Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTERNET Security COMPUTER, NETWORK & INTERNET SECURITY.

Similar presentations


Presentation on theme: "INTERNET Security COMPUTER, NETWORK & INTERNET SECURITY."— Presentation transcript:

1 INTERNET Security COMPUTER, NETWORK & INTERNET SECURITY

2 Cryptography Encrypt before sending, decrypt on receiving (plain text and cipher text) Cryptography & Secure Transactions

3 Cryptography All cryptosystems are based only on three Cryptographic Algorithms: Cryptography & Secure Transactions Message Digest (MD2-4-5, SHA, SHA-1, …) Private KEY (Blowfish, DES, IDEA, RC2-4-5, Triple-DES, …) Private KEY (Blowfish, DES, IDEA, RC2-4-5, Triple-DES, …) PUBLIC KEY (DSA, RSA, …) PUBLIC KEY (DSA, RSA, …) Maps variable length plaintext into fixed length ciphertext No key usage, computationally infeasible to recover the plaintext Encrypt and decrypt messages by using the same Secret Key Encrypt and decrypt messages by using two different Keys: Public Key, Private Key (coupled together)

4 Cryptography Two components: key, and the algorithm Algorithms are publicly known and Secrecy is in the Key Key distribution must be secure Cryptography & Secure Transactions PlaintextEncryptionDecryptionPlaintextCiphertext KeyKey Hello World &$*£(“!273

5 Cryptography Symmetric Key Cryptography (DES, Triple DES, RC4): K E = K D Asymmetric Key Cryptography (RSA): K E  K D Cryptography & Secure Transactions

6 Private Key Cryptography The Sender and Receiver share the same Key which is private Cryptography & Secure Transactions PlaintextEncryptionDecryptionPlaintextCiphertext Sender/Receiver’s Private Key

7 Public Key Cryptography Both the Sender and Receiver have their Private Key and Public Key Messages are encrypted using receiver’s Public Key and the receiver decrypts it using his/her Private Key Cryptography & Secure Transactions PlaintextEncryptionDecryptionPlaintextCiphertext Receiver’s Public Key Receiver’s Private Key

8 Digital Signature Cryptography & Secure Transactions Hash Function Message Signature Private Key Encryption Digest Message Decryption Public Key ExpectedDigestActualDigest Hash Function DigestAlgorithmDigestAlgorithm

9 Digital Certificate Secure HTTP (HTTPS) communication is done using Public Key Cryptography The public Keys are distributed using Digital Certificates Digital Certificates contain the Public Key and is digitally signed by a trusted Certificate Authority (CA) like Verisign or Thawte Cryptography & Secure Transactions

10 Digital Certificate Cryptography & Secure Transactions CERTIFICATE Issuer Subject IssuerDigitalSignature Subject Public Key

11 SET Architecture Cryptography & Secure Transactions End User Payment Gateway Web Site Credit Card Company

12 QUESTIONS?

13 INTERNET Security Threats Hacking DoS Reconnaissance Malware Mail SPAM Phishing Botnets INTERNET Security

14 Hacking Unauthorized Access: From a small few thousand Rupees fraud using somebody’s Credit Card to Bringing down the economy by hacking into share market online trading servers Intruders will take advantage of hidden features or bugs to gain access to the system. Common types of Hacking attacks include: Buffer Overflow attack to get root access SSH Dictionary attack to get root access Defacing website using apache vulnerabilities Installing malicious codes INTERNET Security

15 DoS Denial of Service (DoS) attempts to collapse the service or resource to deny access to anyone. Common types of DoS attacks: ICMP Flooding TCP SYN Flooding UDP Flooding Distributed Denial Of Service Attacks (DDOS) can be defined as a denial of service attack with several sources distributed along the Internet that focuses on the same target. INTERNET Security

16 Reconnaissance Reconnaissance attacks include Ping Sweeps DNS zone transfers TCP or UDP port scans Indexing of public web servers to find cgi holes INTERNET Security

17 Malware The Wikipedia definition of Malware is: “Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is a blend of the words “malicious” and “software”. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.” Different types of Malware are Viruses, Worms, Trojan Horses, Adwares, Spywares and any other malicious and unwanted software. INTERNET Security

18 Malware: Virus INTERNET Security A computer virus is a self-replicating Computer Program written to alter the way a computer operates, without the permission or knowledge of the user. It can damage the computer by damaging programs, deleting files, or reformatting the hard disk. It is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce by attaching to other programs and wreak havoc. Viruses usually need human action to replicate and spread.

19 Malware: Worms INTERNET Security A computer worm is a self-replicating Computer program. It uses a network to send copies of itself to other systems and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer. Today, worms are most commonly written for the Windows OS, although a small number are also written for Linux and Unix systems. Worms work in the same basic way: they scan the network for computers with vulnerable network services, break in to those computers, and copy themselves over.

