Introduction to Networks Sandy Bacik [email_address] Breakwater Security Associates
Agenda Complexity of network incidents Firewalls Encrypted tunnels Zone Alarm
Way Back When
Way Back When Not enough hard drive space to hide anything No logs on the workstation All logs were centralized on the main frame Easy phone logs for traces
Then...
Then... Not enough hard drive space to hide anything No logs on the workstation All logs were centralized on the main frame Easy phone logs for traces
Then...
Then... Now the hard drives could start storing information Sometime there were logs on the workstation The logs are now decentralized, but for the most part remained with the network Easy phone logs for traces
Early Today...
Early Today... Now the hard drives could start storing information Sometime there were logs on the workstation The logs are now decentralized Easy phone logs for traces Still no really good encrypted tunnels
Today
Today Almost anything can be logged - somewhere The logs are now decentralized Now follow packets, not phone logs Encrypted tunnels - all bets are off
Where to look for logs Corporate/Personal servers Corporate/Home workstation Firewall Internet Service Provider (ISP) and all their logs Outside networks - anywhere in the world
Issues with log file tracking Time synchronizations from system to system Time synchronizations from server to workstation IP address spoofing Understanding each systems log file information
IP Addresses 192  .  168  .  124  .  123 http://www.cisco.com/univercd/cc/td/doc/product/software/ssr90/ptc_r_90/54084.htm
Domain Names .com .edu .gov .mil .net .org .int . xx
Domain Lookups www.iana.org/dev7/iana/ www.internic.net www.networksolutions.com www.arin.net
Whois Sample
Whois  Sample
Whois Sample
Simple ways to track an IP address/host name ping -a <ipaddress> ping <sitename> tracert <ipaddress> tracert <sitename>
Ping results
Ping results
Tracert results
What is a firewall? A set of hardware and software mechanisms that shield ‘internal’ trusted networks from ‘external’ untrusted networks such as the Internet or shield internal networks from other internal networks.
Firewall Design
What a firewall does not protect against Invalid configurations Other entry points into the network Dial-up access Viruses Single points of failure/throughput Insiders
Purposes of encryption Protect sensitive information from disclosure Identify the corruption or unauthorized change of information Designed to make compromise too expensive or too time consuming
What is a VPN? Virtual private network An encrypted tunnel A secure link between entities using the Internet or a network as a backbone
What’s a VPN for? Strong encryption for sensitive data transmission Reliability of critical data transmissions Good authentication Access and traffic control
VPN Design
How can we protect our home machine(s) Virus scanners Logging and auditing Firewalls http://www.zonelabs.com/default.htm
ZoneAlarm Alerts
ZoneAlarm Lock
ZoneAlarm Security
ZoneAlarm Programs
ZoneAlarm Configure
ZoneAlarm STOP
Thank you

More Related Content

PPT
Evidence Seizure Ctin Version Draft
PPT
Evidence Seizure Level One
PPT
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
PPTX
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
PPTX
Intro to cyber forensics
DOCX
Hardwar based Security of Systems
PPT
Preserving and recovering digital evidence
PPTX
Hardware Security
Evidence Seizure Ctin Version Draft
Evidence Seizure Level One
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Intro to cyber forensics
Hardwar based Security of Systems
Preserving and recovering digital evidence
Hardware Security

What's hot (20)

PPTX
Computer forensics and its role
PPT
Computer forensics
PDF
File000117
PPT
Csi Netsec 2006 Poor Mans Guide Merdinger
PPTX
Computer forensics toolkit
PPTX
Computer forensics
PPTX
Anti forensic
PPTX
Processing Crimes and Incident Scenes
PDF
05 Duplication and Preservation of Digital evidence - Notes
PDF
File000120
PPT
Computer forensics
PPT
Understanding computer investigation
PDF
File000113
PPT
Cyber Crimes & Cyber Forensics
PDF
File000119
PPT
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
PDF
02 Types of Computer Forensics Technology - Notes
PDF
Computer Forensic
PDF
Anti forensics-techniques-for-browsing-artifacts
PDF
CS6004 Cyber Forensics - UNIT IV
Computer forensics and its role
Computer forensics
File000117
Csi Netsec 2006 Poor Mans Guide Merdinger
Computer forensics toolkit
Computer forensics
Anti forensic
Processing Crimes and Incident Scenes
05 Duplication and Preservation of Digital evidence - Notes
File000120
Computer forensics
Understanding computer investigation
File000113
Cyber Crimes & Cyber Forensics
File000119
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
02 Types of Computer Forensics Technology - Notes
Computer Forensic
Anti forensics-techniques-for-browsing-artifacts
CS6004 Cyber Forensics - UNIT IV
Ad

