0% found this document useful (0 votes)
10 views10 pages

Session 2

The document provides a detailed comparison between hashing and encryption, highlighting their functions, usage, retrieval methods, processing speeds, and use cases. It also outlines various types of threats, including viruses, ransomware, and social engineering, as well as endpoint threats like unauthorized access and data loss. Additionally, it covers network protocols, explaining their roles in data exchange and communication within networks.

Uploaded by

Micheal Moheb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views10 pages

Session 2

The document provides a detailed comparison between hashing and encryption, highlighting their functions, usage, retrieval methods, processing speeds, and use cases. It also outlines various types of threats, including viruses, ransomware, and social engineering, as well as endpoint threats like unauthorized access and data loss. Additionally, it covers network protocols, explaining their roles in data exchange and communication within networks.

Uploaded by

Micheal Moheb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

FW FireWall

IT Gate Academy

Youssef Mohamed

Technical consultant System Engineer

Information Security Specialist Network Manager


Detailed comparison between Hash and Encryption

Hash: Encryption :
Function: Function:
Used to generate a fixed-length hash value from Used to transform data into an unreadable form
any amount of data. using a key, and the original data can be recovered
using the appropriate key.
Usage: Usage:
Widely used for data integrity verification and Used to secure data and protect it from
digital signature generation. unauthorized access. (confidentiality)
Retrieval: Retrieval:
Original data cannot be retrieved from the hash The original data can be retrieved using the correct
value; hashing is a (one-way function) key ( Two-way function)
Processing Speed: Processing Speed:
Hashing operations are typically faster than Usually slower than hashing due to additional
encryption operations. operations related to encryption and key
verification
Use Cases: Use Cases:
Data integrity verification. Protection of sensitive data.
Secure storage of passwords Securing online communications (HTTPS).
(with the addition of salt) Establishing secure communication channels.
Threat Types
Viruses:
Malicious programs that replicate and spread within system files or programs.
Ransomware:
Malware that encrypts files on the system and demands a ransom for
decryption.
Spyware:
Programs that gather information without the user's knowledge for targeted
advertising or other purposes.
Worms:
Malware that self-propagates between devices over a network.
Trojans:
Programs that pretend to be helpful but carry hidden malicious components.
Zero-Day Attacks:
Attacks targeting undiscovered security vulnerabilities in software.
Endpoint Threats
Endpoint Breaches:
Unauthorized access to individual devices to gain access to sensitive
information.
Data Loss:
Leakage or loss of sensitive information.
Unauthorized Access:
Unapproved access to systems or data.
OS Exploits:
Exploiting vulnerabilities in the operating system to execute attacks.
Social Engineering:
Using psychological manipulation to obtain sensitive information.
Application Exploits:
Exploiting vulnerabilities in applications to carry out attacks.
Local Network Threats:
Attacks targeting devices within the local network.
Virtualization

hypervisor
Memory
storage
virtual machine
o o o
OS s s s
CPU(processor)
VMware Network

VMware

Windows server Windows 10

2G RAM 2G RAM

100G Disk 100G Disk

2 Processor 1 Processor

V Switch
Host
OS Only OS

OS

Physical Machine
NIC Type
Host Only
Bridge
NAT
Custom

VMware

Windows server Windows 7 Windows 11 FW

2G RAM 2G RAM 2G RAM 2G RAM

OS 100G Disk 100G Disk 100G Disk 100G Disk

2 Processor 1 Processor 1 Processor 1 Processor

Host Host Bridge NAT


Only Only 192.168.1.5 11.0.0.5
10.0.0.1 10.0.0.2

OS

Physical Machine Physical Machine


192.168.1.3 192.168.1.2
OS

Topology OS

OS OS

OS OS

OS

FW 2

Branch OS Branch
1 FW 1 2

OS

al al
.loc .loc
e
at er te
G Ga
rv r
ve
IT ow
s se
IT ss
er
w
nd in nd
o
Wi ma Wi
in
Do ma
Do

OS
OS
Track

1 2 3 4 LAB
Introduction What is a firewall ? FW Type The evolution of TROUBLESHOOT
Network Firewall

LAB 5 6 7 8
TROUBLESHOOT
FW Generation IDS & IPS What is the Security ? Hash & Encryption

9 10 11 LAB
TOPOLOGY
Certificates Install & Basic config config interface & zone TROUBLESHOOT
Track

12 13 14 15 LAB
Config DHCP Manage object User authentication Routing TROUBLESHOOT

LAB 16 17 18 19
TROUBLESHOOT
NAT Access policy Web filter -SSL App filter & file control
inspection

20 21 22 23
Monitoring VDOM & HA FINAL LAB
DOS protection VPN
Network Protocols, What they are, and the function of each one ?
Protocols in networks are a set of rules and agreements that govern the exchange of
information and data between connected devices in a communication network. These
protocols determine how data is organized, routed, and delivered across the network.
Below is an explanation of some common network protocols and their functions

IP Address (IP Address): An IP address is a digital address assigned to each device connected to a network. It is used in the Internet Protocol (IP)
to identify and distinguish devices on the network. An IP address consists of a series of numbers that represent the network address and the
device address in that network. IPv4 addresses consist of 4 parts separated by dots, while IPv6 addresses consist of 8 parts separated by
colons.
MAC Address (MAC Address): A MAC address is a unique identifier for each network interface in a computer or network device. This address is
assigned by the device manufacturer and cannot be changed. MAC addresses are used in the Media Access Control (MAC) layer of the OSI
model (Layer 2) to identify the recipient or sender device in a local network.
Hypertext Transfer Protocol (HTTP): HTTP is one of the most important network protocols on the Internet. It is used to transfer
web pages and textual content between servers and clients (such as web browsers). It specifies the method for formatting and exchanging data
between the server and the client.
Simple Mail Transfer Protocol (SMTP): SMTP is used for sending and delivering email over the network. It defines the method for routing and
delivering email messages between different mail servers.
File Transfer Protocol (FTP): FTP is used for transferring files between computers over the network. It allows users to upload and download files
to and from remote servers.
Transmission Control Protocol (TCP): TCP works in conjunction with IP to ensure reliable and ordered delivery of data. TCP handles the
fragmentation of data into smaller packets, their sequencing, and reassembly upon reaching the intended destination.
User Datagram Protocol (UDP): UDP is a connectionless and unreliable transport protocol. It is used to transmit data packets over the network
without the need for delivery confirmation or reassembly of received data. UDP is typically used in applications that require fast
responsiveness, such as media streaming and network gaming, where low latency is more important than ensuring reliable data delivery.

NOTE : These are just some common examples of network protocols. There are many other protocols in use

You might also like