Threats in Networks Jagdish S. Gangolly School of Business

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Computer Security and Penetration Testing
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
1 Reading Log Files. 2 Segment Format
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
CS 5950/6030 Network Security Class 28 (F, 11/4/05) Leszek Lilien Department of Computer Science Western Michigan University Based on Security in Computing.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Security in Networks— Their design, development, usage… Barbara Endicott-Popovsky CSSE592/491 In collaboration with: Deborah Frincke, Ph.D. Director, Center.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Chapter Threats in Networks Network Security / G. Steffen.
1 Figure 3-33: Internet Control Message Protocol (ICMP) ICMP is for Supervisory Messages at the Internet Layer ICMP and IP  An ICMP message is delivered.
Week 10 - Wednesday.  What did we talk about last time?  Network basics.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Security. Security Threats  Impersonation  Pretend to be someone else to gain access to information or services  Lack of secrecy  Eavesdrop on data.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 25 – Network Security.
1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
TCP/IP Vulnerabilities
CS426Network Security1 Computer Security CS 426 Network Security (1)
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
Protocol Headers 0x0800 Internet Protocol, Version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x8100 IEEE 802.1Q-tagged frame 0x86DD Internet Protocol,
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
Denial of Service Attacks
Security in Computing Security in Networks. I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity.
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Ingredients of Security
CSCE Farkas1 CSCE 522 Network Security. Reading Pfleeger and Pfleeger: Chapter 6 CSCE Farkas2.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Security in network Outline Threats in network Network security controls Firewalls Intrusion detection system Secure Networks and Cryptography Example.
Internet Control Message Protocol (ICMP). ICMP Internet Control Message Protocol –IP is the delivery standard at the TCP/IP internet layer –ICMP is the.
Telecommunications Networking II Lecture 41d Denial-of-Service Attacks.
Week 9 - Wednesday.  What did we talk about last time?  Network basics.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Computer Security: Chapter 8 Network Security. Network characteristics Anonymity  ‘On the Internet, nobody knows you are a dog’ Automation  Done by.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Presentation on ip spoofing BY
AGENDA:  I.The Basics  II. Threats  III. Controls  IV.Tools Source: Pfleeger & Pfleeger.
1 Lecture A.2: Security Problems in TCP/IP r Reference: Security Problems in the TCP/IP Protocol Suite : by Steve Bellovin r R-services r Source-routing.
Introduction to Information Security
General Classes of TCP/IP Problems
Error and Control Messages in the Internet Protocol
Overview of Unix Jagdish S. Gangolly School of Business
Overview of Networking & Operating System Security
What Makes a Network Vulnerable?
Virtual Private Networks
سمینار آموزشی امنیت شبکه
Database Security Jagdish S. Gangolly School of Business
Security Modeling Jagdish S. Gangolly School of Business
IIT Indore © Neminath Hubballi
Presentation transcript:

Threats in Networks Jagdish S. Gangolly School of Business State University of New York at Albany NOTE: These notes are based on the book Security in Computing, by Charles & Shari Pfleeger, and are prepared solely for the students in the course Acc 661 at SUNY Albany. They are not to be used by others without the permission of the instructor. 1/11/2019 acc 661 Auditing of Adv Acctg Systems

acc 661 Auditing of Adv Acctg Systems Threats in Networks I Protocols (Guessing sequence numbers) Impersonation Authentication foiled by guessing Authentication thwarted by eavesdropping or wiretapping Authentication foiled by avoidance Nonexistent authentication (trusted hosts: .rlogin, .rhosts) Well-known authentication (default passwords) Trusted authentication 1/11/2019 acc 661 Auditing of Adv Acctg Systems

acc 661 Auditing of Adv Acctg Systems Threats in Networks II Spoofing Masquerade Session hijacking Man-in-the-middle attack Message confidentiality threats Misdelivery Exposure Traffic flow analysis 1/11/2019 acc 661 Auditing of Adv Acctg Systems

Threats in Networks III Message integrity threats Falsification of messages Website defacement Buffer overflows Dot-Dot and address problems Application code errors (users can change context encoded in URL request) Server-side includes 1/11/2019 acc 661 Auditing of Adv Acctg Systems

Threats in Networks III Denial of service Transmission failure Connection flooding ICMP protocols (ping, echo, destination unreachable, source quench) Smurf attack Syn flood (spoof return address in initial SYN packet, and not responding with ACKs, thus flooding SYN-RECV queue) 1/11/2019 acc 661 Auditing of Adv Acctg Systems