Information Security & Privacy

Slides:



Advertisements
Similar presentations
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Advertisements

1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Threats To A Computer Network
Information Security & Privacy November 13, 2014.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
1 Final Exam Review (Part 2) BUS Abdou Illia, Fall 2007 (Thursday 12/6/2007)
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 14, Thursday 4/12/2007) (Week 15, Monday 4/16/2007)
Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Types of Electronic Infection
Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Malicious Software.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Network System Security - Task 2. Russell Johnston.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Security Risks Todays Lesson Security Risks Security Precautions
TMG Client Protection 6NPS – Session 7.
IT Security  .
Instructor Materials Chapter 7 Network Security
CHAPTER 6 – BASIC SECURITY
Troubleshooting IP Communications
Answer the questions to reveal the blocks and guess the picture.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Security in Networking
NET 311 Information Security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
SECURING INFORMATION SYSTEMS
Targeted Break-in, DoS, & Malware attacks (I)
ISNE101 Dr. Ken Cosh Week 13.
What Makes a Network Vulnerable?
The Internet School of Business Eastern Illinois University
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
AbbottLink™ - IP Address Overview
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Securing Information Systems
Computer Security By: Muhammed Anwar.
WJEC GCSE Computer Science
Technology Mrs. Huddleston
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Information Security & Privacy April 20, 2016

LEARNING GOALS Understand security attacks’ preps Discuss the major threats to information systems 2

The Security Problem 2013 FBI Computer Crime and Security Survey 90% of large companies and government agencies reported computer security breach 80% reported sizeable financial loss Only 40% indicated security attacks came from outside the company 85% reported as victim of computer virus 3

TCP/IP-based Communications Requesting a web page from eiu.edu: http://www.eiu.edu Computer 1 (User PC) Web browser Get index.php in default folder from eiu.edu Formatting Prg. 010100100010000010001000100100010010 Packet Creator From: 123.12.2.1:1234 To: 139.67.14.54:80 010100100010000……. Signal Generator Computer 2 (web server) Transmission media 4

TCP/IP Packet TCP/IP Packets or computer messages have two parts: Communications protocols Actual message to be delivered Source IP Address: 123.12.2.1 Source Program: Web Browser 1234 Destination IP Address: 139.67.14.54 Destination Program: Server Program 80 Formatting scheme: ASCII Get index.php From: server eiu.edu Location: Home directory Message to be delivered Protocols tell the receiving computer: - Sender’s ID - How to read the message 5

Received: from hotmail. com (bay103-f21. bay103. hotmail. com [65. 54 Received: from hotmail.com (bay103-f21.bay103.hotmail.com [65.54.174.31])      by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC      for <aillia@eiu.edu>; Wed, 18 Feb 2009 18:14:59 -0600 (CST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;      Wed, 18 Feb 2009 16:14:58 -0800 Message-ID: <BAY103-F2195A2F82610991D56FEC0B1030@phx.gbl> Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP;      Thu, 19 Feb 2009 00:14:58 GMT X-Originating-IP: [192.30.202.14] X-Originating-Email: [macolas@hotmail.com] X-Sender: macolas@hotmail.com In-Reply-To: <10E30E5174081747AF9452F4411465410C5BB560@excma01.cmamdm.enterprise.corp> X-PH: V4.4@ux1 From: <macolas@hotmail.com> To: aillia@eiu.edu X-ASG-Orig-Subj: RE: FW: Same cell# Subject: RE: FW: Same cell# Date: Thu, 19 Feb 2009 00:14:58 +0000 Mime-Version: 1.0 Content-Type: text/plain; format=flowed X-OriginalArrivalTime: 19 Feb 2009 00:14:58.0614 (UTC) FILETIME=[DCA31D60:01C62D0D] X-Virus-Scanned: by Barracuda Spam Firewall at eiu.edu X-Barracuda-Spam-Score: 0.00 Hi, I just wanted to let you know that I have received the packet you sent. 6

Test Your TCP/IP knowledge You have received an email from a potential business partner who pretends to be overseas. Which of the following could help determine the location of the computer he/she used to send the message? Check the domain name that appears after @ in the sender’s email address The destination IP address The Source IP address that appears in the communication protocols’ part of the email From: rlking@gmail.com To: tewilliams@eiu.edu Subject: meeting ____________________ Hi, I couldn’t make it to the meeting because I am overseas in business. 7

Attack strategy Scanning Password Guessing Ping messages (To know if a potential target exist, is connected to the network, and is responsive) Supervisory messages (To know if victim available) Tracert, Traceroute (to know about the route that leads to target) Check the Internet (e.g. www.cert.org) for latest systems vulnerabilities Password Guessing Trying different usernames and passwords in an attempt to “break” a password and gain an unauthorized access. Password Guessing, Dictionary attack, Brute Force attack Guessing passwords and stealing password file and using password cracking tools to break the password Use Social engineering strategy to get other information By tricking employees to provide passwords, keys and other info. over the telephone By phishing i.e. misleading people to provide confidential info through emails, fake websites, etc. 8

Test Your Attacks Strategy Knowledge An attacker is preparing an attack. He got the IP address of a potential target. Which of the following could he use in order to determine whether or not the potential target exist, is connected to the network, and is maybe responsive? Do some scanning using the connected command Use the tracert command Do some scanning by sending ping messages to the target computer None of the above Which of the following has more chance of succeeding? An attack launched by a hacker using a computer that is not part of the target corporate network. An attack launched by a hacker using a computer that is part of the target corporate network. a and b have the same chance of succeeding 9

Major security threats Denial of Service (DoS) attacks The attacker makes a target (usually a server) crash in order to deny service to legitimate users Content attack / Malware attack Sending messages with illicit or malicious content System intrusion Getting unauthorized access to a network 10

Content attacks / Malware attacks Incoming messages with: Malicious content (or malware) Viruses (infect files on a single computer) Worms (Propagate across system by themselves) Trojan horses (programs that appear to be benign, but do damage or take control of a target computer) Illicit content Pornography Sexually or racially harassing e-mails Spams (unsolicited commercial e-mails) Q: Besides through emails, how can a computer system be a victim of a virus, worm, or Trojan horse attack? 11

Trojan horse A computer program When executed, a Trojan horse could That appears as a useful program like a game, a screen saver, etc. But, is really a program designed to do damage or to open the door for a hacker to take control of the host computer When executed, a Trojan horse could Format disks Delete files Allow a remote computer to take control of the host computer. This kind of Trojan is called Back Door. NetBus and SubSeven used to be attackers’ favorite programs for target remote control 12

Trojan horse NetBus Interface 13

Review Questions What is a type of malware that spreads itself, not just from file to file, but also from computer to computer? Computer virus Worm Trojan horse None of the above What is a malware that opens a way into the network for future attacks? Open Door Back Door 14