Security Fundamentals

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Threats To A Computer Network
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
APA of Isfahan University of Technology In the name of God.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.
PART THREE E-commerce in Action Norton University E-commerce in Action.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Viruses & Destructive Programs
Software Security Testing Vinay Srinivasan cell:
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Network security Vlasov Illia
TOPIC: HTTPS (Security protocol)
Network Security (the Internet Security)
Chapter 7: Identifying Advanced Attacks
IT Security  .
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 5 Electronic Commerce | Security
Phishing is a form of social engineering that attempts to steal sensitive information.
Information and Network Security
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Teaching Computing to GCSE
Security in Networking
Risk of the Internet At Home
Packet Sniffing.
Network Security: IP Spoofing and Firewall
Chapter 5 Electronic Commerce | Security
What Makes a Network Vulnerable?
HOW DO I KEEP MY COMPUTER SAFE?
Lecture 3: Secure Network Architecture
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
The Internet and Electronic mail
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security Fundamentals Module 2 unit 1 Security Fundamentals

Security basics Confidentiality – keeping data private Allowing only authorized users to access private files. Integrity – any data that is sent between users must have a guarantee that the data has not been tampered with during transmission. Authentication – all systems should prove the identity of users Associate users with a valid account by requesting that they provide data unique to each user

Non-repudiation – once the data has been sent, the sender must not be able to deny sending the data. Ant-replay – this stops users from resending data in an effort to pretend that they are someone else.

Social engineering The use of social tricks or psychology to gain access to secured systems. The goal is to trick people into revealing passwords and other information.

Phishing and pharming  Phishing involves getting a user to enter personal information via a fake website. Paypal Ebay yahoo Pharming involves modifying DNS entries, which causes users to be directed to the wrong website when they visit a certain Web address.

Mitigating Social Engineering What makes attacks effective? Authority Intimidation Consensus / social proof Scarcity Urgency Familiarity / liking Trust What makes attacks ineffective? Policy and standard procedures Education and training Accounting (auditing and surveillance)

Malware Malware A general term for any type of unwanted software that does mischief or permanent damage to your computer. Malware is created by people to intentionally do mischief of damage to your computer Worms A piece of computer code that is able to send itself to many computers by taking control of a computers ability to transport files and information. They get into your computer via email.

Trojans and Spyware Trojans get into your computer via a program then damage and destroy programs and files. Spyware downloads into your computer without you knowing that. It can collect personal information about you such as passwords, credit card numbers and web sites you visit, and transmit this to a third party. It can also change the configuration of your computer, or put advertisements on your computer.

Adware – software that displays banners or pop- up ads on your computer. It downloads to your computer when you access certain internet sites, or when you agree to download it when using certain freeware or shareware.

Antivirus software Software that detects viruses coming into your computer and attempts to get rid of them.

Network Reconnaissance Reconnaissance attack is a kind of information gathering on network system and services. This enables the attacker to discover vulnerabilities or weaknesses on the network. Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities. 

Footprinting Footprinting - Process of collecting information about an organization, its network, its IP address ranges and the people who use them Footprinting is conducted through social engineering and by researching information from printed resources From online resources Footprinting tools/techniques Performing web reconnaissance DNS interrogation

Eavesdropping Network Eavesdropping or network sniffing is a network layer attack consisting of capturing packets from the network transmitted by others' computers and reading the data content in search of sensitive information like passwords, session tokens, or any kind of confidential information. The attack could be done using tools called network sniffers. These tools collect packets on the network and, depending on the quality of the tool, analyse the collected data like protocol decoders or stream reassembling

Man-in-the-Middle The man-in-the middle attack intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server. Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.

Man-in-the-Middle

Denial of Service A denial-of-service (DoS) or distributed denial- of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet

Exploits Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerized). Such behaviour frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of- service attack.

Management Create a management and inspection plan Log and document management / maintenance / system reconfiguration activities

Incident Response Procedures and guidelines for dealing with security incidents Different goals Re-establish a secure working system Preserve evidence of the incident with the aim of prosecuting the perpetrators Prevent reoccurrence of the incident National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide Preparation Detection and Analysis Containment, Eradication, and Recovery Post-incident Activity

Patch Management Updates, patches, hotfixes, and service packs Update policies Windows Automatic Updates Windows / Office / Microsoft Update Linux / Mac OS downloadable updates Application updates Firmware

Training / Education