1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Pertemuan 21 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 Pertemuan 3 Information at Risk Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 5 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 8 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Virtual Private Network
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Exploring the Network.
Introduction of Internet security Sui Wang IS300.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 10 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Understand Malware LESSON Security Fundamentals.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
Chapter 40 Internet Security.
Chapter 1: Exploring the Network
Pertemuan 16 Security Policies
Firewalls.
Securing Information Systems
Security in Networking
Forensics Week 12.
Faculty of Science IT Department By Raz Dara MA.
Security.
Computer Security By: Muhammed Anwar.
Presentation transcript:

1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat menjelaskan Points of Exposure

3 Outline Materi Web Security –History –The Threat Infection Install A Spreading Mechanism –Optional: Install or Modify Other Services Search for New Systems –Optional: Attack Other Systems –Business Implications –The Solutions

4 Network Vulnerabilities –Better Ways to Resolve Network Vulnerabilities –Protecting The ‘Trusted’ Network Key Security Vocabulary Explained

5 Web Security History The Threat –Infection –Install A Spreading Mechanism Optional: Install or Modify Other Services –Search for New Systems Optional: Attack Other Systems Business Implications The Solutions

6 History Security holes in business-critical software are a significant threat to organisations. However, vulnerabilities in Internet-related software can be disastrous. Ironically, Internet software was generally designed with security as a afterthought. Networks were largely considered to be either private and therefore physically secure or public and therefore inherently open.

7 The amount of private information transmitted across the Internet increases daily. It is now an integral part of most people’s lives, ranging from buying books at Amazon on a credit card through to making money transfers and payments via an online bank.

8 Potentially there are numerous reasons for the growth in security attacks; but one trend that in undeniable is the growth in the number and sophistication of hacking tools. Historically attackers required detailed understanding of the systems that they were attempting to compromise and performing an attack could be a time-consuming operation. There also was no source code available to read to find security vulnerabilities.

9 The Threat Today security is a bigger problem than ever before. The most dangerous forms of Internet worm are those that attack web servers. Unlike the average Internet connection, these systems have network connections with large amounts of bandwidth. After an infection, a worm can use the bandwidth to spread itself to other web servers.

10 Equally, the organisations operating the web server may base a large percentage of its revenue on traffic from its website and the site outage could cause a large- scale financial impact – not to mention the impact on customer confidence.

11 Infection Infection involves the worm sending a malicious request to a web server, trying to exploit a known security vulnerability. If the web server is vulnerable, the worm infects the machine, executes its payload and then continues to spread to other machines.

12 Install A Spreading Mechanism Once a Microsoft IIS server has been infected with a worm, the worm’s code can make use of software available on the system and, furthermore, even download additional software from other systems.

13 Optional: Install or Modify Other Services Some worms install backdoor services to give hackers access to machines. They are then able to control the system remotely and use it for future exploits, such as distributed denial of service attacks.

14 Search for New Systems In order to able to infect other systems every worm needs some form of reproduction mechanism. It needs to find new servers to which it can spread by investigating the addresses of potential targets.

15 Optional: Attack Other Systems Many worms have built-in attack routines.

16 Business Implications The web is a vital components of an organisation’s infrastructure.

17 The Solutions As with the security for your business premises, an intruder will always look for the easiest way in; if you can make it sufficiently secure then they will go elsewhere. Internet security is not a matter of installing one system but of looking at all the components in hour systems to see if they offer any holes. Installing systems that are secure in the first place obviously means less work than installing insecure ones and then trying to secure them.

18 Network Vulnerabilities Basic security tenets have changed very little over the past decade. Protecting the confidentiality of corporate information, preventing unauthorised access and defending against malicious or fraudulent attacks from external sources: these continue to be the major concerns of IT professionals today. To compound the threat posed by these developments, networks are also operating at much higher speeds.

19 Better Ways to Resolve Network Vulnerabilities The fundamental key to an effective security solution is a properly deployed network security device that increases security without jeopardising performance. To meet the many and varied threats already outlined, multi-functionslity within a single platform can ease network design and maximise effectiveness. Solid inter- operability with other security products, such as user authentication and anti-virus applications, will also prove invaluable.

20 Protecting The ‘Trusted’ Network Once a network security solution that addresses the fundamentals of performance and reliability is identified, it then has to be evaluated for its ability to provide pervasive internal protection.

21 A ‘virtual’ approach to establishing security zones is required to efficiently enable segmentation. Selecting security devices with virtual system capabilities can reduce the overall number of devices in a network and thereby streamline security management, reducing the total cost of ownership. With certain virtual system-enabled devices, different policies can be applied to different zones, depending on each department’s need for access to sensitive information, the type and number of employees, etc.

22 Key Security Vocabulary Explained VPNs Denial of service Firewall Intrusion prevention Trojan Horse Backdoor or U-turn attacks WLANs Virus

23 The End