Presentation is loading. Please wait.

Presentation is loading. Please wait.

Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment 2016 - Semester 1.

Similar presentations


Presentation on theme: "Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment 2016 - Semester 1."— Presentation transcript:

1 Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment 2016 - Semester 1

2 Lecture Outline  Introduction  Penetration Test Project  Testers vs Hackers  Ethical hacking of a computing environment  Ethics in ethical hacking  The ASA project phases

3 Introduction  Various types of testing activities  Vulnerability and penetration testing  Ethical hacking of a computing environment  Strategies of action for security assessment  Active security assessment project.

4 Introduction (cont.)  Penetration tests consists of active testing activities where the work of hackers is simulated.  A penetration test is an active security assessment that is performed according to a well defined scope, a well defined security policy.  It has to discover access information  Identify system vulnerabilities, exploit them  Generate security recommendations and act upon them.

5 Penetration Test Project  Identify vulnerabilities  Prioritize them  Study how to eliminate any condition that can cause damage.  Generate recommendations.  Penetration testing employs some tools, tricks and techniques that hackers use but with prior authorization.  Usually, the subject of ASA is not to eliminate the occurrence of attacks, but to reduce their efforts and their probability of success when they take place.

6 Testers vs Hackers Testers 4 Have a security objective to respect 4 Limited by the scope of penetration testing activities 4 Limited techniques and tools to use 4 Have security policies to comply with 4 Attempt to record every step taken to study effects and possible remedies Hackers 4 Has a destructive objective to expand as much as possible 4 Not limited to any tools and techniques 4 Hackers not bothered with any restrictions 4 Attempts to hide traces of all steps taken to make it difficult for forensic analysts to identify / catch.

7 Ethical hacking of a CE  Attacks on people –Social engineering  Attacks on infrastructure –Physical infrastructure –Equipment and company facilities such as, servers, PCs, routers, switches, etc. –Network infrastructure –Testing remote connection  Attacks on technology –Operating systems –Applications, software and hardware –Patches can reduce system vulnerabilities

8 Ethical hacking of a CE  Attacks on data –DoS –Backup needed  Attacks on activities –Telecommunication and computing protocols –The use of protocols such as, ARP, ICMP, TCP, IP, SNMP, etc. –All tasks, procedures, policies and regulations can be corrupted.

9 Ethics in ethical hacking  Four important rules that need to be included in any code of ethics for ASA: 1)Stick to the security objective and scope 2)Respect for privacy 3)Avoid any disruptive effects 4)Reporting of any violation of any code of ethics

10 Ethics in ethical hacking  The ASA project scope should specify that the tasks below should be defined: 1)Target system and its components 2)Timing of the project 3)Risks to be accepted throughout the ASA project 4)Strategy of the project in terms of visibility, place and direction 5)Delivering requirements 6)Response activities and testing limitations.

11 The ASA Project Phases

12 Reconnaissance effort  Collecting information on target companies / businesses and their systems, mostly on internet. –Web search – Google –Web crawling – download –Web navigation  Might be interested in finding out about the source code, IT staff names and e-mails, type and version of software, developer’s name and e-mail, server names, etc.

13 Reconnaissance effort  Example of tools that may be used in the reconnaissance phase: –DNS lookup –Finger –Name lookup –Ping –Port scan –Throughput –Trace route –Whois –Etc.

14 Homework End


Download ppt "Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment 2016 - Semester 1."

Similar presentations


Ads by Google