Security+ Guide to Network Security Fundamentals, Third Edition

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Unit 18 Data Security 1.
Security Awareness Chapter 2 Desktop Security. Objectives After completing this chapter, you should be able to do the following: Describe the different.
Security Awareness Chapter 2 Desktop Security. After completing this chapter, you should be able to do the following:  Describe the different types of.
Computer Viruses.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Security+ Guide to Network Security Fundamentals, Third Edition
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Desktop Security After completing this lesson, you should be able to do the following: Describe the different types of software and hardware attacks List.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
For any query mail to or BITS Pilani Lecture # 1.
Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Malicious Software.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
System Threats and Risks Niken D Cahyani Gandeva Bayu Satrya Telkom Institute of Technology.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Computer Technology Notes 5
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks

Objectives Describe the different types of software-based attacks List types of hardware attacks Define virtualization and explain how attackers are targeting virtual systems Security+ Guide to Network Security Fundamentals, Third Edition

Software-Based Attacks Malicious software, or malware Software that enters a computer system without the owner’s knowledge or consent Malware is a general term that refers to a wide variety of damaging or annoying software The three primary objectives of malware To infect a computer system Conceal the malware’s malicious actions Bring profit from the actions that it performs Security+ Guide to Network Security Fundamentals, Third Edition

Infecting Malware Viruses Programs that secretly attach to another document or program and execute when that document or program is opened Once a virus infects a computer, it performs two separate tasks Replicates itself by spreading to other computers Activates its malicious payload Cause problems ranging from displaying an annoying message to erasing files from a hard drive or causing a computer to crash repeatedly Security+ Guide to Network Security Fundamentals, Third Edition

Infecting Malware (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Infecting Malware (continued) Types of computer viruses File infector virus Resident virus Boot virus Companion virus Macro virus Metamorphic viruses Avoid detection by altering how they appear Polymorphic viruses Also encrypt their content differently each time Security+ Guide to Network Security Fundamentals, Third Edition

Infecting Malware (continued) Worm Program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system Worms are different from viruses in two regards: A worm can travel by itself A worm does not require any user action to begin its execution Actions that worms have performed: deleting files on the computer; allowing the computer to be remote-controlled by an attacker Security+ Guide to Network Security Fundamentals, Third Edition

Concealing Malware Trojan Horse (or just Trojan) Rootkit Program advertised as performing one activity that but actually does something else Trojan horse programs are typically executable programs that contain hidden code that attack the computer system Rootkit A set of software tools used by an intruder to break into a computer, obtain special privileges to perform unauthorized functions, and then hide all traces of its existence Security+ Guide to Network Security Fundamentals, Third Edition

Concealing Malware (continued) Rootkit (continued) The rootkit’s goal is to hide the presence of other types of malicious software Rootkits function by replacing operating system commands with modified versions That are specifically designed to ignore malicious activity so it can escape detection Detecting a rootkit can be difficult Removing a rootkit from an infected computer is extremely difficult You need to reformat the hard drive and reinstall the operating system Security+ Guide to Network Security Fundamentals, Third Edition

Concealing Malware (continued) Logic bomb A computer program or a part of a program that lies dormant until it is triggered by a specific logical event Once triggered, the program can perform any number of malicious activities Logic bombs are extremely difficult to detect before they are triggered Privilege escalation Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Concealing Malware (continued) Types of privilege escalation When a user with a lower privilege uses privilege escalation to access functions reserved for higher privilege users When a user with restricted privileges accesses the different restricted functions of a similar user Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit Spam Unsolicited e-mail Sending spam is a lucrative business Costs involved for spamming: E-mail addresses Equipment and Internet connection Text-based spam messages can easily by trapped by special filters Image spam uses graphical images of text in order to circumvent text-based filters Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Other techniques used by spammers include: GIF layering Word splitting Geometric variance Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Image spam cannot be easily filtered based on the content of the message To detect image spam, one approach is to examine the context of the message and create a profile, asking questions such as: Who sent the message? What is known about the sender? Where does the user go if she responds to this e-mail? What is the nature of the message content? How is the message technically constructed? Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Spyware A general term used for describing software that imposes upon a user’s privacy or security Antispyware Coalition defines spyware as: Technologies that are deployed without the user’s consent and impair the user’s control over: Use of their system resources, including what programs are installed on their computers Collection, use, and distribution of their personal or other sensitive information Material changes that affect their user experience, privacy, or system security Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Spyware has two characteristics that make it very dangerous Spyware creators are motivated by profit Spyware is often more intrusive than viruses, harder to detect, and more difficult to remove Spyware is not always easy to identify Spyware is very widespread Although attackers use several different spyware tools The two most common are adware and keyloggers Security+ Guide to Network Security Fundamentals

Malware for Profit (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Adware A software program that delivers advertising content in a manner that is unexpected and unwanted by the user Adware can be a security risk Many adware programs perform a tracking function Monitors and tracks a user’s activities Sends a log of these activities to third parties without the user’s authorization or knowledge Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Keylogger A small hardware device or a program that monitors each keystroke a user types on the computer’s keyboard As the user types, the keystrokes are collected and saved as text As a hardware device, a keylogger is a small device inserted between the keyboard connector and computer keyboard port Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Software keyloggers Programs that silently capture all keystrokes, including passwords and sensitive information Hide themselves so that they cannot be easily detected even if a user is searching for them Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Botnets When hundreds, thousands, or even tens of thousands of zombie computers are under the control of an attacker Zombie An infected computer with a program that will allow the attacker to remotely control it Attackers use Internet Relay Chat (IRC) to remotely control the zombies Attacker is knows as a bot herder Security+ Guide to Network Security Fundamentals, Third Edition

