OV 13 - 1 Copyright © 2011 Element K Content LLC. All rights reserved. Network Security Threats and Attacks  Network-Based Security Threats and Attacks.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Computer Viruses.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Payment Card Industry (PCI) Data Security Standard
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
PART THREE E-commerce in Action Norton University E-commerce in Action.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
1.1 System Performance Security Module 1 Version 5.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Software Security Testing Vinay Srinivasan cell:
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
 Malicious Code  Hacking  Natural Disaster  Theft.
Ingredients of Security
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
Chapter 7: Identifying Advanced Attacks
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 8. Cyber Security, Ethics and Trust
Wireless Network Security
Securing Information Systems
Presentation transcript:

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security Threats and Attacks  Network-Based Security Threats and Attacks  Apply Threat Mitigation Techniques  Educate Users

OV Copyright © 2011 Element K Content LLC. All rights reserved. Physical Security  The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.  Assuring the reliability of certain infrastructure elements such as electrical power, data networks, and fire suppression systems.  Physical security may be challenged by a wide variety of events or situations, including:  Facilities intrusions  Electrical grid failures  Fire  Personnel illnesses  Data network interruptions

OV Copyright © 2011 Element K Content LLC. All rights reserved. Physical Security Threats and Vulnerabilities  Internal – It is important to always consider what is happening inside organizations, especially when physical security is concerned.  External – It is impossible for any organization to fully control external security threats.  Natural – Although natural threats are easy to overlook, they can pose a significant risk to the physical security of a facility.  Man-made – Whether intentional or accidental, people can cause a number of physical threats.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Social Engineering Attacks User Name Password Target Attacker An attacker gets sensitive data from unsuspecting users

OV Copyright © 2011 Element K Content LLC. All rights reserved. Social Engineering Types  Spoofing - This is a human- or software-based attack where the goal is to pretend to be someone else for the purpose of concealing their identity.  Impersonation - This is a human-based attack where an attacker pretends to be someone he is not.  Phishing - This is a common type of -based social engineering attack.  Vishing - This is a human-based attack where the goal is to extract personal, financial, or confidential information from the victim.  Whaling - This is a form of phishing that targets individuals who are known to possess a good deal of wealth.  Spam and spim - Spam is an -based threat where the user’s inbox is flooded with s. Spim is an IM-based attack similar to spam.  Hoax - Hoax is any type of incorrect or misleading information that is disseminated to multiple users through unofficial channels.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Malicious Code Attacks Attacker inserts unauthorized software or malware to attack target systems

OV Copyright © 2011 Element K Content LLC. All rights reserved. Types of Malicious Code Attacks  Virus - A sample of code that spreads from one computer to another by attaching itself to other files.  Worm - A piece of code that spreads from one computer to another on its own, not by attaching itself to another file.  Trojan horse - An insidious type of malware that is itself a software attack and can pave the way for a number of other types of attacks.  Logic bomb - A piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Types of Malicious Code Attacks (Cont.)  Spyware - Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or collect other data the author wishes to obtain.  Adware - Software that automatically displays or downloads advertisements when it is used.  Rootkit - Code that is intended to take full or partial control of a system at the lowest levels.  Botnet - A set of computers that have been infected by a control program called a bot that enables attackers to exploit them to mount attacks.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Types of Viruses  Boot sector - Infects any disk based media.  Macro - A macro is a group of application-specific instructions that execute within a specific application.  Mailer and mass mailer - A mailer virus sends itself to other users through the system.  Polymorphic - This type of virus can change as it moves around, acting differently on different systems.  Script - A small program that runs code using the Windows scripting host on Windows operating systems.  Stealth - A stealth virus moves and attempts to conceal itself until it can propagate.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Buffer Overflow An attack that:  Targets system vulnerability to cause the device operating system to crash or reboot  May result in loss of data or execute rogue code on devices  Typically targets desktop and server applications, but may target applications on wireless devices. RADIUS, Diameter and TACACS+ subject to buffer overflow attacks.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Security Security protocols prevent unauthorized network access

OV Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Vulnerabilities  Rogue access point - This is an unauthorized wireless access point on a corporate or private network.  Evil twins - These are rogue access points on a network that appear to be legitimate.  Interference - In wireless networking, this is the phenomenon by which radio waves interfere with the wireless signals.  Bluejacking - This is a method used by attackers to send out unwanted Bluetooth signals from PDAs, mobile phones, and laptops to other Bluetooth-enabled devices.  Bluesnarfing - This is a method in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection within the 30-foot Bluetooth transmission limit.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Wireless Vulnerabilities (Cont.)  War driving - The act of searching for instances of wireless networks using wireless tracking devices such as PDAs, mobile phones, or laptops.  WEP and WPA cracking - The method used to crack the encryption keys used in WEP and WPA installations to gain access to private wireless networks.  War chalking - The act of using symbols to mark off a sidewalk or wall to indicate that there is an open wireless network which may be offering Internet access.  IV attack - In this attack, the attacker is able to predict or control the Initialization Vector (IV) of an encryption process.  Packet sniffing - An attack on wireless networks where an attacker captures data and registers data flows, which allow the attacker to analyze the data contained in a packet.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Password Attacks xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234 A password attack shows up as repeated failed logons and then a successful logon

OV Copyright © 2011 Element K Content LLC. All rights reserved. Types of Password Attacks  Guessing - Is the simplest type of password attack and involves an individual making repeated attempts to guess a password by entering different common password values.  Stealing - Passwords can be stolen by various means, including sniffing network communications, reading handwritten password notes, or observing a user in the act of entering the password.  Dictionary attack - Automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.  Brute force attack - The attacker uses password-cracking software to attempt every possible alphanumeric password combination.  Hybrid password attack - Utilizes multiple attack vectors including dictionary, brute-force, and other attack methodologies when trying to crack a password.

