Information Security & Privacy November 13, 2014.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Threats To A Computer Network
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
1 Final Exam Review (Part 2) BUS Abdou Illia, Fall 2007 (Thursday 12/6/2007)
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (March 2, 2015)
C8- Securing Information Systems
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Targeted Break-in, DoS, & Malware attacks (II) (February ) © Abdou Illia – Spring 2015.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 14, Thursday 4/12/2007) (Week 15, Monday 4/16/2007)
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer Security By Duncan Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Operating Systems Services provided on internet
Instructor Materials Chapter 7 Network Security
Answer the questions to reveal the blocks and guess the picture.
Protect Your Computer Against Harmful Attacks!
SECURING INFORMATION SYSTEMS
Targeted Break-in, DoS, & Malware attacks (I)
Information Security & Privacy
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
AbbottLink™ - IP Address Overview
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Information Security & Privacy November 13, 2014

LEARNING GOALS Understand security attacks’ preps Discuss the major threats to information systems Discuss protection systems 2

The Security Problem 2013 FBI Computer Crime and Security Survey – 90% of large companies and government agencies reported computer security breach – 80% reported sizeable financial loss – Only 40% indicated security attacks came from outside the company – 85% reported as victim of computer virus 3

TCP/IP-based Communications Requesting a web page from eiu.edu: Web browser Formatting Prg. Packet Creator Signal Generator Get index.php in default folder from eiu.edu Transmission media From: :1234 To: : ……. Computer 1 ( User PC ) Computer 2 (web server) 4

TCP/IP Packet TCP/IP Packets or computer messages have two parts: – Communications protocols – Actual message to be delivered Source IP Address: Source Program: Web Browser 1234 Destination IP Address: Destination Program: Server Program 80 Formatting scheme: ASCII Source IP Address: Source Program: Web Browser 1234 Destination IP Address: Destination Program: Server Program 80 Formatting scheme: ASCII Get index.php From: server eiu.edu Location: Home directory Get index.php From: server eiu.edu Location: Home directory Protocols tell the receiving computer: - Sender’s ID - How to read the message Message to be delivered 5

Received: from hotmail.com (bay103-f21.bay103.hotmail.com [ ]) by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC for ; Wed, 18 Feb :14: (CST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Wed, 18 Feb :14: Message-ID: Received: from by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 19 Feb :14:58 GMT X-Originating-IP: [ ] X-Originating- X-Sender: In-Reply-To: X-PH: From: To: X-ASG-Orig-Subj: RE: FW: Same cell# Subject: RE: FW: Same cell# Date: Thu, 19 Feb :14: Mime-Version: 1.0 Content-Type: text/plain; format=flowed X-OriginalArrivalTime: 19 Feb :14: (UTC) FILETIME=[DCA31D60:01C62D0D] X-Virus-Scanned: by Barracuda Spam Firewall at eiu.edu X-Barracuda-Spam-Score: Hi, I just wanted to let you know that I have received the packet you sent. 6

Test Your TCP/IP knowledge You have received an from a potential business partner who pretends to be overseas. Which of the following could help determine the location of the computer he/she used to send the message? a) Check the domain name that appears in the sender’s address b) The destination IP address c) The Source IP address that appears in the communication protocols’ part of the From: To: Subject: meeting ____________________ Hi, I couldn’t make it to the meeting because I am overseas in business. 7

Attack strategy Scanning – Ping messages (To know if a potential target exist, is connected to the network, and is responsive) – Supervisory messages (To know if victim available) – Tracert, Traceroute (to know about the route that leads to target) – Check the Internet (e.g. for latest systems vulnerabilities Use Brute Force attack or Dictionary attack – Trying different usernames and passwords in an attempt to “break” a password and gain an unauthorized access. Use Social engineering strategy to get other information By tricking employees to provide passwords, keys and other info. over the telephone By phishing i.e. misleading people to provide confidential info through s, fake websites, etc. 8

Social engineering targeting EIU 9

Attack strategy (cont.) Examining Collected data – Users login names and password – IP addresses of potential victims – What programs are running on target computers Different programs have different weaknesses – Potential victim’s operating systems, version number, etc. Deciding types of attacks – Examples:  DoS attacks targeting computers with older operating systems  Content attacks using identified Open Mail servers & collected s  System intrusion on improperly configured servers Launch the attacks 10

Test Your Attacks Strategy Knowledge An attacker is preparing an attack. He got the IP address of a potential target. Which of the following could he use in order to determine whether or not the potential target exist, is connected to the network, and is maybe responsive? a)Do some scanning using the connected command b)Use the tracert command c)Do some scanning by sending ping messages to the target computer d)None of the above Which of the following has more chance of succeeding? a)An attack launched by a hacker using a computer that is not part of the target corporate network. b)An attack launched by a hacker using a computer that is part of the target corporate network. c)a and b have the same chance of succeeding 11

Major security threats Denial of Service (DoS) attacks The attacker makes a target (usually a server) crash in order to deny service to legitimate users Content attack Sending messages with illicit or malicious content System intrusion Getting unauthorized access to a network 12

