Introduction to Network Security © N. Ganesan, Ph.D.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Chapter 12 Network Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Chapter 4 Application Security Knowledge and Test Prep
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Introduction to Firewalls © N. Ganesan, Ph.D.. Overview.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Staying Safe Online Keep your Information Secure.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
PLUG IT IN SIX Protecting Your Information Assets.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Internet Security and Your Computer Welcome to Boot Camp.
Malicious Software.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security fundamentals Topic 9 Securing internet messaging.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction to Network Security. Acknowledgements.
Policies and Security for Internet Access
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Chapter 40 Internet Security.
IT Security  .
TECHNOLOGY GUIDE THREE
Networking for Home and Small Businesses – Chapter 8
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Introduction to Network Security © N. Ganesan, Ph.D.

Acknowledgements

Chapter Focus Introduction to computer security Overview of security threats Outline of security measures Summary

Understanding the Threats

Vulnerability Intentional attacks on computing resources and networks persist for a number of reasons Complexity of computer software and newly emerging hardware and software combinations make computer and the network susceptible to intrusion –It is difficult to thoroughly test an application for all possible intrusions

Security Threats 1. Trojan horse programs 2. Back door and remote administration programs 3. Denial of service 4. Being an intermediary for another attack 5. Unprotected Windows shares 6. Mobile code (Java, JavaScript, and ActiveX) 7. Cross-site scripting 8. spoofing 9. -borne viruses 10. Hidden file extensions 11. Chat clients 12. Packet sniffing Source: CERT

Trojan Horse Programs Trojan horses are programs that are installed without the knowledge of the user Trojan horse programs can perform a wide variety of covert talks such as modifying and deleting files, transmitting files to the intruder, installing programs, installing viruses and other Trojan horse programs etc.

Backdoor and Remote Administration Programs Covert installation of remote administration programs such as BackOrifice, Netbus and SubSeven Such programs give remote access to the computer from anywhere on the Internet

Intermediary for Other Attacks Client computer is used to launch mostly denial of service attacks on other computers An agent is usually installed using a Trojan horse program to launch the denial of service attack on other computers

Unprotected Windows Share Malicious code can be stored in protected Windows share for propagation

Mobile code (Java/JavaScript/ActiveX) Mobile codes in Java, JavaScript, and ActiveX can be executed by a web browser is generally useful, but it can also be used to run malicious code on the client computer. Disabling Java, JavaScript, and ActiveX from running in the Web browser must be considered when accessing websites that cannot be trusted received in HTML format is also susceptible to mobile code attack because it could also carry the mobile code

Cross-site Scripting A malicious script can be sent and stored by a web developer on a website to be downloaded by an unsuspecting surfer When this website is accessed by a user, the script is transferred to the local web browser Ways of acquiring malicious scripts include “following links in web pages, messages, or newsgroup, using interactive forms on an untrustworthy site, viewing online discussion groups, forums, or other dynamically generated pages where users can post text containing HTML tags” - CERT

Spoofing “spoofing” tricks the user in believing that the originated from a certain user such as an administrator although it actually originated from a hacker Such s may solicit personal information such as credit card details and passwords Examining the header may provide some additional information about the origin of the

Borne Viruses Malicious code is often distributed through as attachments Attachments must thus be opened with caution

Hidden File Extensions An attachment may have a hidden file extension –Such files may execute the attachment Examaple: – Downloader (MySis.avi.exe or QuickFlick.mpg.exe) – VBS/Timofonica (TIMOFONICA.TXT.vbs) – VBS/CoolNote (COOL_NOTEPAD_DEMO.TXT.vbs) – VBS/OnTheFly (AnnaKournikova.jpg.vbs) In the above files, the hidden extension is.vbs pertaining to an executable Visual Basic script

Chat Clients Internet chat applications such as instant messaging applications and Internet Relay Chat (IRC) involve the exchange of information including files that may contain malicious executable codes The same caution that applies to attachments apply here as well

Packet Sniffing Packet sniffer programs capture the contents of packets that may include passwords and other sensitive information that could later be used for compromising the client computer For example, a sniffer installed on a cable modem in one cable trunk may be able to sniff the password from other users on the same trunk Encryption of network traffic provides one of the defenses against sniffing

Providing Security

Reasons to Secure Computing and Network Resources Many businesses rely heavily on computers to operate critical business processes Individuals are using computers for tasks that required confidentiality Advent of Internet has provided a physical path of entry for every computer connected to the Internet –An always connected broadband connection is always vulnerable in this case

Providing Security Providing security requires action on two fronts, namely the management and the technical fronts respectively The management aspect relates to organizational policies and behavior that would address security threats and issues The technical aspect relates to the implementation of hardware and software to secure access to computing resources and the network

Management Aspect Best practice approach is to ensure secure behavior The above can be done by established guidelines for managing, addressing and rectifying security related issues

Technical Aspect Introduce security related hardware and software to secure access to computers and computing resources

Technical Approaches From an implementation point of view, the following are some of the steps that could be taken to provide security –Implement security patches and other updates pertaining to an operating system and other venerable software such as the Internet Explorer –Install self-monitoring an anti-virus, anti-spam and anti- hacker and pop-up blocker software –Install a firewalls –Use encryption wherever feasible All the approaches can be used to complement one another

Self-Monitoring Software and Security Patches Security patches are issued by mainly the OS vendor such as Microsoft to patch security holes as they are discovered Examples of self-monitoring software include anti-virus, spyware elimination, pop-up blocking, and anti-spam software Both the security patches and the self- monitoring software act at the local client level

Examples of Self-Monitoring Software Antivirus –Mcafee Spyware elimination Pop-up blocker Anti-Spam

Firewalls Firewalls are used for controlling access to the computing resources In general, it acts at the network level controlling network access to computing resources Firewalls can be implemented in software as well as in hardware

Encryption By encryption, the data can be made illegible to the intruder It can be implemented at the network level as well as the client level For example, locally stored data can be encrypted and the network traffic could equally well be encrypted

Some Applications of Encryption VPN PKI Digital Certificates

More on Security Techniques Firewalls and encryption will be discussed further in separate modules under the section entitled “Network Security”

Web References firewall.com firewall-net.com firewallguide.com msdn.microsoft.com winroute.com tinysoftware.com sunsite.unc.edu

References html ity/2.5.1http:// ity/

References s/hackers.htmlhttp:// s/hackers.html howto.htmlhttp:// howto.html round/Hacking/Methods/Technical/ round/Hacking/Methods/Technical/ /features4_battle_plans.shtmlhttp:// /features4_battle_plans.shtml Tim Rains Technical Lead Networking Teamhttp:// Tim Rains Technical Lead Networking Teamhttp:// Q310099, "Description of the Portqry.exe Command- Line Utility"Q310099

The End