Viewers also liked (20)

PPT
Live Forensics
PPT
Translating Geek To Attorneys It Security
PPTX
Windows 10 Forensics: OS Evidentiary Artefacts
PPT
Registry forensics
ODP
Introduction to memory forensics
PDF
Windows 7 forensics event logs-dtl-r3
PDF
www.indonezia.net Hacking Windows Registry
PPT
Unit B Windows 7
PPTX
Computer forensic 101 - OWASP Khartoum
PPTX
Windows Forensics
PPTX
Open Source Forensics
PDF
Forensics of a Windows System
PDF
Windows 8.x Forensics 1.0
PPT
Vista Forensics
PDF
Sadfe2007
PDF
Windows logging cheat sheet
PPTX
Mounting virtual hard drives
ODP
File carving tools
PPTX
Windows 8 Forensics & Anti Forensics
PPT
Raidprep
Live Forensics
Translating Geek To Attorneys It Security
Windows 10 Forensics: OS Evidentiary Artefacts
Registry forensics
Introduction to memory forensics
Windows 7 forensics event logs-dtl-r3
www.indonezia.net Hacking Windows Registry
Unit B Windows 7
Computer forensic 101 - OWASP Khartoum
Windows Forensics
Open Source Forensics
Forensics of a Windows System
Windows 8.x Forensics 1.0
Vista Forensics
Sadfe2007
Windows logging cheat sheet
Mounting virtual hard drives
File carving tools
Windows 8 Forensics & Anti Forensics
Raidprep
Ad

Similar to July132000 (20)

PPT
The 300 Leonidas Solution
PPTX
You Spent All That Money And Still Got Owned
PPT
Network security
PDF
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
PPTX
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
PPT
Top Five Internal Security Vulnerabilities
PDF
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
PDF
iotsecurity-171108154118.pdf
PPT
Ch13 Protecting Networks with Security Devices
PPT
Firewall
PPT
Day4
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
PPTX
Introduction of firewall slides
PPT
New internet security
PPT
NewIinternet security
PDF
Web Server Security Guidelines
PPTX
Firewall ppt
PPT
Unified Threat Management
PPT
Firewall
 
The 300 Leonidas Solution
You Spent All That Money And Still Got Owned
Network security
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
Top Five Internal Security Vulnerabilities
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
iotsecurity-171108154118.pdf
Ch13 Protecting Networks with Security Devices
Firewall
Day4
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Introduction of firewall slides
New internet security
NewIinternet security
Web Server Security Guidelines
Firewall ppt
Unified Threat Management
Firewall
 

More from CTIN (20)

PDF
Encase V7 Presented by Guidance Software august 2011
PDF
Windows 7 forensics -overview-r3
PPTX
Msra 2011 windows7 forensics-troyla
PPTX
Windows 7 forensics thumbnail-dtl-r4
PPTX
Windows 7 forensics jump lists-rv3-public
PPTX
Time Stamp Analysis of Windows Systems
PPT
Mac Forensics
PPT
Nra
PPT
Edrm
PPT
Computer Searchs, Electronic Communication, Computer Trespass
PPT
CyberCrime
PPT
Search Warrants
PPT
Part6 Private Sector Concerns
PPT
Networking Overview
PPT
M Compevid
PPT
L Scope
PPT
Level1 Part8 End Of The Day
PPT
Law Enforcement Role In Computing
PPT
Level1 Part7 Basic Investigations
PPT
K Ai
Encase V7 Presented by Guidance Software august 2011
Windows 7 forensics -overview-r3
Msra 2011 windows7 forensics-troyla
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics jump lists-rv3-public
Time Stamp Analysis of Windows Systems
Mac Forensics
Nra
Edrm
Computer Searchs, Electronic Communication, Computer Trespass
CyberCrime
Search Warrants
Part6 Private Sector Concerns
Networking Overview
M Compevid
L Scope
Level1 Part8 End Of The Day
Law Enforcement Role In Computing
Level1 Part7 Basic Investigations
K Ai

