3-Protecting Systems Dr. John P. Abraham Professor UTPA.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
AVG Internet Security 7.5 Product presentation.
Security+ Guide to Network Security Fundamentals, Third Edition
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Security+ Guide to Network Security Fundamentals, Third Edition
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Computer Security and Penetration Testing
Chapter 4 Application Security Knowledge and Test Prep
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Microsoft ® Official Course Module 9 Configuring Applications.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security Credit: most slides from Forouzan, TCP/IP protocol suit
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
.  At least one in ten web pages are booby-trapped with malware  Just viewing an infected Web page installs malware on your computer, if your operating.
PLUG IT IN SIX Protecting Your Information Assets.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Module 5: Configuring Internet Explorer and Supporting Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Protecting the Server and Client Lesson 5. Objectives.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Protecting Servers and Clients
TMG Client Protection 6NPS – Session 7.
Chapter 7: Identifying Advanced Attacks
World Wide Web policy.
Security+ Guide to Network Security Fundamentals, Third Edition
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Protecting Servers and Clients
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

3-Protecting Systems Dr. John P. Abraham Professor UTPA

Hardening Operating System 3 pronged approach: ◦ operating system updates, ◦ Protect against buffer overflows, ◦ configuring operating system protections

Operating System updates  Security Patch: Covers discovered Vulnerabilities  Turn on automatic updates  Hotfix – specific to a customer situation  Service Pack – Cumulative security patches and other software updates.  Designate one server within your organization as the patch update service

Buffer Overflow Protection Corrupts system memory and causes freezing May change the return address (from a routine) to a different one where the malware is residing. Programmers should write defensive programming. Show the textbook to the students. ◦ For windows based programming use: Data execution prevention(DEP) and Address Space Layout Randomization (ASLR)

Defensive programming Microsoft environment Data Execution Prevention (DEP) ◦ DEP is available in VISTA and beyond ◦ Designated memory only to hold data not code (No eXecute NX bit associated with the memory). Buffer overflow redirection would not work within a NX memory. ◦ Programmers can turn on this feature. Address Space Randomization (ASLR). ◦ Each time Vista.. Is rebooted.EXE and.DLL are loaded randomly into 256 possible locations. Attackers find it difficult to work with unpredictable code locations.

Configuring Operating System Protection Security Policy ◦ A document that clearly defines the defense mechanisms an organization will employ in order to keep information secure. ◦ Configuration baseline – permissions on files, registry permissions, logins, authentications, etc. You may want to create a Security template to handle it. ◦ Deployment – individually or by group policy

Preventing Attacks that Target Web browser Attacks through cookies, scripts, Java, ActiveX and cross-site scripting. Attacks through cookies, scripts, Java, ActiveX and cross-site scripting.

Cookies information about visits saved on user’s computer. First party cookie is created by the site that the user is currently viewing. Third- party cookies are cookies created by some one else is accessed in a current visit to a different site. information about visits saved on user’s computer. First party cookie is created by the site that the user is currently viewing. Third- party cookies are cookies created by some one else is accessed in a current visit to a different site. Cookies do not present a security threat, but is a privacy risk. Track browsing habits, etc. Also provides IP address. Cookies do not present a security threat, but is a privacy risk. Track browsing habits, etc. Also provides IP address.

Scripts (Java, VB, etc.) Web pages containing scripts download the scripts to the computer and is executed. The program can send information about the user to a host. Scripts can’t access files on the computer, so limited risk exists. Web pages containing scripts download the scripts to the computer and is executed. The program can send information about the user to a host. Scripts can’t access files on the computer, so limited risk exists.

Java Java can create applets that run on local computers. Defense against hostile jave applets is a Sandbox (a fence). Unsigned java applet does not come from a trusted source and must be run within the sandbox and gives warning to the users. If users do not read the message, or understand the risk, it can cause serious trouble. Sandbox warnings are given at the bottom left. Signed java applets are from trusted sources and have not been altered. Java can create applets that run on local computers. Defense against hostile jave applets is a Sandbox (a fence). Unsigned java applet does not come from a trusted source and must be run within the sandbox and gives warning to the users. If users do not read the message, or understand the risk, it can cause serious trouble. Sandbox warnings are given at the bottom left. Signed java applets are from trusted sources and have not been altered.

ActiveX – Add-ons framework for defining reusable software components (known as controls) that perform a particular function or a set of functions in Microsoft Windows in a way that is independent of the programming language. A software application can then be formed from one or more of these components in order to provide its functionality. They do not run in a sandbox. It can do anything on the computer such as creating, modifying and deleting files. A signed ActiveX control is generally safe. Unsigned is riskier. framework for defining reusable software components (known as controls) that perform a particular function or a set of functions in Microsoft Windows in a way that is independent of the programming language. A software application can then be formed from one or more of these components in order to provide its functionality. They do not run in a sandbox. It can do anything on the computer such as creating, modifying and deleting files. A signed ActiveX control is generally safe. Unsigned is riskier.

Cross Site Scripting (XSS) Scripts that extract information from victim and pass it to the attacker. Scripts that extract information from victim and pass it to the attacker. Changes contents of dynamic websites and injects a script into it that asks for personal information through input validation. Changes contents of dynamic websites and injects a script into it that asks for personal information through input validation. A web site that displays bad login screens with login name is a good one for these types of attacks. A web site that displays bad login screens with login name is a good one for these types of attacks. It could send a URL to click It could send a URL to click

SMTP Open Relays A user can set up a receiving address and a sending address. Usually they are the same like pop.dia.sbc.net and smtp.dia.sbc.net. Some smpt servers are configured to sned mail through other domains (known as relays). An attacker can send spam through such relays without getting caught. A user can set up a receiving address and a sending address. Usually they are the same like pop.dia.sbc.net and smtp.dia.sbc.net. Some smpt servers are configured to sned mail through other domains (known as relays). An attacker can send spam through such relays without getting caught.

Instant Messaging Once a user signs up with the instan message server, the client’s IP and port is sent to all buddies and communication can take place directly. With direct connection virus and worms can be spread. Attacker can also view contents of messages. Once a user signs up with the instan message server, the client’s IP and port is sent to all buddies and communication can take place directly. With direct connection virus and worms can be spread. Attacker can also view contents of messages.

Peer-to peer All types of attacks can take place through P2P networks. BitTorrent is more secure than P2P. However, both can be used to download illegal software or music. All types of attacks can take place through P2P networks. BitTorrent is more secure than P2P. However, both can be used to download illegal software or music.

Defenses Antivirus – always a step behind, update with definition files. Antivirus – always a step behind, update with definition files. Pop-up blockers. Now incorporated into the browser. Pop-up blockers. Now incorporated into the browser. Anti-spam. Spam filter with smtp server. Install spam filter with pop3 Anti-spam. Spam filter with smtp server. Install spam filter with pop3 Personal firewals. Personal firewals. Host Intrusion Detection systems (HIDS) monitoring files systems and logfiles. Host Intrusion Detection systems (HIDS) monitoring files systems and logfiles.