Lecture 14
Lecture’s outline
Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended receiver and should be unintelligible to all others. Authentication The receiver is sure of the sender’s identity and that an imposter has not sent the message.
Integrity The data must arrive at the receiver exactly as it was sent by the original sender. There must be no changes in transmission, either accidental or malicious. Non-repudiation: A receiver must be able to prove that a received message came from a specified sender. The sender must not be able to deny sending a message that it has, in fact, sent.
Malware a The software that is written for malicious purposes Viruses Worms Trojan Horses Spyware Keyloggers
Reproduced with permission. Please visit for more materialwww.SecurityCartoon.com
Viruses A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.programfile
Designing A Virus Locate the first executable instruction in the target program Replace the instruction with an instruction to jump to the memory location next to the last instruction of the target system Insert the virus code for execution at the end Insert an instruction after virus code that simulates the first instruction Then jump to the second instruction of original code
Brain Virus (Pakistani Flu) 1986 Credit: The first computer virus
Virus vs. Worm
Credit: Yashar Ganjali; Propagation effect of worms Before slammer worm After slammer worm
Key-loggers and Spyware
Spoofing Attacks b where the attacker impersonates some one else spoofing URL spoofing DNS spoofing IP spoofing MAC spoofing
Spoofing (phishing) b.1
URL Spoofing (phishing) b.2
Genuine URL; Site: niit.edu.pk; directory: src; file: login.php 1
Victim.ID ************** The second-level domain is.org and not.edu; faked website 2
3 The first-level domain is.tk and not.pk; faked website Victim.ID **************
The IP address does not correspond to webmail.niit.edu.pk; faked website 4 Victim.ID **************
DNS Spoofing b.3 IP Spoofing b.4 MAC Spoofing b.5
DNS spoofing WWWWWW Tell me the IP address of WWWWWW DNS Request
WWWWWW Reply The IP address of www. niit.edu.pk is www. niit.edu.pk DNS spoofing WWWWWW DNS The IP address of is Fake NIIT site
Private network /24 MAC/ IP spoofing :aa:bb:cc:dd:ee:ff :aa:bb:cc:dd:ee:ff Malicious node A malicious node can pretend to be another node
Network-based attacks c where the attacker pretends to be something he/she/it is not Worms Denial of Service attacks
Social Engineering d Targets the weakest component of a security system---the users
Non-technical hacking
Greeting card phishing
Lottery winning phishing