Similar to Network security over ethernet

IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
cisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdfcisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdfHi-Network.com
 
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHzRedes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHzandrerasminio
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdfJokaTek
 
cisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdfcisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdfcisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdfHi-Network.com
 
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfNeed key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfarkleatheray
 
cisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfcisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfHi-Network.com
 
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptxWireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptxbrianbrowne13
 
cisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdfcisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdfcisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfcisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfHi-Network.com
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAnicholas njoroge
 
cisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdfcisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdfHi-Network.com
 
cisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdfcisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdfHi-Network.com
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
cisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdfcisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdfHi-Network.com
 

Similar to Network security over ethernet (20)

IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
cisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdfcisco-air-cap3702i-i-k9-datasheet.pdf
cisco-air-cap3702i-i-k9-datasheet.pdf
 
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHzRedes de Comunicação Sem Fio Sub-GHz e 2.4GHz
Redes de Comunicação Sem Fio Sub-GHz e 2.4GHz
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
cisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdfcisco-air-cap3602e-i-k9-datasheet.pdf
cisco-air-cap3602e-i-k9-datasheet.pdf
 
cisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdfcisco-air-cap3702i-r-k9-datasheet.pdf
cisco-air-cap3702i-r-k9-datasheet.pdf
 
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfNeed key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdf
 
cisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfcisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdf
 
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptxWireless Overview Customer Deck_Mar21_bdbcommented.pptx
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
 
cisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdfcisco-air-cap3602i-i-k9-datasheet.pdf
cisco-air-cap3602i-i-k9-datasheet.pdf
 
cisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdfcisco-air-cap3602i-k-k9-datasheet.pdf
cisco-air-cap3602i-k-k9-datasheet.pdf
 
cisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfcisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdf
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USA
 
cisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdfcisco-air-cap3602i-n-k9-datasheet.pdf
cisco-air-cap3602i-n-k9-datasheet.pdf
 
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
cisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdfcisco-air-cap3602e-c-k9-datasheet.pdf
cisco-air-cap3602e-c-k9-datasheet.pdf
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
cisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdfcisco-air-cap3602i-r-k9-datasheet.pdf
cisco-air-cap3602i-r-k9-datasheet.pdf
 

More from Syed Ubaid Ali Jafri

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Syed Ubaid Ali Jafri
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Syed Ubaid Ali Jafri
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Syed Ubaid Ali Jafri
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri
 

More from Syed Ubaid Ali Jafri (14)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
LAN Security
LAN Security LAN Security
LAN Security
 

Recently uploaded

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Recently uploaded (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 

Network security over ethernet

  • 1. NETWORK SECURITY OVER ETHERNET BY Syed Ubaid Ali Jaffery CEO Uj Consultant & solution Provider Information Security Expert
  • 2. 2 ETHERNET TECHNOLOGY Band Specification ________________ 802.3 802.5 802.6 802.11 802.11b, 802.11g 802.11a 802.16 802.16m , 802.16e Technology ____________ Ethernet LAN Token Ring Man(Fiber distributed data interface) WLAN WLAN (2.4 Ghz) WLAN (5 Ghz) Wi-Max Wi-Max(Mobile) Physical/Logical ____________ Physical Physical Physical Physical Logical Logical Physical Logical Guided/Unguided ______________ Guided Guided Guided Unguided Unguided Unguided Unguided Unguided
  • 3. 3 Inside An Operating System Security Level OS Name Security Percentage • Windows 95 39% • Windows 98 46% • Windows ME 50% • Windows 2000 57.46% • Windows XP Sp1 63.33% • Windows XP Sp2 68.0% • Windows 7 Ultimate 70% • Windows Vista Ultimate 73% • Linux RadHat 60% • Linux Fedora 73% • Linux Distribution All 80-84% • Linux Distro Backtrack 94%
  • 4. 4 Outside An Operating System Security Levels
  • 5. 5 WHAT ? • What an Intruder Seek? • What an intruder do with that information? • What should be protected? • What resources are required to protect?
  • 6. What Information are required to Attack a user? The security level for a user is become incredibly low. An attack can be made by having these information: 1) An IP Address 2) Operating System Vulnerability 3) Vulnerability Exploit and 4) A connection Oriented Session
  • 7. 7 How Attacks are Performed • Port Scanning • Network Scanning • Information Gathering • Vulnerabilities Assessment • Trace Route. • Steganography
  • 8. 8 Covering Tracks • Root kits • System log Removal • Databases Injection