Network Security Basics: Malware and Attacks

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 11 Firewalls.
Security+ Guide to Network Security Fundamentals
IS Network and Telecommunications Risks
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Norman SecureSurf Protect your users when surfing the Internet.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Information Assurance for the Enterprise: A Roadmap to Information.
Cyber crime & Security Prepared by : Rughani Zarana.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
ACM 511 Introduction to Computer Networks. Computer Networks.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
IS3220 Information Technology Infrastructure Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Securing Information Systems
Chapter 1: Explore the Network
Chapter 40 Internet Security.
CS457 Introduction to Information Security Systems
Blackboard Security System
Securing Information Systems
Instructor Materials Chapter 1: Explore the Network
BUSINESS DRIVEN TECHNOLOGY
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
INFORMATION SYSTEMS SECURITY AND CONTROL.
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Chapter 1: Explore the Network
Chapter 17 Risks, Security and Disaster Recovery
Introduction to Information Security
Firewalls.
Information and Network Security
Securing Information Systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
I have many checklists: how do I get started with cyber security?
* Essential Network Security Book Slides.
INFORMATION SYSTEMS SECURITY and CONTROL
Contact Center Security Strategies
Fire-wall.
Lecture 3: Secure Network Architecture
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Test 3 review FTP & Cybersecurity
Chapter 14: Protection.
Presentation transcript:

Network Security Basics: Malware and Attacks CHAPTER 12 SUMMARY Network Security Basics: Malware and Attacks Name: Mohammad Khalifa Aldossary ID: 200800586 Major: Management Information Systems Supervised by: Prof. Mohammad Rafiq

Objectives of the Chapter You will learn how to: Work with connection control and transmission control concepts Develop the planning and control techniques associated with network security Work with the various types of threats to networks

Outline Introduction Engineering the Network: Ensuring a Proper Design 2.1. Connection Control 2.2. Enforcing Connection Control: The Firewall 2.3. Transmission Control Defending Networks from Attacks 3.1. Threats to Information: Malicious Code 3.2. Malicious Attacks 3.3. The Role and Use of Policy Managers Cyber-Terrorism Managing and Defending a Network 5.1. Network Security Management and Planning 5.2. Network Defense in Depth: Maintaining a Cable Architecture

1. Introduction

1. Introduction The global information grid offers enormous opportunities with endless challenges In the information assurance process, the network security function guards against threats to electronic communication Network security: protects electronic communication from unauthorized: Modification Destruction Disclosure Ensures that an increasing number of diverse attacks do not harm the distributed critical information infrastructure Network security has a dual mission: It must ensure the accuracy of the data transmitted It must protect confidential information processed, stored on, and accessible from networks

1. Introduction The role of network security function is to ensure the components of the network: Operate correctly Satisfy design requirements The information transmitted retains its fundamental integrity We will not approach network security as a technical assurance function in this chapter Instead, we will present network security from the perspective of how it fits within the information assurance process

2. Engineering the Network: Ensuring a Proper Design

2. Engineering the Network: Ensuring a Proper Design Physical infrastructure of networks is classified as: Network Intranet Extranet Internet Hardware-based Switches Hubs Cables Routers Software-based Connection control Transmission control To ensure security, security architects implement technological countermeasures such as firewalls, IDSs, and strong authentication

2. Engineering the Network: Ensuring a Proper Design 2.1. Connection Control 2.2. Enforcing Connection Control: The Firewall It establishes and regulates the relationship between a computer and a network It, also, ensures reliable transfer of messages between a sender and a receiver and performs some transmission error connection A firewall is essentially a filter dedicated to securing network connections Firewalls enforce access rights and protect the network from external systems Firewalls regulate access between trusted networks and un-trusted ones (Internet) Firewalls are high-level software that sit on the router end of the physical network Firewalls have to be able to distinguish between unsolicited traffic and inbound traffic requested by an internal user

2. Engineering the Network: Ensuring a Proper Design 2.3. Transmission Control It regulates the actual transmission process Transmission control ensures that the communication between two devices is flowing properly Effective transmission control supports the integrity and availability of network data

3. Defending Networks From Attacks

3. Defending Networks from Attacks A unique security problem with networks is their level of interconnectedness There are two broad categories of networks threats: Malicious code Malicious direct attack

3. Defending Networks from Attacks 3.1. Threats of Information: Malicious Code Malicious code is virulent Malicious code categories transmitted through network: Viruses: pieces of code attached to a host program to propagate or replicate when the host is executed Worms: a self-contained program capable of spreading copies of itself or its segments to other computer systems via network connections or e-mail attachments Denial of Service (DoS): prevent legitimate users from using their servers and networks because of the actions of the worm Logic bombs: destructive programs installed in a system by individuals and only activated by specified parameters Trojan horses: introduce harmful things under the guise of a useful program Spyware: propagates from websites, installs itself in a PC, then monitors the user’s computing habits and personal information, and it sends data to a third party Adware: opens a computer to ads delivered from the internet

3. Defending Networks from Attacks 3.2. Malicious Attacks The best way to counteract a network attack is to anticipate it and have the measures in place to either stop it or mitigate the harm Network attacks fall into seven general categories: Password attacks Insider attacks Sniffing IP spoofing Denial of service Man-in-the-middle attacks Application layer attacks

3. Defending Networks from Attacks Automated policy managers are effective tools for defending organizations from unauthorized access They provide the ability to filter network transactions through custom policies They provide an effective way to monitor a large number of online transactions that cross a network They control the distribution of unsuitable or offensive content and inappropriate activities They enable central control and efficient management of network access and use 3.3. The Role and Use of Policy Managers The major advantage of a policy manager is that it regulates the enterprise’s e-mail traffic

4. Cyber-Terrorism

1. Prepare and prevent 2. Detect and respond 3. Build strong foundations Security System Against cyber-terrorists 4. Cyber-Terrorism The goal of cyber-terrorism is to harm or control key computer systems or computer controls to achieve some indirect aim, such as: To destroy a power grid To take over a critical process Cyber-terrorist potential targets are: Power plants Nuclear facilities Water treatment plants Government agencies

5. Managing and Defending a Network

5. Managing and Defending a Network Just like any other processes, good management is an essential factor in defending a network 5.1. Network Security Management and Planning Effective network management processes are: Creating Usage Policy Statements In three steps: Specifies the proper use of each network component Tailors the rules for each component Defines the acceptable use policies (AUP) 2. Conduct Risk Analysis It is executed to identify the risks to a particular network, its equipment, resources, and data There are three levels of threats: Low-risk Medium-risk High-risk Also, it identifies the types of users and their privileges 3. Establish a security team Once the network security requirements are fully understood, the organization assembles and trains people reasonable for the actual implementation. They are NETSEC management team

5. Managing and Defending a Network 5.2. Network Defense in Depth: Maintaining a Cable Architecture Illustrated in figure 15 – 4 below:

Thanks for Listening Q’s & A’s Read more about it from >>>