Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.

Slides:



Advertisements
Similar presentations
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Advertisements

Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Introduction to Security Computer Networks Computer Networks Term B10.
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
COEN 252: Computer Forensics Router Investigation.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
IS Network and Telecommunications Risks Chapter Six.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Network Security Part III: Security Appliances Firewalls.
Module 11: Designing Security for Network Perimeters.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Operating Systems Services provided on internet
Instructor Materials Chapter 7 Network Security
Attacks and Malicious Code
(see also Q1 and Q2 Topics)
EN Lecture Notes Spring 2016
Viruses and Other Malicious Content
Answer the questions to reveal the blocks and guess the picture.
Security in Networking
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Intro to Network Security

Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more threats Countermeasure Action taken to protect from vulnerabilities

Threats to System Security Viruses Technically a malicious program which must run to spread itself General use: any malicious program Worm Once started, spreads itself through network Trojan Horse Something that looks good to begin with, but beats you up later Logic Bomb Waits for a trigger and then detonates. Trigger could be date, data, and/or combination of events.

Threats to Internet Security System Vulnerabilities A trusted Computer is compromised. Holy Grail is to get the administrative account Application Vulnerabilities Network services User applications Network Vulnerabilities Denial of Service Packet Sniffing Brute Force Attack Brute Force

System Countermeasures OS updates particularly Microsoft Antivirus Software System Software Firewall (helps keep out the worms) Disaster Recovery Preparation: Expect the Worst.

Network Security Countermeasures Intrusion Detection System Sniffer: listens to packets looking for attack. Tripwire: Lets you know system has been altered. If you don’t know you have been compromised, you can’t recover from it. Sniffing IDS can indicate source and nature of attack. Sniffing IDS that sends an alarm thwarts a coverup. See snort.org

Network Countermeasures continued Run only needed services. If the service isn’t running it can’t be exploited Update service frequently, especially after a vulnerability discovery. Application Sercurity Look for updates: especially Microsoft. Disable scripting features if not used.

Network Countermeasures still continued DDOS attacks are out of your control. You can secure the server, but the network? Firewall filter is too late. Traceback or Packet tagging must occur “in the cloud.” Stop the Zombies! Stop the Zombies!

Packet Sniffing Network sniffing for passords or worse Inside Job Threat has been greatly lessened due to switching Switches can still be compromised Arp spoofing MAC Flooding

Brute Force Attacks Use secure Passwords. See 10 Most Common PasswordsSee 10 Most Common Passwords Set (stateful) Firewall Rules to limit logins from 1 host (I use 3 attempts/minute) Account Lockouts CAPTCHA: Those annoying pictures where you have to “GUESS” what the letters are in the picture.

Anatomy of an Attack 1. Target Selection 2. Information Gathering Information Gathering 3. Port Scan/Vulnerability Assessment 4. Penetration: successful attack 5. Persist : backdoor 6. Propogate: use trusted machine to spread 7. Payload: DDOS, Surveillance, theft of information, make phone calls,