Oracle Financial System Project Team: Xuegong Wang Jun Lu ZhengChun Mo Patrick Zhu Thomas Verghese Weicheng Wong Date : 14 th November, 2001 Step 3.

Slides:



Advertisements
Similar presentations
Securing Network – Wireless – and Connected Infrastructures
Advertisements

Distance Education Team 1 Adrian Sia Xavier Appé Anoop Georges Salvador Gonzales Augustine Ani Zijian Cao Joe Ondercin SNA Step 3 November 14, 2001.
Oracle Financial System Project Team: Aseem Gupta Jeng Toa Lee Jun Lu Kevin Patrick Zhu Thomas Verghese Weicheng Wong Xuegong Wang ( Jeff ) Date : 26 th.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Student Application System SNA Step 3 Attacker Profiles and Scenarios
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Firewalls CS-455 Dick Steflik. Firewalls Sits between two networks –Used to protect one from the other –Places a bottleneck between the networks All communications.
Firewalls and Intrusion Detection Systems
Extranet for Security Professionals Intrusion Scenarios Heather T. Kowalski Tong Xu Ying Hao Hui Huang Bill Halpin Nov. 14, 2000.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Distance Education Team 2 Security Architectures and Analysis.
11/14 SNA Presentation 3 Survivable Network Analysis Oracle Financial System SNA step 3 Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian.
Earl Crane Hap Huynh Jeongwoo Ko Koichi Tominaga 11/14/2000 Physician Reminder System SNA Step 3.
Extranet for Security Professionals (ESP)
Student Application System Essential Services and Assets Timothy Mak - Team Leader James Zujie Shi Dali Wang Maria Stattel Andy Teng Hyoungju Yun John.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Earl Crane Hap Huynh Jeongwoo Ko Koichi Tominaga 12/12/2000 Physician Reminder System: Survivability Network Analysis Step 4.
SNA, Step 2, 10/31 Survivable Network Analysis Oracle Financial Management Services Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian Song.
Survivable Network Analysis Oracle Financial Management Services Ali Ardalan Qianming “Michelle” Chen Yi Hu Jason Milletary Jian Song.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Copyright, 2005 Pinnacle Entertainment, Inc. 1 Auditing the Windows Network Bart A. Lewin Chief Technology Officer Pinnacle Entertainment, Inc. CS 3-2.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 IS 8950 Managing Network Infrastructure and Operations.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Intro to MIS – MGS351 The World Wide Web and the Internet Extended Learning Module B.
Honeypot and Intrusion Detection System
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Chapter 6 of the Executive Guide manual Technology.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
7 Information Security.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
IS Network and Telecommunications Risks Chapter Six.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 2000 by Carnegie Mellon.
Lesson 2 Computer Security Incidents Taxonomy. Need an accepted taxonomy because... Provides a common frame of reference If no taxonomy, then we: Can’t.
Module 11: Designing Security for Network Perimeters.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer Security By Duncan Hall.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
SEC.FAIL Information Security Defense Lab Setup. SEC.FAIL Instructions Each team will need to operate on a separate system profile. For the labs, you.
E-Business & e-Commerce Tenets E. Widodo. 2 Tenet #1 Claim Your Domain NameClaim Your Domain Name –Look for a natural fit with your business name.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
UNIT V Security Management of Information Technology.
Onsite CRM Security
Securing Information Systems
Lab #2 NET332 By Asma AlOsaimi.
CSCE 548 Student Presentation By Manasa Suthram
Stop Those Prying Eyes Getting to Your Data
Computer Security Incidents
(A CORPORATE NETWORK APPROACH)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Securing Information Systems
Check Point Connectra NGX R60
Security Essentials for Small Businesses
Securing your hack-free work environment
Computer Security Incidents
Keeping your data, money & reputation safe
Securing web applications Externally
Presentation transcript:

Oracle Financial System Project Team: Xuegong Wang Jun Lu ZhengChun Mo Patrick Zhu Thomas Verghese Weicheng Wong Date : 14 th November, 2001 Step 3

6/29/2015Survivable Network Analysis2 AGENDA Review User Scenarios Attacker Profiles Intrusion Scenarios Compromisable Components

6/29/2015Survivable Network Analysis3 Current Architecture Fire Wall Chinook DSL service Public network CMU DOMAIN kerberos Form User Light Client ADI/Data Query Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Mellon Bank Security FTP Batch process Server… SSL Proxy

6/29/2015Survivable Network Analysis4 Essential Components Oracle Database Web Server Form Server Firewall Kerberos Authentication System

6/29/2015Survivable Network Analysis5 Who are the attackers CMU Student Hackers Activists Former employee /Disgruntled employee

6/29/2015Survivable Network Analysis6 Intrusion 1 – Attacker Profile CMU Student Hackers – Attacker: Recreational hacker – Resources: limited – Time: Not have much free time as a CMU student, look for opportunity. – Tools: Readily available tool kit. – Access: External to system but inside the CMU domain – Risk: May not understand risk, but highly risk averse. – Objective: To develop hacking skills.

6/29/2015Survivable Network Analysis7 Intrusion 1 – Level of Attack Target-of-Opportunity Attack – The attacker has limited knowledge of internal system – The attacker uses readily available tools to scan and probe systems to take advantage of know vulnerabilities – There is a high frequency of these attacks

6/29/2015Survivable Network Analysis8 Intrusion Scenario 1: Denial of Service Fire Wall CMU DOMAIN Student Hacker Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Server… SSL Proxy

6/29/2015Survivable Network Analysis9 Intrusion 2 – Attacker Profile Activist – Attacker: political/ethical activist – Resources: limited, but could have expert/internal help. – Time: Patient, may target specific events. – Tools: Readily available tool kit – Access: External to system but somehow illegally get into the the CMU domain. – Risk: Understand risk and don’t care. – Objective: To impact CMU policy./To make specific target unhappy.

6/29/2015Survivable Network Analysis10 Intrusion 2 – Level of Attack Intermediate Attack – The attacker may have some knowledge of internal system. – The attacker uses readily available tools to scan and probe systems to take advantage of know vulnerabilities. – Higher level of success. – There is a medium frequency of these attacks.

6/29/2015Survivable Network Analysis11 Intrusion Scenario 2: Fire Wall CMU DOMAIN Activist Hacker Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Server… SSL Proxy

6/29/2015Survivable Network Analysis12 Intrusion 3– Attacker Profile Former employee of CMU – Attacker: Former/Disgruntled Employee – Resources: Have knowledge of process. – Time: Usually in a short period after being fired, also can be very patient. – Tools: Use customized system program. – Access: Easily get into the the CMU domain. Connect to the system through pre-setup laptop. – Risk: Understand risk – Objective: To get some money/To screw up the system.

6/29/2015Survivable Network Analysis13 Intrusion 3 – Level of Attack Sophisticated Attack – The attacker familiar with the internal system – May already setup security loopholes in the system. – There is a very low frequency of these attacks

6/29/2015Survivable Network Analysis14 Intrusion Scenario 3: Compromise Database Fire Wall CMU DOMAIN Hacker Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Server… SSL Proxy

6/29/2015Survivable Network Analysis15 Compromisable Components Oracle Database Web Server Form Server Firewall

6/29/2015Survivable Network Analysis16 Questions?