Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Computer Security and Penetration Testing
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Security+ All-In-One Edition Chapter 13 – Specific Attacks Brian E. Brzezicki.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Higher Computing Topic 8: Supporting Software Updated
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 4 Network Vulnerabilities and Attacks.
Malicious Software.
Computer Skills and Applications Computer Security.
Ingredients of Security
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
DoS/DDoS attack and defense
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter 7: Identifying Advanced Attacks
IT Security  .
Instructor Materials Chapter 7 Network Security
Attacks and Malicious Code
Security Fundamentals
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Computer Applications Unit B
Presentation transcript:

Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC

Security+ Chapter 6 – Predicting and Mitigating Threats Brian E. Brzezicki

Malware (291) malware – mal (bad) ware (software) Software you would NEVER intentionally install or execute on your computer. Type of malware we will discuss Viruses Worms Trojans Logic Bombs Rootkits Spyware

Virus

Virus Characteristics (291) Code that attaches itself to other VALID software Harmful code gets run when you run the valid application When run viri generally replicates into other software on the system, infecting it with the virus. Virus usually also takes some unwanted actions when the host application is executed. Viruses have signatures (the bad code) that can be searched for and detected.

Virus replication Methods (292) Infected removable media – Floppies – USB drives – Even some published software on CDROM Downloaded software Network Shares

Virus Hoaxes What is a hoax? How can a hoax cause damage? What is the best countermeasure for hoaxes?

Worms (295) Worms – work differently than viruses Self-propagate Do damage Counter measures Remove un-necessary services Patch OS and applications Beware of code sent in

Trojan Horses

Trojan (296) Like the Trojan Horse of greek Mythology a Trojan program seems like a “gift”. Disguised as a useful program. It might even might do something useful to keep up the disguise. But will cause you harm. Countermeasures User Education Don’t run software that you are not familiar with and that you don’t have “real distribution” media for. Software Digital Signing Anti-virus software to detect known Trojans

Logic Bombs (296) Logic Bomb – Code or applications embedded into a system that waits for a specific time or event then goes off doing some type of damage. Countermeasures Inventory all software and keep checksums. Tripwire is a popular program that provides file integrity verification.

Rootkits (297) Software installed on a system to hide the presence of an attacker. Can consist of Replaced system software Loadable kernel modules

Adware and Spyware (298) Adware - Software put on a system that tracks a users usage, may cause pop ups to occur. Spyware – Dangerous software that is install on a system to have much more malicious impact. keystroke loggers are a very dangerous type of spyware.

Protection against Malware User Education File Integrity Verification Software Signing Anti-Virus software – Signature Based – Heuristic Anti Spyware software – Lavasoft’s Ad-aware – Windows Defender – Spybot – Spybot Search and Destroy

Attacks

Privilege Escalation (n/b) Once you have “user” access to a system trying to use system tools and programs in ways that allow you to raise your privileges beyond your normal access levels. Buffer Overflows

Denial of Service Attacks

Ping of Death (n/b) Old bug in Microsoft TCP/IP stack that caused a computer to “blue screen” / crash when an oversized ping packet was received. Even though the bug was fixed in re-appeared on later versions of Windows.

SYN Flood

SYN Flood (302) Attack – Forge IP SYN packet from downed system – Server responds to fake downed address, which never responds – Connections are “half-open” and use up limited listen queue slots – Stops real new connections from establishing

SYN Flood (302) Countermeasures Stop forged packets at ingress/egress routers Patch OS Decrease 3 way handshake timeout values Increase 3 way handshake max connections Use a firewall as a middleman Set registry settings \HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\SynAttack Protect = 1 \HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\TcpMaxCo nnectResponseRetransmissions >= 2 Mor information regarding SYN flood registry settings at

Smurf Attack (303)

How would a Smurf attack someone? (see next slide) 1.Find site to attack, say 2.Forge Ping packet from to a BROADCAST network addresswww.ebay.com 3.Watch as the computers on the network all start pinging back Countermeasures Drop forged packets at routers Drop directed broadcasts Drop pings to broadcast addresses

Smurf Attack (303)

Tear Drop (n/b)

Distributed Denial of Service

DDoS (304) Distributed Denial of Service – Overwhelm the victim by sheer numbers. Take over computers (bots/zombies) Build a command and control network using masters and slaves. – Often using IRC or other pubic services Control hundreds or thousands of computers and attack another.

DDoS (304)

Spoofing (304) One entity pretends to be another IP spoofing spoofing

Man in the Middle (307)

Replay Attacks (308) Capturing authentication or session credentials and resending them to gain access. Countermeasures Do not allow credentials to be reused – Time stamps – Counters

TCP/IP Hijacking (309) When you cannot steal someone elses passwords or break into a system, steal someone elses connection. 1.Wait for a user to authenticate 2.Determine sequence numbers 3.Knock valid user off network 4.Steal their authenticated connection

ARP poisoning (309) ARP poisoning is an attack against a network, where one computer sends a fake ARP reply, in the attempt to trick another computer on the same network to communicate with it instead of the real machine. This can be used as a man in the middle attack, or a straight hijacking attack.

DNS Poisoning (n/b) Faking DNS responses in order to trick a computer into going to an attackers site rather than a real site. Example. If I can “poison” your DNS cache and redirect to my IP address, I could put up a fake site and steal your banking information! (or setup a MiM attack)

Reconnaissance (310) Learning as much as you can about your target you plan on attacking. This is the first step in the hacking process. IP address identification DNS probing PING scanning OS fingerprinting Port Scanning Vulnerability identification

Null Sessions (311) In early versions of Windows, un-authenticated users could “browse” the network to see what resources existed on the network. This browsing made use of “Null Sessions” which are network connections allowed without any type of authentication. Hackers can use Null Sessions and browsing to learn about the network and Null sessions should be disabled or limited in their functionality. To fight NULL sessions on windows HKLM\SYSTEM\CurrentControlSet\Control\LSA\RestrictAnonymous = 1 See

Domain Name Tasting and Kiting Tasting – registering a domain for 5 days for “free” Kiting – deleting the domain in the 5 day grace period then re-registering it

Social Engineering (314 – 318) Trying to trick people into giving you access to a system. Phishing Piggybacking/tailgating Impersonation Dumpster Diving Shoulder Surfing

Importance of User Education (318) No security program can be successful if the users are not properly trained on security issues and procedures. Some attacks such as social engineering attacks are best defended by education rather than technical means. Some methods of user education are Training Classes Login banners Centralized /information dispersal Policies and procedures