20 Malware: Trojan INTERNET Security A Trojan horse is a malicious program that is disguised as or embedded within legitimate software. Broadly speaking, a Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting all the user's files, or more commonly it may install further harmful software into the user's system to serve the creator's longer-term goals.

21 Malware: Spyware INTERNET Security Spyware is a general term used for software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent. Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information. Other kinds of spyware make changes to your computer that can be annoying and can cause your computer slow down or crash. There are a number of ways spyware or other unwanted software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

22 Mail Spam Email that has been unsolicited, with no meaningful content to the receiver – Advertising – Research – Fraud / Schemes – Viruses (40% email is spam) Spam are generated using – Open Mail Relays – Spammer Viruses & Trojans – Botnets INTERNET Security

23 Phishing Scam to steal valuable information such as credit cards, social security numbers, user IDs and passwords. Official-looking e-mail sent to potential victims Pretends to be from their ISP, retail store, etc., Due to internal accounting errors or some other pretext, certain information must be updated to continue the service. Link in e-mail message directs the user to a Web page Asks for financial information Page looks genuine Easy to fake valid Web site Any HTML page on the real Web can be copied and modified The location of the page is changed regularly INTERNET Security

24 Botnets Bots are compromised machines which are executing malicious codes installed in them A botnet is a collection of compromised computers—bots They have become the major sources of Spam, Malwares, DoS attacks etc. INTERNET Security

25 QUESTIONS?

26 Prevention Techniques Some of the prevention tools include: Network Firewall Host Firewall IDS/IPS Mail Antispam and Antivirus Appliances UTM Appliances Application and OS Hardening INTERNET Security

27 Firewall Basic Setup Firewall Internet Database Application Web Server Firewall

28 Firewall Rules IP Address of Source (Allow from Trusted Sources) IP Address of Destination (Allow to trusted Destinations) Application Port Number (Allow Mail but restrict Telnet) Direction of Traffic (Allow outgoing traffic but restrict incoming traffic) Firewall

29 Firewall Rules Linux Security To allow incoming and outgoing SMTP traffic: Direction Prot Src Dest Dest Src Action Addr Addr Port Port 1. outbound TCP internal external 25 >=1024 allow 2. inbound TCP external internal >=1024 25 allow 3. inbound TCP external internal 25 >=1024 allow 4. outbound TCP internal external >=1024 25 allow 5. * * * * * * deny

30 Firewall Implementation Hardware Firewall: Dedicated Hardware Box (Cisco PIX, Netscreen ) Software Firewall: Installable on a Server (Checkpoint) Host OSs (Windows XP/Linux) also provide software firewall features to protect the host Firewall

31 LINUX Firewall Linux Security Use GUI (Applications ->System Settings-> Security Level) to activate the firewall Allow standard services and any specific port based application All other services and ports are blocked

32 LINUX Firewall Linux Security

33 IDS IDS/IPS An intrusion detection system is used to detect all types of malicious network traffic and computer usage that can't be detected by a conventional firewall. It detects network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).

34 IDS/IPS – What They Will Do IDS/IPS IDS/IPS use intrusion signatures to identify the intrusion. Detect and Block Network and Application Scans Against a Network - Powerful Capability in Anticipating an Attack Block Nearly all Forms of Denial of Service Attacks in Real Time Completely Stop Brute Force, Password Cracks, Dictionary Attacks, etc. Block Virus & Worm Propagation Provide URL filtering and block Spyware

35 Antispam Firewall IDS/IPS Antispam Techniques include DNS Black List DNS Reverse Lookup (PTR) check Subject & Body content SMTP Callback Rate Limiting Personal Whitelist and Blacklist

36 UTM UTM incorporates firewall, intrusion detection and prevention, Anti Spam and Anti Virus in one high- performance appliance

37 Host Hardening Web application hardening Outbound filtering Host hardening Application and OS Patching

38 QUESTIONS?

39 WLAN Security INTERNET Security

40 WLAN Security INTERNET Security WLANs create a new set of security threats to enterprise networks such as –Sniffing –Rogue APs –Mis-configured APs –Soft APs –MAC Spoofing –Honeypot APs –DoS –Ad hoc Networks

41 WLAN Security INTERNET Security Techniques used to secure WLANs include –Do not broadcast SSID, –Use encryption (WEP, 802.1x) –Use WLAN Firewalls

42 WLAN Firewall INTERNET Security

43 QUESTIONS?


Download ppt "INTERNET Security COMPUTER, NETWORK & INTERNET SECURITY."

Similar presentations


Ads by Google