Click to edit Master subtitle style

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Introduction to Security Computer Networks Computer Networks Term B10.
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Network and Server Attacks and Penetration Chapter 12.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Web server security Dr Jim Briggs WEBP security1.
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COEN 252: Computer Forensics Router Investigation.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
DENIAL OF SERVICE ATTACK
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Chapter Threats in Networks Network Security / G. Steffen.
Viruses & Destructive Programs
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 9 Sniffing.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Network Access and Security Chapter 13 – 15. Topics Security protocols –IPSec –L2TP –SSL –WEP –WPA –802.x Authentication Protocols Firewalls Proxy Services.
DoS/DDoS attack and defense
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Click to edit Master subtitle style Chapter 14: Network Threats and Mitigation.
Click to edit Master subtitle style Chapter 14: Network Threats and Mitigation.
Instructor Materials Chapter 7 Network Security
Managing Secure Network Systems
Wireless Network Security
Click to edit Master subtitle style
NET 311 Information Security
Network hardening Chapter 14.
6. Application Software Security
Presentation transcript:

Click to edit Master subtitle style Chapter 14: Network Threats and Mitigation Instructor: Click to edit Master subtitle style

Chapter 14 Objectives The Following CompTIA Network+ Exam Objectives Are Covered in This Chapter: 5.4 Explain common threats, vulnerabilities, and mitigation techniques. Wireless: War driving War chalking WEP cracking WPA cracking Evil twin Rogue access point 2

Chapter 14 Objectives (Cont) Attacks: DoS DDoS Man in the middle Social engineering Virus Worms Buffer overflow Packet sniffing FTP bounce Smurf Mitigation techniques: Training and awareness Patch management Policies and procedures Incident response 3

Recognizing Security Threats Viruses are common threats that we hear about all the time, but, there are many other nasty things out there as well. Bad guys who create threats to a network generally have one of two purposes in mind: destruction reconnaissance 4

Denial of Service (DoS) A denial of service (DoS) attack prevents users from accessing the network and/or its resources. DoS attacks come in a variety of flavors. The Ping of Death In a Ping of Death attack, a oversized ICMP packet is sent to the remote victim flooding the victim’s buffer and causing the system to reboot or hang helplessly. 5

Denial of Service (DoS) Smurf The attacker spoofs the intended victim’s IP address and then sends a large number of pings to IP broadcasts. The receiving router responds by delivering the broadcast to all hosts on the network, and all the hosts on the network respond to the victim with an IP echo reply all of them at the same time. 6

Denial of Service (DoS) SYN Flood In the SYN flood, the attacker send a SYN, the victim sends back a SYN/ACK, and the attacker leaves the victim waiting for the final ACK. While the server is waiting for the response, a small part of memory is reserved for it. As the SYNs continue to arrive, memory is gradually consumed. Any further incoming connections to the victimized device will be rejected. 7

Distributed Denial of Service (DDoS) Tribe Flood Network (TFN) Tribe Flood Network 2000 (TFN2K) More complex assaults which initiate synchronized DoS attacks from multiple sources and can target multiple devices. Uses Zombies to carry out the attack Called distributed denial of service (DDos) attacks. Make use of IP spoofing. 8

Viruses Viruses typically have catchy names like Chernobyl, Michelangelo, Melissa, I Love You, and Love Bug Receive a lot of media coverage as they proliferate and cause damage to a large number of people. Viruses are little programs causing a variety of bad things to happen on your computer ranging from merely annoying to totally devastating. They can display a message, delete files, or even send out huge amounts of meaningless data over a network to block legitimate messages. 9

Viruses A key trait of viruses is that they can’t replicate themselves to other computers or systems without a user doing something like opening an executable attachment in an email to propagate them. There are several different kinds of viruses, but the most popular ones are file viruses, macro (data file) viruses, and boot-sector viruses. 10

Viruses Multipartite Viruses A multipartite virus is one that affects both the boot sector and files on your computer, making such a virus particularly dangerous and exasperatingly difficult to remove. 11

Wireless Threats War Driving WEP Cracking WPA Cracking Rogue Access Points Evil Twin 12

Attackers and Their Tools IP Spoofing- process of sending packets with a fake source address Application-Layer Attacks Application-layer attacks focus on well-known holes in software that’s running on our servers. Active-X Attacks Attacks your computer through ActiveX and Java programs (applets). Autorooters Autorooters are a kind of hacker automaton. Hackers use something called a rootkit to probe, scan, and then capture data on a strategically positioned computer. Backdoors Backdoors are simply paths leading into a computer or network. Network Reconnaissance Attackers gather all the information they can about it, because the more they know about the network, the better they can compromise it. 13

Attackers and Their Tools Packet Sniffers A network adapter card is set to promiscuous mode so it will receive all packets from the network’s Physical layer to gather highly valuable sensitive data. Password Attacks Password attacks are used discover user passwords so the thief can pretend they’re a valid user and then access that user’s privileges and resources. Brute-Force Attacks A brute-force attack is another software-oriented attack that employs a program running on a targeted network trying to log in to some type of shared network resource like a server. Port-Redirection Attacks A port-redirection attack requires a host machine the hacker has broken into uses to get traffic into a network which wouldn’t be allowed passage through a firewall. Trust-Exploitation Attacks Uses a trust relationship inside your network making the servers really vulnerable because they’re all on the same segment. 14

Attackers and Their Tools Man-in-the-Middle Attacks A man-in-the-middle attack happens when someone intercepts packets intended for one computer and reads the data. A common guilty party could be someone working for your very own ISP using a packet sniffer and augmenting it with routing and transport protocols. Rogue ATM machines and even credit-card swipers are tools also increasingly used for this type of attack. 15

Attackers and Their Tools IP Spoofing Protection A hacker attempting an IP spoof and the spoofed IP address being denied access to the network by the firewall 16

Attackers and Their Tools Rogue Access Points Properly securing a wireless network has become a critical task for most network administrators. With a wired network, you know where the cables start and stop; but with a wireless network, you don’t. A rogue access point is one that’s been installed on a network without the administrator’s knowledge. These can be unintentional—when a user innocently plugs a wireless router or wireless access point in to the end of a network cable in your building it is clearly unsecured. Rogue access points are very useful to someone who wants to set up a man-in-the-middle attack. Social Engineering (Phishing) Hackers are more sophisticated today, they just asked the network’s users for it. Social engineering, or phishing is the act of attempting to obtain sensitive information by pretending to be a credible source. Common phishing tactics include emails, phone calls, or even starting up a conversation in person. 17

Understanding Mitigation Techniques Active Detection Software that searches for hackers attempting known attack methods and scans for the kind of suspicious activity. Passive Detection Video cameras are a good example of passive intrusion-detection systems. Proactive Defense A proactive defense is something you do or implement to ensure that your network is impenetrable. 18

Policies and Procedures Security Policies Security Audit Clean-Desk Policy Recording Equipment DMZ 19

Patches and Upgrades Automatic Updates through Windows Update It’s really easy to get updates for Windows-based operating systems from Windows 2000 on, through Windows Update If you need to get more information: www.microsoft.com 20

Antivirus Components The definition files The engine A typical antivirus program consists of two components: The definition files The engine 21

Antivirus Maintenance Upgrade (keep current) your Antivirus Engine Updating the Antivirus Definition Files Scanning for Viruses Regularly Fix Infected Computers 22

Summary Summary Exam Essentials Section Written Labs Review Questions 23