General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
System and Network Security Practices COEN 351 E-Commerce Security.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Networks IGCSE ICT Section 4.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
Computer & Network Security
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. This work is licensed under the Creative.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
Footprinting and Scanning
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer Security By Duncan Hall.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Introduction to Network Hardware
Footprinting and Scanning
Wireless Network Security
Footprinting and Scanning
Chapter 6 Networks Communicating and Sharing Resources
Firewalls Routers, Switches, Hubs VPNs
Lecture 3: Secure Network Architecture
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use this presentation to promote computer science education in the U.S. and around the world. For more information about the Bridges Program, please visit our website at: Disclaimers: IMAGES: All images in this presentation were created by our Bridges to Computing staff or were found online through open access media sites and are used under the Creative Commons Attribution-Share Alike 3.0 License. If you believe an image in this presentation is in fact copyrighted material, never intended for creative commons use, please contact us at so that we can remove it from this presentation. LINKS: This document may include links to sites and documents outside of the "Bridges to Computing" domain. The Bridges Program cannot be held responsible for the content of 3 rd party sources and sites. Bridges To Computing

LECTURE 2 Network Security M. MEYER BRIDGES TO COMPUTING BROOKLYN COLLEGE SPRING 2011

White hats = good guys In this lecture we will concentrate on the problems faced by “white hat” hackers. That is, we will examine what a network security specialist needs to be aware of in order to prevent malicious theft of information from his/her company. Setup: Alice and Bob work at two geographically separate sites. They routinely exchange, via the Internet, a file that is of very high value to a 3 rd party Carol (or Charlie). Question(s): How do you, as a computer security specialist (white hat) protect that file from illegal access? How might Carol (Charlie) go about stealing the file?

1. Bribery and Blackmail 2. Physical Security 3. Eavesdropping 4. Internal system/network attack 5. External system/network attack 5 problems EVERY network security specialist should address.

(1) Bribery and Blackmail Question: What’s the easiest way for Carol to get the file? Answer: Get someone who has access to make her a copy. How much is the file worth? Will Alice of Bob sell the file for some fraction of its value? Can Alice or Bob be threated into handing over the file. Who else besides Alice and Bob has direct access? Can they be bribed or blackmailed? We have had several cases of nurses (and other staff) selling the personal information of patients (including babies).

(2) Physical Security Question: Where are copies of the secret file located? Answer: Bob and Alice's machines, but also the main file server, any/all backup servers and tapes and every machine that handles the file when it is ed. Who can physically access these machines/locations? Do Alice and/or Bob leave their password lying around? Are backup tapes stored in a secure location? Is the file ALWAYS stored encrypted?

(3) Eavesdropping Question: When, where and how is the file transferred? Answer: The file is ed (Internet) and is also sent over the local networks at Alice and Bob’s companies. Alice uses a wireless network in her office! Do the local networks used by Alice and Bob use SMART routers and not dumb hubs? Get rid of Alice's wireless network (if not possible use most advanced security available). Is the file ALWAYS stored/transferred encrypted?

(4) Internal system/network attack Question: How secure are ALL internal machines? Answer: All the machines have access to the Internet, and also run an antivirus program. Do all machines require logon (NO GUESTS)? Are all machine OS’s (& antivirus) kept up to date? Is the network protected from unauthorized access (MAC address blocking, and limited patch panel)? Have users been educated on basic network security? Are local traffic packet records kept? Are machines running ONLY approved software?

(5) External system/network attack Question: What machines can access the Internet? Answer: ALL machines are hooked up to the Internet. Do all machines really need Internet access? Is their a firewall in place to protect networked machines (from remote port scanning). Are IP and DNS filters active on the firewall? Are servers ( , web) in a DMZ? Are external and DMZ traffic packet records kept? Is someone actively testing your security?

Conducting an AUTHORIZED external attack 1. Locating externally accessible routers and machines.  Searching WHOIS records.  Examining headers.  Simple DNS requests (nslookup).  Ping sweeps (nmap).  Topology scans (traceroute, nmap) 2. Looking for weaknesses on accessible machines.  OS fingerprinting (nmap and other tools).  Port scanning (nmap and other tools).  Server architecture layout (based on topology and ports)

Conducting an AUTHORIZED external attack (cont) 3. Research/Write an exploit.  Visit ******* or ********* or ******** (or any number of other hacker sites) and look for known exploits that can be used to target machines running the OS and applications that your target machines are running – script kiddie option.  Using a packet creation tool (like ******* or *****) attempt to create your own exploit: 1. Buffer overflow attack. 2. SQL injection attack. 4. See if your own attack was detected.

Practicing at home It used to be difficult to practice network intrusion/detection without an actual network. Virtualbox is a free tool from SUN that allows you to run multiple “virtual machines” on one computer. DVL (d*** vulnerable linux) is a free linux based OS that comes with dozens of flawed applications already running (it can be run from a cd). Backtrack is a network security CD that contains all of the tools you would need to conduct an attack against a DVL machine.

The End