Network Security Fundamentals

Slides:



Advertisements
Similar presentations
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Advertisements

CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Threats To A Computer Network
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 1 Introduction to Security.
Chapter 1 Introduction to Security
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
7 Information Security.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 2 Malware and Social Engineering Attacks.
Malicious Software.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cyber security. Malicious Code Social Engineering Detect and prevent.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
Topic 4: E-safety, Health and Safety
Botnets A collection of compromised machines
Three Things About Malware
3.6 Fundamentals of cyber security
Malware and Social Engineering
CYBER SECURITY...
IT Security  .
Social Engineering Charniece Craven COSC 316.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Various Types of Malware
Botnets A collection of compromised machines
Securing Information Systems
Teaching Computing to GCSE
Security+ Guide to Network Security Fundamentals, Fourth Edition
Computer Technology Notes 5
Computer Applications Unit B
Risk of the Internet At Home
Social Engineering No class today! Dr. X.
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
WJEC GCSE Computer Science
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Introduction to Internet Worm
Presentation transcript:

Network Security Fundamentals Carrie Estes Collin Donaldson

Todays Security Attacks Half of all malware delivered by web advertising is caused by fake antiviruses. Four computers with weak passwords 24 days 39 sec, 2244/day, 270,000 total Emails from a Prince in Nigeria. 5 years 67 known victims More than $1.3

Fortune 500 Companies Defcon Hacking Conference contest 135 employees called, 17 companies No passwords or SSN’s Wanted operating systems, antivirus, and browser Persuaded to visit fraudulent website. 5 did not provide any information

Difficulties in Defending Against Attacks Universally connected devices Increased speed of attacks Greater sophistication of attacks Faster detection of vulnerabilities Delays in patching

What is Information Security? A direct action that is intended to inflict damage or suffering An indirect and non-intentional action. Information Security Securing information Digital format Provides value

Terminology Threat Vulnerability Asset Risk A type of action that has the potential to cause harm. Vulnerability A flaw or weakness that allows a threat agent to bypass security Asset An item that has value. Risk Risk = Threat x Vulnerability x Cost

Cyberterrorism A premeditated and politically motivated attack. These attacks are used to cause panic, provoke violence, and possibly result in financial catastrophe. Normally one step behind.

Who are the attackers? Hackers Script Kiddies Spies Insiders

Attacks Steps of an attack Probe for information Penetrate any defenses Modify security settings Circulate to other systems Paralyze networks and devices

Defenses Layering Limiting Diversity Obscurity Simplicity Crown jewels of England Limiting Crown jewels of England handlers Diversity Same as layering, but various types Obscurity Never have “shift change” at same time Simplicity Complex may be hard to understand

Attacks using malware Malware is software that enters the computer without the users knowledge and performs unwanted and normally harmful actions. Two types Viruses Malicious code that reproduces itself on the computer Worms Malicious program that takes advantage of a vulnerability

Malware that conceals Trojans Rootkits Logic bombs Backdoors .exe advertised as one thing, but does another Rootkits Set of software tools used by the attacker to hide actions or the presence of other software Logic bombs Lays dormant until specific logical event triggers it Backdoors Circumvents normal security procedures

Malware that profits Botnets Spyware Adware Keyloggers An infected bot (zombie) on a computer and thousands of computers used by the attacker at once. Spyware Software that spies Adware Delivers advertising that is unwanted and unexpected by the user Keyloggers Captures and stores keystrokes on the computer

Phishing Pharming Spear Phishing Whaling Vishing Automatically directs user to fake website Spear Phishing Targets specific users and customized Whaling “small fish” “big fish” Vishing Voice phishing

Hoaxes A false warning often contained in an email message claiming to be from an IT department. Says there is a bad virus, you need to change your settings. Changing your settings could allow the attacker to compromise the system or make the computer unstable.

Physical Procedures Dumpster Diving Tailgating Dr. Oblitey’s example (first commonwealth) Tailgating Doors with special keys and people following in

Questions? Comments, concerns, wants for the next meeting?