Malware for Profit (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Hardware-Based Attacks Hardware that often is the target of attacks includes the BIOS, USB devices, network attached storage, and even cell phones Security+ Guide to Network Security Fundamentals, Third Edition

BIOS Basic Input/Output System (BIOS) A coded program embedded on the processor chip that recognizes and controls different devices on the computer system Executed when the computer system is first turned on and provides low-level access to the hard disk, video, and keyboard On older computer systems the BIOS was a Read Only Memory (ROM) chip Today’s computer systems have a PROM (Programmable Read Only Memory) chip Security+ Guide to Network Security Fundamentals, Third Edition

BIOS (continued) Because it can be flashed, the BIOS can be the object of attacks One virus overwrites the contents of the BIOS and the first part of the hard disk drive, rendering the computer completely dead An attacker could infect a computer with a virus and then flash the BIOS to install a rootkit on the BIOS Security+ Guide to Network Security Fundamentals, Third Edition

USB Devices USB devices use flash memory Flash memory is a type of EEPROM, nonvolatile computer memory that can be electrically erased and rewritten repeatedly USB devices are widely used to spread malware Also, USB devices allow spies or disgruntled employees to copy and steal sensitive corporate data In addition, data stored on USB devices can be lost or fall into the wrong hands Security+ Guide to Network Security Fundamentals, Third Edition

USB Devices (continued) To reduce the risk introduced by USB devices: Disable the USB in hardware Disable the USB through the operating system Use third-party software Security+ Guide to Network Security Fundamentals, Third Edition

Network Attached Storage (NAS) Storage Area Network (SAN) Specialized high-speed network for attaching servers to storage devices SAN can be shared between servers and can be local or extended over geographical distances Network Attached Storage (NAS) Another type of network storage Single, dedicated hard disk-based file storage device that provides centralized and consolidated disk storage available to LAN users through a standard network connection Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Network Attached Storage (NAS) (continued) Advantages to using NAS devices on a network Offer the ability to easily expand storage requirements Allow for the consolidation of storage The operating system on NAS devices can be either a standard operating system, a proprietary operating system, or a “stripped-down” operating system with many of the standard features omitted NAS security is implemented through the standard operating system security features Security+ Guide to Network Security Fundamentals, Third Edition

Cell Phones Cellular telephones (cell phones) Portable communication devices that function in a manner that is unlike wired telephones Two keys to cellular telephone networks Coverage area is divided into smaller individual sections called cells All of the transmitters and cell phones operate at a low power level Security+ Guide to Network Security Fundamentals, Third Edition

Cell Phones (continued) Almost all cell phones today have the ability to send and receive text messages and connect to the Internet Types of attacks Lure users to malicious Web sites Infect a cell phone Launch attacks on other cell phones Access account information Abuse the cell phone service Security+ Guide to Network Security Fundamentals, Third Edition

Attacks on Virtualized Systems Just as attacks can be software-based or hardware-based, attacks can also target software that is emulating hardware This type of software, known as virtualization, is becoming one of the prime targets of attackers Security+ Guide to Network Security Fundamentals, Third Edition

What Is Virtualization? A means of managing and presenting computer resources by function without regard to their physical layout or location Operating system virtualization A virtual machine is simulated as a self-contained software environment by the host system but appears as a guest system Server virtualization Creating and managing multiple server operating systems Security+ Guide to Network Security Fundamentals, Third Edition

What Is Virtualization? (continued) Security+ Guide to Network Security Fundamentals, Third Edition

What Is Virtualization? (continued) One of the factors driving the adoption of virtualization is the cost of energy Operating system virtualization is playing an increasingly important role in security Has allowed increased flexibility in launching attacks Is also being used to make systems more secure Security+ Guide to Network Security Fundamentals, Third Edition

Attacks on Virtual Systems Virtualization provides the ability to run multiple virtual computers on one physical computer Virtualization can also be beneficial in providing uninterrupted server access to users By means of live migration and load balancing Security+ Guide to Network Security Fundamentals, Third Edition

Attacks on Virtual Systems (continued) Security for virtualized environments can be a concern for two reasons Existing security tools were designed for single physical servers and do not always adapt well to multiple virtual machines Virtual machines not only need to be protected from the outside world, but they also need to be protected from other virtual machines on the same physical computer Security+ Guide to Network Security Fundamentals, Third Edition

Attacks on Virtual Systems (continued) Hypervisor Software that runs on a physical computer and manages one or more virtual machine operating systems Can contain security code that would allow the hypervisor to provide security by default to all virtual machines Another option is for security software to function as a separate program that is “plugged in” to the hypervisor Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Attacks on Virtual Systems (continued) Another approach is running security software, such as a firewall and intrusion detection system As a specialized security virtual machine on the physical machine Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Summary Malicious software (malware) is software that enters a computer system without the owner’s knowledge or consent Infecting malware includes computer viruses and worms Ways to conceal malware include Trojan horses (Trojans), rootkits, logic bombs, and privilege escalation Malware with a profit motive includes spam, spyware, and botnets Security+ Guide to Network Security Fundamentals, Third Edition

Summary (continued) Hardware is also the target of attackers. Frequent hardware targets include the BIOS, USB storage devices, Network Attached Storage (NAS) devices, and cell phones Virtualization is a means of managing and presenting computer resources by function without regard to their physical layout or location Security+ Guide to Network Security Fundamentals, Third Edition