OV Copyright © 2011 Element K Content LLC. All rights reserved. IP Spoofing Attacks IP packet Target Real IP address: Real IP address: Source IP address: Destination IP address: Source IP address: Destination IP address:

OV Copyright © 2011 Element K Content LLC. All rights reserved. Session Hijacking Attacks Legitimate computer session Stealing an active session cookie

OV Copyright © 2011 Element K Content LLC. All rights reserved. DoS Attacks Attempts to disrupt or disable systems that provide network services Attempts to disrupt or disable systems that provide network services

OV Copyright © 2011 Element K Content LLC. All rights reserved. DDoS Attacks Drones Uses multiple computers to launch the attack from many sources Uses multiple computers to launch the attack from many sources

OV Copyright © 2011 Element K Content LLC. All rights reserved. Man-in-the-Middle Attacks Controlling the information that travels between the two victims Controlling the information that travels between the two victims

OV Copyright © 2011 Element K Content LLC. All rights reserved. Port Scanning Attacks PortProtocolState 21FTPOpen 53DNSClosed 80HTTPOpen 110POP3Closed 119NNTPClosed 443HTTPSOpen Scans the computers and devices to determine active TCP and UDP ports Scans the computers and devices to determine active TCP and UDP ports

OV Copyright © 2011 Element K Content LLC. All rights reserved. Replay Attacks 1:00 P.M. 10:00 A.M. Captures network traffic and stores it for retransmission Retransmits later to gain unauthorized access

OV Copyright © 2011 Element K Content LLC. All rights reserved. FTP Bounce Attacks  Target the FTP vulnerability, which permits connected clients to open other connections on any port on the FTP server.  Allow a user with anonymous FTP connection to attack other systems by opening a service port on the third system and sending commands to that service.

OV Copyright © 2011 Element K Content LLC. All rights reserved. ARP Poisoning Attacks Redirects IP address to self IP address: MAC address: F6-65 IP address: MAC address: F6-65 IP address: MAC address: F6-65 IP address: MAC address: F6-65

OV Copyright © 2011 Element K Content LLC. All rights reserved. Software Updates Software manufacturers regularly issue different types of system updates:  Patch - A small unit of supplemental code  Hotfix - Issued on an emergency basis to address a specific security flaw  Rollup - A collection of previously issued patches and hotfixes  Service pack - A larger compilation of system updates with new features

OV Copyright © 2011 Element K Content LLC. All rights reserved. Patch Management Evaluate Test Implement Non-Production System

OV Copyright © 2011 Element K Content LLC. All rights reserved. Antivirus Software Scans computer for malicious programs

OV Copyright © 2011 Element K Content LLC. All rights reserved. Internet Virus Protection Antivirus deployed on Internet gateway Antivirus deployed on Internet gateway Antivirus deployed on mail connector Antivirus deployed on mail connector Antivirus deployed on systems

OV Copyright © 2011 Element K Content LLC. All rights reserved. Anti-Spam Software Anti-spam solutions protect specific spam target areas such as:  End users – Protects end users against the flood of spam using different methods  Administrators – Enables administrators to use many different systems and services to guard against spam within their organization  senders – Protects senders by using a number of automated methods  Research and law enforcement – Allows updated anti-spam solutions to be implemented

OV Copyright © 2011 Element K Content LLC. All rights reserved. Security Policies Formal policy statement Formal policy statement Implementation measures Implementation measures Individual policy Resources to protect Resources to protect

OV Copyright © 2011 Element K Content LLC. All rights reserved. Common Security Policy Types Common security policy types include:  Acceptable user policy - Defines the acceptable use of an organization’s physical and intellectual resources.  Audit policy - Details the requirements and parameters for risk assessment and audits of the organization’s information and resources.  Extranet policy - Sets the requirements for third-party entities that desire access to an organization’s networks.  Password policy - Defines standards for creating password complexity.  Wireless standards policy - Defines what wireless devices can connect to an organization’s network and how to use them in a safe manner.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Security Incident Management  A specific instance of a risk event occurring, whether or not it causes damage.  A set of practices and procedures that govern how an organization will respond to an incident in progress.  Goals of incident management:  Contain an incident appropriately.  Minimize any damage that may occur as a result of the incident.

OV Copyright © 2011 Element K Content LLC. All rights reserved. IRPs Incident Response Policy (IRP) is the security policy that:  Determines the actions that an organization will take following a confirmed or potential security breach.  Usually specifies:  Who determines and declares if an actual security incident has occurred.  What individuals or departments will be notified.  How and when they are notified.  Who will respond to the incident.  Guidelines for the appropriate response.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Change Management Systematic way of approving and executing change to IT services

OV Copyright © 2011 Element K Content LLC. All rights reserved. Employee Education The employee education process should include the following steps: 1.Awareness - Education begins with awareness. 2.Communication - Once employees are aware of security issues and the role they play in protecting the organization’s assets, the lines of communication between employees and the security team must remain open. 3.Education - Employees should be trained and educated in security procedures, practices, and expectations from the moment they walk through the door.

OV Copyright © 2011 Element K Content LLC. All rights reserved. User Security Responsibilities User security responsibilities include:  Physical security - Employees should not allow anyone in the building without proper ID.  System security - Employees must use their user IDs and passwords properly.  Device security - Employees must use correct procedures to log off all systems and shut down computers when not in use.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Reflective Questions 1. What type of attack is of the most concern in your environment? 2. Which type of attack do you think might be the most difficult to guard against?