Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Operations Chapter 11 Part 3 Pages 1279 to 1309.

Similar presentations


Presentation on theme: "Security Operations Chapter 11 Part 3 Pages 1279 to 1309."— Presentation transcript:

1 Security Operations Chapter 11 Part 3 Pages 1279 to 1309

2 E-Mail Security Security, authenticity and integrity were not considered. Easy to spoof From: Phishing

3 E-Mail Security PGP – http://www.symantec.com/encryption/ http://www.symantec.com/encryption/ – http://www.gpg4win.org/ http://www.gpg4win.org/ – Uses Public Key Encryption S/MIME – Public Key PKI

4 E-Mail Relaying Public mail server in DMZ Mail servers use a relay agent to send a message from one mail server to another. If not properly configured, can be used to send spam. A company’s email server should only accept email destined for its domain and should not forward messages to other mail servers and domains.

5 E-Mail Employ antivirus and content filter both on incoming and outgoing email.

6 Fax Security Fax can sit in a bin until the recipient picks it up. Pass between computer and fax device Fax encrypter – encrypts all fax data

7 Tools Hackers (Black Hats) – find vulnerabilities to exploit Penetration Testers (White Hats) – test for vulnerabilities to be fixed Sophisticated tools have become easier to use with GUI interfaces by script kiddies

8 DDoS Attack Figure 11-8 on page 1287

9 Scanners Operating system fingerprinting Open ports Server software version Vulnerability scanners use a database of vulnerabilities – Nessus

10 Browsing Forced browsing for files Google hacking to locate documents Shoulder surfing Dumpster diving

11 Network Sniffers Wireshark Put NIC into promiscuous mode “Sniffers are becoming less successful because of the move to switched environment.” SSH instead of telnet

12 Session hijacking Attacker temporarily takes David off the network and responds to Kristy Figure 11-10 on page 1292

13 Password Cracking John the Ripper L0phtcrack Dictionary and brute force Longer passwords with variety of character sets.

14 Backdoors Installed by Trojan Horse Many antiviruses and IDSs look for signatures and behavior patterns

15 Attacks List on pages 1293-4 Some are dates so you need continuing education.

16 Vulnerability Testing Manual or automated Scope of the test must be agreed upon. Could knock a server offline. Personnel Testing Physical Testing System and network testing

17 Penetration Testing Testing the network and its systems by attacking it. Five Step Process – page 1300 Types – page 1300 Figure page 1301 Georgia Weidman, “Penetration Testing”


Download ppt "Security Operations Chapter 11 Part 3 Pages 1279 to 1309."

Similar presentations


Ads by Google