Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 12 Network Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Norman SecureSurf Protect your users when surfing the Internet.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Types of Electronic Infection
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
CPT 123 Internet Skills Class Notes Internet Security Session B.
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Securing Information Systems
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Firewalls.
Firewalls Routers, Switches, Hubs VPNs
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American

Intelligence threat  Why it is difficult to implement security and counter intelligence Open nature of our society Technology and information is easily obtained People travel with ease  Both friends of the country and foes are looking to gain economic edge Seek technological, financial & commercial information Target political, economic, military and scientific information.

Exporting Technology  there is concern that too much high technology is being freely traded around the world, too easily.  Source: Remarks of Assistant Secretary Christopher Padilla Computer & Communications Industry Association  The United States sees more organized efforts to obtain and illegally export controlled U.S. technology to China than to any other country.

Threats to homeland  National infrastructure is vulnerable Physical threat Computer attack  Infrastructure is interdependent Attack against one sector would impact other sectors  Example – attack against electric grid  Coordinated attack against selected critical nodes

Is there Security Threat in Outsourcing?  Outsourcing Reduces cost – tremendous savings to corp. Eliminates American jobs  Is development of software outside the country threat to national security? Yes it could. Scripts (malicious code) can be placed inside a program. On the other hand, it could be argued, Microsoft can place malicious code to spy on other countries. It is not good business practice to do so.

Can hardware be used to spy?  Yes. Computers contain chips that contain programs.  Malware can be programmed into these chips.  Can we trust computers manufactured outside USA? Capitalism is motivated by profits. While corporations do cooperate with governments, it does not make sense to jeopardize own business.

Present major concern  Attacks by foreign hackers (increasingly from China) Sabotaging networks Opening secret back doors for spying Source:( ntent/nov2006/tc _ htm?chan=top+ news_top+news+index_businessweek+exclusives)

How Hackers gain access  Directly Leaving computers accessible in your home or office. Theft of computer Shoulder surfing  Indirectly Through Internet connection  Open ports (USB, serial etc are physical ports, but they use logical ports assigned to the IP address)  Example: port 80 for HTTP, port 25, etc. 

Information Security as developed by the National Security Telecommunication and Information Systems Security Committee  Protection of: Information Hardware that store information Hardware that transmit information  From direct and indirect attacks  Without affecting availability to authorized users

Deliberate Security Threat  Espionage (national security)  Industrial Espionage Competitive intelligence (could be legal) Shoulder surfing Hacking  Sabotage (ex.denial of service by zombies)  Vandalism  Theft

Some techniques  Port scanning – enter through an open port  Password crack (brute force or dictionary)  Software scanning (what software is run)  Write scripts that can be used by software (malware)  Back doors (system passwords not changed)  Get access to a site and go from there to a trusted site  Man in the middle

Protection  Take all precautions  Also have backup plans (contingency plan) Off site systems Disaster recovery

How can we protect our computers  Recognize that “your” computer is being targeted.  University computers are “doors” to more secure sites. “Open proxy servers are used by spammers to send unwanted s. Proxy servers can also be abused for bypassing access restrictions and limitations such as in case of users in one country not allowed to access a website in another country can go through a third country’s proxy server. There are websites dedicated to provide and hourly updated list of free anonymous proxy server sites.” Abraham, John. “A Proxy Server for Mirrored Sites.”, ASEE 2007

Information Security as developed by the National Security Telecommunication and Information Systems Security Committee  Protection of: Information Hardware that store information Hardware that transmit information  From direct and indirect attacks  Without affecting availability to authorized users

Computer Security step1.  Firewalls Prevents a specific type of information from moving between the outside world (untrusted network) and the inside world (trusted). Packet filtering – every packet header is examined for address, packet type and port request. Dynamic packet filtering. Allows only a particular packet with a particular source, destination and port address to enter through the firewall.

Computer Security step2.  Application firewall (proxy server).  An intermediary between a client and a server Proxy server intercepts all requests to a server routed through it. Keeps the user from interacting directly with the server.  Ref: Abraham, John. “A Proxy Server for Mirrored Sites.”, ASEE 2007.

Computer Security step3  Intrusion detection systems (IDS) Like a burglar alarm. Works by examining network traffic. Performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows and port scans. Can detect if attack has occurred and if the attack was successful. This information is ed to the administrator.

Computer Security step4. Network Address Translation  A computer needs a public IP address to attach to a public network.  Private IP addresses are not visible from the outside world.  It makes sense to use only private IP to secure your computer.  When outside communication is needed the private IP is mapped to public IP address using a port number. DHCP – not as good as NAT

Computer Security step5.  Encrypt transmissions The word cryptography in Greek means “secret writing.” The term today refers to the science and art of transforming messages to make them secure and immune to attacks.

Encryption contd.

Encryption Cont.  One secret key is used by both - known as symmetric encryption. (example DES)  Both sender and receiver must know the key.  Challenge is to send the key to the receiver. Must be send over another channel.  Two keys – public and private. Also known as Asymmetric encryption. Public key is stored in a public location, anyone can use it. Use public key to encrypt and private to decrypt. If Alice uses bob’s public key to encrypt, only bob with his private key can decrypt.

Encryption Cont. Public Key.

Encryption cont. Non-repudiation  When a digital signature is encrypted using a private key – it can be read by anyone with a public key. But the message was sent by only one who has the private key.  Digital certificates are used to authenticate the source of a file.

Computer Security step6  Install Current Version of Antivirus software. Virus - A small program that attaches to another program and replicates itself onto other programs. This activity itself slows down the computer. The virus may do annoying activities, damaging activities or information theft. Anti-virus programs are always trailing actual virus.

Computer Security Step7  Apply all latest operating system patches.  Malware exploits weakness in OS.  OS developers fix these holes as they become aware of it.

Computer Security Step8  Assign complex passwords to your computer. Avoid dictionary words.  Use different passwords for different accounts you have.  Assign passwords for your user files and turn on encryption.

Computer Security Step9  Assign CMOS password  /Computer-Hard-Drive-Search /Computer-Hard-Drive-Search

Computer Security Step10  Have a disaster recovery plan including backups.