January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS 4600 - © Abdou Illia.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Security, Privacy, and Ethics Online Computer Crimes.
Hands-On Ethical Hacking and Network Defense
Network Security Testing Techniques Presented By:- Sachin Vador.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Information Systems Security Computer System Life Cycle Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
IT security By Tilly Gerlack.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Note1 (Admi1) Overview of administering security.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Topic 5: Basic Security.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security By Duncan Hall.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Role Of Network IDS in Network Perimeter Defense.
Last revised A.A. Degree CNIT 120: Network Security Fundamentals of Network Security Preparation for Security+ Certification Essential for.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
PRESENTED BY : Bhupendra Singh
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Seminar On Ethical Hacking Submitted To: Submitted By:
Systems Security Keywords Protecting Systems
Lesson Objectives Aims You should be able to:
Answer the questions to reveal the blocks and guess the picture.
Cyber Crimes Chunlian QU 9/18/2018.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Hands-On Ethical Hacking and Network Defense
Penetration Testing Computer Science and Software Engineering
Presentation transcript:

January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia

Objectives 2  Describe the role of an ethical hacker  Describe what can an ethical hacker legally do  Describe what an ethical hacker cannot legally do

Hackers 3  Hackers  Access computer system or network without authorization  Have different motivations ( from prove their status to some damage )  Crackers  Break into systems to steal or destroy data  Script kiddies or packet monkeys  Young inexperienced hackers  Use publicly available hacking tools or copy codes and techniques from the Internet  For the U.S. Department of Justice they all break the law; can go to prison.

Hackers vs. Ethical Hackers 4  Ethical hacker  Performs most of the same activities as hackers and crackers, but with owner’s permission  Employed by companies to perform penetration or security tests  Red team  Team of ethical hackers with varied skills (social engineering, ethics/legal issues, break-ins, etc.)

Penetration test vs. Security test 5  Penetration test  Legally breaking into a company’s network to find its weaknesses  Tester only reports findings  Security test  More than a penetration test  Also includes:  Analyzing company’s security policy and procedures  Offering solutions to secure or protect the network Security Policy - Sets rules for expected behaviors by users (e.g. regular patches download, strong passwords, etc.), and IT personnel (e.g. no unauthorized access to users’ files, …), etc. - Defines access control rules. - Defines consequences of violations. -Helps track compliance with regulations. - Etc. Passwords must not be written down Access to files must be granted to the level required by users’ job

Hacking Tools 6  Referred to as Tiger box in course textbook  Collection of OSs and tools that assist with hacking  Network scanners  Traffic monitors  Keyloggers  Password crackers  Etc.  Practical Extraction and Report Language (Perl)  C programming language  Scripts, i.e. set of instructions that runs in sequence

Questions  Which of the following may be part of a penetration test (P) or a security test (S)? Use “X” to indicate your answer. PS 1.Breaking into a computer system without authorization. 2.Laying out specific actions to be taken in order to prevent dangerous packets to pass through firewalls. 3.Scanning a network in order to gather IP addresses of potential targets 4.Finding that patches are not timely applied as recommended by corporate rules. 5.Writing a report about a company’s security defense system. 6.Scanning a network in order to find out what defense tools are being used. 7.Finding that users cannot change their passwords themselves 8.Finding that a company does not have an effective password reset rule. 9.Finding out that a firewall does not block potentially dangerous packets 10Proposing a new procedure which implementation may help improve systems security 11Finding out that the administrator's account is called Admin and has a weak password 12Finding out that 1/3 of the security procedures are not actually implemented. 13Performing a denial-of service-attacks 14Disabling network defense systems 7

Penetration Testing Models 8  White box model  Tester is told everything about the network topology and technology  Tester is authorized to interview IT personnel and company employees  Makes tester’s job a little easier Note: some diagrams may show routers, firewalls, etc. White box Black box Gray box

Penetration Testing Models (cont.) 9  Black box model  Company staff does not know about the test  Tester is not given details about the network.  Burden is on the tester to find these details  Tests if security personnel are able to detect an attack  Question: What is the disadvantage of letting the company’s employees know about the penetration test? ________________________________________________  Question: What is the disadvantage of letting the IT staff know about the penetration test? ________________________________________________ White box Black box Gray box

Penetration Testing Models (cont.) 10  Gray box model  Hybrid of the white and black box models  Company gives tester partial information White box Black box Gray box

What You Can Do Legally 11  Laws involving technology change as rapidly as technology itself  Find what is legal for you locally  Laws change from place to place  Be aware of what is allowed and what is not allowed

Laws of the Land 12  Tools on your computer might be illegal to possess  Contact local law enforcement agencies before installing hacking tools  Governments are getting more serious about punishment for cybercrimes

Is Port Scanning Legal? 13  Some states deem it legal  Not always the case  Federal Government does not see it as a violation  Allows each state to address it separately  Read your ISP’s “Acceptable Use Policy”

Federal Laws Hands-On Ethical Hacking and Network Defense 14  Federal computer crime laws are getting more specific  Cover cybercrimes and intellectual property issues  Computer Hacking and Intellectual Property (CHIP)  New government branch to address cybercrimes and intellectual property issues

Hands-On Ethical Hacking and Network Defense 15

What You Cannot Do Legally Hands-On Ethical Hacking and Network Defense 16  Accessing a computer without permission is illegal  Other illegal actions  Installing worms or viruses  Denial of Service attacks  Denying users access to network resources  Be careful your actions do not prevent customers from doing their jobs

Get It in Writing 17  Using a contract is just good business  Contracts may be useful in court  Internet can also be a useful resource  Have an attorney read over your contract before sending or signing it

Ethical Hacking in a Nutshell 18  What it takes to be a security tester  Knowledge of network and computer technology  Ability to communicate with management and IT personnel  Understanding of the laws  Ability to use necessary tools

Summary Questions 19  What is the difference b/w penetration test and security test?  What is a packet monkey?  What three models are used for penetration tests?  What is a red team?  What portion of your ISP contract might affect your ability to conduct penetration tests over the Internet?  What is the name of the new government branch that handles cybercrimes and intellectual property issues?  Hacking tools are always illegal to posses. T F

Projects 20  Ask your local law enforcement agency which hacking activities are considered legal or “ethical” and when the same activities are considered crimes. Better yet, create your own list of hacking activities and ask specific questions about them.  Ask your ISP for its “Acceptable Use Policy” and read it. Write 1-2 paragraphs of your own interpretation of such a policy. What activities are you allowed to conduct? What activities you are not allowed to conduct?