Chapter 18: Computer and Network Security Threats

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Data and Computer Communications
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Chapter 14 Computer Security Threats
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 20 Intruders
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 14 Computer Security Threats
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Security Chapter 15. Computer and Network Security Requirements Confidentiality –Requires information in a computer system only be accessible for reading.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 18 “Computer and Network Security Threats”.
Data and Computer Communications
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Lecture 1: Overview modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Chap1: Is there a Security Problem in Computing?.
Malicious Software.
Computer Skills and Applications Computer Security.
1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Copyright © 2013 – Curt Hill Computer Security An Overview.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Unit 8: Security Risks & Data Protection Kaplan University 1.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Network Security Overview
Computer and Network Security
LECTURE 6 MALICIOUS SOFTWARE
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Chapter 18: Computer and Network Security Threats Business Data Communications, 6e

Computer Security Defined Computer Security: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) source: NIST Computer Security Handbook

3 Key Security Objectives Confidentiality -Data Confidentiality: assures that private information is not disclosed to unauthorized individuals -Privacy: assures that individuals control information related to them Integrity -Data integrity: assures that information and programs are only changed in a specified and authorized manner -System integrity: assures that a system performs its intended function in an unimpaired manner Availability: assures that systems work promptly and service is not denied to authorized users.

The Security Requirements Triad

Unauthorized Disclosure Exposure: intentional release of sensitive information or gaining unauthorized knowledge of sensitive data. Interception: unauthorized access to packets, email or other data traffic Inference: gaining information from observing network traffic patterns Intrusion: unauthoriz3ed access by overcoming the system’s access control protections.

Deception Threats Masquerade: attempt to gain access by posing as an authorized user Falsification: altering or replacing valid data or introducing false data into a file or database Repudiation: a user denies sending data or a user denies receiving or possessing data

Disruption Threats Incapacitation: attack on system availability; such as Trojan horses, viruses, or worms Corruption: attack on system integrity; system resources or services function in an unintended manner Obstruction: interfere with communications by disabling links or altering control information

Usurpation Threats Misappropriation: includes theft of service; including distributed denial of service attacks Misuse: can occur either by means of malicious logic or unauthorized system access.

Scope of System Security

Threats and Assets Availability Confidentiality Integrity Hardware Equipment is stolen or disabled, thus denying service. Software Programs are deleted, denying access to users. An unauthorized copy of software is made. A working program is modified, either to cause it to fail during execution or to cause it to do some unintended task. Data Files are deleted, denying access to users. An unauthorized read of data is performed. An analysis of statistical data reveals underlying data. Existing files are modified or new files are fabricated. Communication Lines Messages are destroyed or deleted. Communications lines or networks are rendered unavailable. Messages are read. The traffic pattern of messages is observed. Messages are modified, delayed, reordered, or duplicated. False messages are fabricated.

Security Threats Passive attacks Active attacks Release of message contents Traffic analysis Difficult to detect because there is no data alteration Emphasis on prevention through encryption Active attacks Masquerade Replay Modification of messages Denial of Service

Intruders Masquerader: an individual not authorized to use the computer and penetrates a system’s access controls to exploit a legitimate user’s account; likely to be an outsider. Misfeasor: legitimate user who access data, programs or resources that they are not authorized for; likely to be an insider. Clandestine user: individual who seizes supervisory control of the system and uses the access to evade auditing and access controls.

Intrusion Examples Performing a remote root compromise of an e-mail server Defacing a Web server Guessing and cracking passwords Copying a database containing credit card numbers Viewing sensitive data without authorization Running a packet sniffer on a workstation to capture usernames and passwords Dialing into an unsecured modem and gaining internal network access Posing as an executive, calling the help desk, resetting the executive’s e-mail password, and learning the new password Using an unattended, logged-in workstation without permission

Intruder Behavior Patterns Hackers: Organized group of intruders who hack into a computer for the thrill or for status. Criminals: Usually have specific targets or classes of targets in mind. Frequently Eastern European or Southeast Asian groups who do business on the Web. Insider Attacks: Difficult to detect and protect against; employees have access to and knowledge of the structure and content of databases.

Malicious Software Malware: malicious software that exploit system vulnerabilities Two categories: those that need a host program and those that are independent (parasitic) May or may not replicate

Malicious Programs Backdoor: secret entry point into a program that allows someone to gain access. A maintenance hook is a backdoor inserted by a programmer to aid in testing and debugging. Logic Bomb: code embedded in a program that is set to go off when certain conditions are met.

Malicious Programs Trojan Horse: use program or command procedure that contains hidden code that when invoked performs some unwanted or harmful procedure. These may also be used for data destruction. Mobile Code: programs that can be shipped unchanged to a heterogeneous collection of platforms and execute identical semantics.

Malicious Programs Viruses: software that can infect other programs by modifying them. The infection may be passed onto other programs. Virus has three parts: -Infection mechanism -Trigger -Payload

Virus Phases Dormant Phase: virus is idle. Propagation Phase: virus places an identical copy of itself on other programs, each program will then place a copy into other programs Triggering Phase: virus is activated to perform the function for which it was intended. Execution Phase: the function is performed.

Virus Classifications By Target -Boot Sector Infector -File Infector -Macro Virus By Concealment Strategy -Encrypted Virus -Stealth Virus -Polymorphic Virus -Metamorphic Virus

Worms Worms replicate themselves and send copies from computer to computer across a network connection to perform some unwanted function. A network worm may also attempt to determine if a system has previously been infected before copying itself.

Worm Propagation Model

State of Worm Technology Multiplatform Multiexploit Ultrafast spreading Polymorphic Metamorphic Transport Vehicles Zero-day exploit

Bots Also know as a zombie or drone Program that secretly takes another Internet-attached computer, then uses it to launch attacks that are difficult to trace A botnet is a collection of bots capable of coordinating attacks

Uses of Bots Distributed denial-of-service attacks Spamming Sniffing traffic Keylogging Spreading new malware Installing advertisement add-ons and browser helper objects Attacking IRC chat networks Manipulating online polls/games

Constructing a Network Attack Software to carry out the attack must be able to run on a large number of machines and remain concealed The attack must be aware of a vulnerability that many system administrators have failed to notice A strategy for locating vulnerable machines must be implemented. This is known as scanning or fingerprinting.

Scanning Strategies Random Hit List Topological Local subnet