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Five Habits of High-Impact Board Members
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
DOCX
search engine optimization ppt fir known well about this
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Architecture types and enterprise applications.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Benefits of Physical activity for teenagers.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Final SEM Unit 1 for mit wpu at pune .pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Five Habits of High-Impact Board Members
OpenACC and Open Hackathons Monthly Highlights July 2025
2018-HIPAA-Renewal-Training for executives
Chapter 5: Probability Theory and Statistics
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Enhancing emotion recognition model for a student engagement use case through...
CloudStack 4.21: First Look Webinar slides
UiPath Agentic Automation session 1: RPA to Agents
Convolutional neural network based encoder-decoder for efficient real-time ob...
sbt 2.0: go big (Scala Days 2025 edition)
search engine optimization ppt fir known well about this
Hindi spoken digit analysis for native and non-native speakers
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Architecture types and enterprise applications.pdf
A comparative study of natural language inference in Swahili using monolingua...
Benefits of Physical activity for teenagers.pptx

July132000

  • 1. Introduction to Networks Sandy Bacik [email_address] Breakwater Security Associates
  • 2. Agenda Complexity of network incidents Firewalls Encrypted tunnels Zone Alarm
  • 4. Way Back When Not enough hard drive space to hide anything No logs on the workstation All logs were centralized on the main frame Easy phone logs for traces
  • 6. Then... Not enough hard drive space to hide anything No logs on the workstation All logs were centralized on the main frame Easy phone logs for traces
  • 8. Then... Now the hard drives could start storing information Sometime there were logs on the workstation The logs are now decentralized, but for the most part remained with the network Easy phone logs for traces
  • 10. Early Today... Now the hard drives could start storing information Sometime there were logs on the workstation The logs are now decentralized Easy phone logs for traces Still no really good encrypted tunnels
  • 11. Today
  • 12. Today Almost anything can be logged - somewhere The logs are now decentralized Now follow packets, not phone logs Encrypted tunnels - all bets are off
  • 13. Where to look for logs Corporate/Personal servers Corporate/Home workstation Firewall Internet Service Provider (ISP) and all their logs Outside networks - anywhere in the world
  • 14. Issues with log file tracking Time synchronizations from system to system Time synchronizations from server to workstation IP address spoofing Understanding each systems log file information
  • 15. IP Addresses 192 . 168 . 124 . 123 http://www.cisco.com/univercd/cc/td/doc/product/software/ssr90/ptc_r_90/54084.htm
  • 16. Domain Names .com .edu .gov .mil .net .org .int . xx
  • 17. Domain Lookups www.iana.org/dev7/iana/ www.internic.net www.networksolutions.com www.arin.net
  • 21. Simple ways to track an IP address/host name ping -a <ipaddress> ping <sitename> tracert <ipaddress> tracert <sitename>
  • 25. What is a firewall? A set of hardware and software mechanisms that shield ‘internal’ trusted networks from ‘external’ untrusted networks such as the Internet or shield internal networks from other internal networks.
  • 27. What a firewall does not protect against Invalid configurations Other entry points into the network Dial-up access Viruses Single points of failure/throughput Insiders
  • 28. Purposes of encryption Protect sensitive information from disclosure Identify the corruption or unauthorized change of information Designed to make compromise too expensive or too time consuming
  • 29. What is a VPN? Virtual private network An encrypted tunnel A secure link between entities using the Internet or a network as a backbone
  • 30. What’s a VPN for? Strong encryption for sensitive data transmission Reliability of critical data transmissions Good authentication Access and traffic control
  • 32. How can we protect our home machine(s) Virus scanners Logging and auditing Firewalls http://www.zonelabs.com/default.htm