Ensuring Network Security Planning Physical Security Data Security –Passwords –Auditing –Encryption Sniffing Firewalls Viruses.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Database Administration and Security Transparencies 1.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Unit 18 Data Security 1.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Ensuring Network Security Physical Security Ciphering Authentication Integrity Firewalls Data Security –Passwords –Auditing Sniffing Viruses.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Technology Solutions Conference School Security Technology Solutions Conference School Security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Internet Security facilities for secure communication.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Computer security By Isabelle Cooper.
Keeping Your Computer Safe and Running Efficiently.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Precautions Computing Science.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Security Architecture of Windows
Chapter Objectives In this chapter, you will learn:
Chap 10 Malicious Software.
Operating System Security
Chap 10 Malicious Software.
G061 - Network Security.
Presentation transcript:

Ensuring Network Security Planning Physical Security Data Security –Passwords –Auditing –Encryption Sniffing Firewalls Viruses

Security Planning Unauthorized access Electronic Tampering Theft Intentional damage Unintentional damage

Physical Security Access to hardware –Locked Doors –Locked Cabinets Access to the system console –Screen Passwords –Locked keyboards (removing keyboard) Access to network wiring/switches/routers

Physical Environment Power source Noise sources Air conditioning (temperature control) Dust and smoke Water problems (flood possible?)

Data Security Share Level Security vs. User Level Security Proper passwords –Length –Uncommon names –Use of non alphanumeric characters –Controlled access (Screen/Keyboard Locks) Use of a Routed vs. Flat network architecture Audit use of the system

Windows Security Permissions Full (all of the below) Read Execute Write Delete None (no access)

Auditing Check for: –Logon attempts –Connection to resources –Connection termination –Directory creation, modification, or deletion –Server events and modifications –Password changes

Microsoft Gotchas Microsoft operating systems have a tendency to store passwords on the local hard disk in the Windows registry to save time when logging in to remote services. This can be quite dangerous!

Flat Network User 1: User 2: User 3: Hub Monitor sees some traffic from all 3 users Internet

Routed Network Router Monitor can’t see traffic other than it’s own subnet User 1:Subnet 7 User 2:Subnet 3 User 3:Subnet 6 Monitor on Subnet 1 Internet

Sniffers Sniffer, Snoop, Tcpdump Promiscuous mode Many protocols Interpretation

Login Security Usernames/Passwords may be in plain text over the network security –Netscape/Eudora leave configuration files on each PC. –Webmail is an IMAP interface to a mail server can use SSL for security

Encryption DES (Digital Encryption Standard) Secure Shells Secure Web Pages Pretty Good Privacy –Private Keys –Publics –Signatures

How safe is encryption? 4 character password (alphabetic characters only) cracking time (maybe a minute on a 450mhz computer) 40 bit key (can be cracked in 24hours on a parallel computing system) 128 bit key (probably not able to be cracked in a millennium)

Secure Shell (SSH) Use of encryption based on keys/certificates Block undesired hosts from accessing All data on the wire is encrypted Can be used for interactive communication and copying files

Secure Web Sites Keys/Cookies –New key/encryption code for each access Encryption of data over the wire Keep track of trusted hosts that access the site.

Pretty Good Privacy Encryption of keys –40 bit –128 bit Creating your authenticated signature Your key ring Submitting your public key to a database and PGP

PGP System PGP User 1 International Database PGP Private key Public keys Message can be entirely encrypted or just the signature can be encrypted. User 2 Key Ring Data

Firewalls Purpose Disadvantages –Slowdown of packets –Inconvenient for users Advantages –Slows down hacking attempts –Limits incoming traffic –Overcomes IP number limitations (NAT)

Firewalls (cont.) Setup –Addressing –Name Service –Reuse of IP numbers inside the firewall (NAT) Proxies – –Web –FTP

Viruses/Trojans/Macros Viruses spread by: –floppies –downloaded files – Viruses are removed by: –Deleting the affected file –Running a virus scanning/cleaning program

Companion Viruses Looks like a real program (WORD.EXE) Make replace a logon program and grab usernames/passwords Usually renames the actual executable and calls that executable from the bogus program.

Macro Viruses The virus infects the Macro definitions of a program (like Microsoft Word) and then infects every document created by the original program. These viruses are difficult to detect because they haven’t infected an executable program.

Polymorphic Viruses These change appearance every time they replicate. They may even change each time the computer is rebooted. Since they change frequently, virus checkers have a hard time determining a pattern or fingerprint of the virus.

Stealth Virus These hide from detection They may use hidden files or may modify the operating system so a standard directory scan doesn’t show the virus file. They also return false information to virus checkers.

Trojans Trojan Horses –Look like a benign game or program –After a period of time they execute the virus Some may be cleaned with virus protection software. Some masquerade as Windows programs and removal will crash the system

Back Doors Provide access to system through published, unused, or unpublished ports. Sometimes are put there by programmers, engineers, or hackers They are hard to protect against unless you can find their access port and firewall protect against it.

Virus Consequences Can’t boot Data is scrambled or unreadable Erratic or slow operation of the computer Excessive disk activity Disk drive is erased or data is lost. Disk is reformatted

Virus Protection Test each disk write for a particular pattern unique to the virus Test for writes to the disk boot block Test for code that might access PC hardware Scan files for virus patterns

D.O.S. Attacks Denial of Service Flood of useless packets/data Hard/Impossible? To track Good example of distributed computing Can a firewall protect the network?

Virus Use innocent messages as the transport. Grab address book entries to spread Infect critical windows programs The user doesn’t know he is infecting others Can be prevented by using front end scanners.

Backups What kind of backup system should we use? Even a fault tolerant disk system can fail! Always back up Rotate several copies of backups in case one tape is unreadable Check the backups to see if they are readable Store the tapes or removable media in a safe place

Backup Strategy Full Backup Incremental Backup Copy Daily Copy Logging –Date, tape-set number, type, which computer

UPS Handles short duration power failures Can alert the operator of power failure Decide how long the UPS needs to power the system Does the server display or printer need to be on? How much power does the server need (load)? Does the UPS have an RS232 control port? Life span of the UPS battery(ies)

RAID! Redundant Array of Independent Disks RAID 0 –Disk Striping –No fault tolerance RAID 1 –Disk Mirroring –High Disk Overhead (2-2GB disks=2GB) –High Write overhead (write to both disks)

MORE RAID! RAID 5 –disk striping –parity blocks –Requires at least 3 disk drives –Can improve disk performance –lose and replace 1 disk drive and no data is lost –overhead is 1/N n=number of disks, 5 10GB disks = 40 GB storage RAID 10 –Mirrored across 2 identical RAID 0 disk arrays

Hot Fixing Identify a bad sector Move the data to a free good sector Mark the bad sector Update the file allocation tables

Disaster Recovery Prevention –What can I control? –What is the best method? –Keep updating your prevention methods –Keep up on maintenance –Training!

Disaster Preparation Plan ahead Use fault tolerance equipment Maintain backups Test your preparation plan!