Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.

Slides:



Advertisements
Similar presentations
IT Security Assurance Management of Network and User Behavior Budi Rahardjo INDOCISC - ID-CERT -
Advertisements

Network Security Essentials Chapter 11
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
Firewalls and Intrusion Detection Systems
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
COEN 252: Computer Forensics Router Investigation.
Firewall Slides by John Rouda
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
COEN 252 Computer Forensics
Firewalls A note on the use of these ppt slides:
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
COEN 252 Computer Forensics Collecting Network-based Evidence.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Network Presence, LLC SM Innovative Security Solutions SM Understanding, Planning For, and Responding To Denial of Service Attacks SANS 2001.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
A Network Security -Firewall Bruce Turin.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
Introduction to Network Security. Acknowledgements.
GOOD MORNING TO ONE AND ALL. OUR TEAM VENKATESH THARUN SADIK FROM AVANTHI ENGG. COLLEGE.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Security fundamentals
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
ISMS Information Security Management System
Firewalls Purpose of a Firewall Characteristic of a firewall
IP-Spoofing and Source Routing Connections
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002

net security - budi rahardjo Security Holes Internet Web Site Users ISP Network sniffed, attacked Trojan horse - Applications (database, Web server) hacked - OS hacked 1.System (OS) 2.Network 3.Applications (db) Holes Userid, Password, PIN, credit card #

net security - budi rahardjo Focus on this presentation

net security - budi rahardjo Sescurity Aspect Physical Personnel Technical, data, network Policy and procedures

net security - budi rahardjo Security Services Confidentiality / Privacy Integrity Authentication Availability Non-repudiation Access Control

net security - budi rahardjo Types of network attack Interruption –DoS attack, network flooding Interception –Sniffed (password) Modification –Trojan horse Fabrication –Spoofed packets

net security - budi rahardjo Reality Check IP v.4 is not secure. Spoofing is easy Tools (scripts) to exploit are available More home users are connected 24 hours/day with DSL, cable modem Need collaboration among network providers –Ingres border routers

net security - budi rahardjo Interruption Attack Denial of Service (DoS) attack –Exhaust bandwidth, network flooding –Possible to spoofed originating address –Tools: ping broadcast, smurf, synk4, various flood utilities Protection: –Little we can do if we are under attacked –Filter at router for outgoing packet, filter attack orginiating from our site

net security - budi rahardjo More interruption attack Distributed Denial of Service (DDoS) attack –Flood your network with spoofed packets from many sources –Based on SubSeven trojan, “phone home” via IRC once installed on a machine. Attacker knows how many agents ready to attack. –Then, ready to exhaust your bandwidth –See Steve Gibson’s paper

net security - budi rahardjo Interception Attack Sniffer to capture password and other sensitive information Tools: tcpdump, ngrep, linux sniffer, dsniff, trojan (BO, Netbus, Subseven) Protection: segmentation, switched hub

net security - budi rahardjo Modification Attack Modify, change information/programs Examples: Virus, Trojan, attached with or web sites Protection: anti virus, filter at mail server, integrity checker (eg. tripwire)

net security - budi rahardjo Fabrication Attack Spoofing address is easy Examples: –Fake mails, spoofed packets Tools: various packet construction kit Protection: filter outgoing packets at router

net security - budi rahardjo Protection Firewall –Static vs Stateful Packet Filter –Circuit gateway, application level gateway Intrusion Detection System (IDS) –Host vs Network based Policy –Privacy issues, AUP, cyberlaw, best practice, what to do if your site is probed?

net security - budi rahardjo Firewall – Static Packet Filter Inspect packets based on rules –Source, destination address, port Strength: –fast, can be implemented with Linux box Weakness: can be fooled, changing order, fragmentation, little information (for logging), IP spoofing, does not inspect payload, difficult to configure (lots of rules), stateless

net security - budi rahardjo Firewall - Stateful Remembers the state of packets Strength: better inspection, can be implemented with Linux box Weaknesses: slower?/faster?, needs more resources, IP spoofing, does not inspect payload, still difficult to configure

net security - budi rahardjo Instrusion Detection System Monitor system for anomaly Monitor host or network? Hybrid Difficult to monitor if stealth and slow Tools example: snort

net security - budi rahardjo Policy The hardest thing to do is dealing with people Policy, Standard Operating Procedure is overlooked

net security - budi rahardjo More reading materials My Books: Handbook Security Security focus Securiteam SANS: and many more …