Denial of Service (DoS) attacks There are two major types of DoS attacks Single-message DoS attacks Tear-Drop DoS attacks In Single-message DoS Target crashes upon receiving a single “deadly” attack message In Tear-Drop DoS The target slows down or crashes as a result of receiving more request messages than it can handle. 13

Tear Drop DoS Intentionally sending a stream of request messages to a target server in order to – Make the target run very slowly or crash Objective is to have the target deny service to legitimate users DoS messages Server Attacker Legitimate user Legitimate request

Single message attacks: Ping of Death Ping of Death attacks take advantage of – Some operating systems’ inability to handle packets larger than bytes Attacker sends request messages that are larger than 65,536 bytes (i.e. oversized packets) Most operating systems have been fixed to prevent this type of attack from occurring. – But attacks occurred recently on Win Server 2003 systems 15

Defense against DoS attacks Most DoS attack messages – Include protocol settings with fake IP addresses or program numbers that do not match the type of message Defense systems for protecting against DoS attacks are designed to check messages’ protocols part for fake or inconsistent settings. Could be Packet Firewalls Spoofing: using fake source IP address Program number not consistent with the message supposed to be delivered. Source IP Address: Source Program: Web Browser 1234 Destination IP Address: Destination Program: Server Program 80 Formatting scheme: ASCII Source IP Address: Source Program: Web Browser 1234 Destination IP Address: Destination Program: Server Program 80 Formatting scheme: ASCII Get index.php From: server eiu.edu Location: Home directory Get index.php From: server eiu.edu Location: Home directory 16

What is a Packet Firewall? A security system that “seats” between a corporate network and an external network. A firewall examines each message that is to enter or to leave the corporate network. A firewall decides: What messages can enter a network What messages can leave the network 1If incoming message has fake source IP address, Deny access 2If incoming message’s protocol values indicate a telnet request, Deny access 3If incoming message’s protocol values indicate a file transfer (FTP) request, Allow access 4If outgoing message’s protocol values indicate a request to a prohibited web site, Deny access

Test Your Attacks Knowledge An attacker has used a single computer to send a stream of attack messages to a server to the point that the server began to operate very slowly. Which of the following does the attacker attempt? a)An oversize attack b)A Worm attack c)A Denial-of-service attack d)A Ping-of-Death attack An attacker has sent a single oversized attack message to a server loaded with an old operating system. Upon receiving the oversized message, the server crashes. Which of the following happened? a)An oversize attack b)A Worm attack c)A Denial-of-service attack d)A Ping-of-Death attack 18

Content attacks Incoming messages with: – Malicious content (or malware) Viruses (infect files on a single computer) Worms (Propagate across system by themselves) Trojan horses (programs that appear to be benign, but do damage or take control of a target computer) – Illicit content Pornography Sexually or racially harassing s Spams (unsolicited commercial s) Q: Besides through s, how can a computer system be a victim of a virus, worm, or Trojan horse attack? 19

Trojan horse A computer program – That appears as a useful program like a game, a screen saver, etc. – But, is really a program designed to do damage or to open the door for a hacker to take control of the host computer When executed, a Trojan horse could – Format disks – Delete files – Allow a remote computer to take control of the host computer. This kind of Trojan is called Back Door. NetBus and SubSeven used to be attackers’ favorite programs for target remote control 20

Trojan horse NetBus Interface 21

Review Questions What is a type of malware that spreads itself, not just from file to file, but also from computer to computer? a)Computer virus b)Worm c)Trojan horse d)None of the above What is a malware that opens a way into the network for future attacks? a)Open Door b)Worm c)Back Door d)Trojan horse 22

Open Mail Server Most content attack messages are sent through Open Mail Servers – Improperly configured Mail Servers that accept fake outgoing addresses)

Open Mail Server Question: How can you protect a stand-alone computer or a network against malicious content attacks? 24

Protection against content attacks Antivirus controls – PC-based antivirus control – Network antivirus control Application Firewalls – Catch every incoming message to check for illicit content in the Message part – If illicit content detected, message is blocked Application Firewall Attacker Target Legitimate Message Checked Message Illicit Message Protocol PartMessage 25

System Intrusion System intrusion: Gaining unauthorized access to a computer system by an intruder A hacker is an intruder who breaks into a computer system without authorization. [supposedly] Not causing damage [supposedly] Not stealing information A cracker is an intruder who breaks into a computer system to cause damage and/or to steal information Script kiddies are young people with little programming skills who use publicly available software to breach into systems 26 See Hacker vs Cracker controversy at

Summary Questions BookNotes 1)Distinguish between Tear-drop and ping-of-death attacks. 2)What is an illicit content attack? What is the difference between a virus, a worm, and a Trojan horse? How could a stand-alone computer or a network be a victim of an illicit content attack? 3)What is an Open Mail server? How could you protect a stand- alone computer or a network against illicit content attacks? 4)What is a packet firewall? An application firewall? 5)What is meant by social engineering? Ping messages? 27