Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)

Slides:



Advertisements
Similar presentations
Attacks Framework Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Unit 18 Data Security 1.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Introduction to Security Computer Networks Computer Networks Term B10.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Information Security & Privacy November 13, 2014.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Video Following is a video of what can happen if you don’t update your security settings! security.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Final Exam Review (Part 2) BUS Abdou Illia, Fall 2007 (Thursday 12/6/2007)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (March 2, 2015)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Targeted Break-in, DoS, & Malware attacks (II) (February ) © Abdou Illia – Spring 2015.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 14, Thursday 4/12/2007) (Week 15, Monday 4/16/2007)
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word,
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Topic 5: Basic Security.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Review Exam 2 Spring 2016.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Operating Systems Services provided on internet
Review Exam 2 Spring 2013.
Instructor Materials Chapter 7 Network Security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
SECURING INFORMATION SYSTEMS
Targeted Break-in, DoS, & Malware attacks (I)
Information Security & Privacy
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)

2 Learning Objectives n Discuss types of system attacks – Scanning process – Types of attacks n Discuss system defense tools & techniques – Security goals – Defense tools and techniques

3 Received: from hotmail.com (bay103-f21.bay103.hotmail.com [ ]) by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC for ; Wed, 8 Feb :14: (CST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Wed, 8 Feb :14: Message-ID: Received: from by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Feb :14:58 GMT X-Originating-IP: [ ] X-Originating- X-Sender: In-Reply-To: X-PH: From: To: X-ASG-Orig-Subj: RE: FW: Same cell# Subject: RE: FW: Same cell# Date: Thu, 09 Feb :14: Mime-Version: 1.0 Content-Type: text/plain; format=flowed X-OriginalArrivalTime: 09 Feb :14: (UTC) FILETIME=[DCA31D60:01C62D0D] X-Virus-Scanned: by Barracuda Spam Firewall at eiu.edu X-Barracuda-Spam-Score:

4 Identifying security attacks’ targets n Scanning (Probing) – Ping messages (To know if a potential victim exist) à Firewalls usually configured to prevent pinging by outsiders – Supervisory messages (To know if victim available) – Tracert, Traceroute (To know how to get to target)

5 Identifying security attacks’ targets n Examining scanning results reveal n IP addresses of potential victims n What services victims are running. Different services have different weaknesses n Host’s operating system, version number, etc. n Whois database at NetworkSolutions also used when ping scans failNetworkSolutions n Social engineering – Tricking employees into giving out passwords and keys n Guessing passwords and Dictionary attacks (Using Password Recovery software and other tools)

6 Review Questions 1 n What do ping messages allow? Why are ping scans often not effective? n What does social engineering mean? n An organization has a DNS server with IP address What IP address range would an attacker search to find hosts to attack?

7 Types of system attacks Attacks Physical Access Attacks Wiretapping - Vandalism - Drive-by-hacking Denial-of-Service - Flooding - Smurf - Ping of death - LAND - DDoS Intercepting messages - Eavesdropping - Message alteration Malware Virus – Worms - Trojan horse - Logic bomb

8 Denial of Service (DoS) attacks n Types of DoS attacks: Flooding DoS Smurf Flooding DoS Ping of Death attacks LAND attacks Distributed Denial of Service attacks

9 Flooding DoS n Send a stream of request messages to the target n Makes the target run very slowly or crash n Objective is to have the target deny service to legitimate users DoS requests Server Attacker Legitimate user Legitimate request

10 Smurf Flooding DoS n Attacker uses IP spoofing ( false source IP address in outgoing messages ) n Attacker sends ping / echo messages to third party computers on behalf of the target n All third party computers respond to target

11 Ping of Death attacks n Take advantage of – Fact that TCP/IP allows large packets to be fragmented – Some operating systems’ inability to handle packets larger than bytes n Attacker sends a request message that are larger than 65,536 bytes n Ping of Death are usually single-message DoS attacks n Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring

12 LAND attacks n First, appeared in 1997 n Attacker uses IP spoofing (false source IP address in outgoing messages) n Attacker sends IP packets where the source and destination address refer to target itself. n LAND attacks are usually single-message DoS attacks n Back in time, OS and routers were not designed to deal with loopback n Problem resurfaces recently with Windows XP and Windows 2003 Server

13 Distributed DoS (DDoS) Attack Server DoS Messages Computer with Zombie Computer with Zombie Attacker Attack Command Attack Command n Attacker hacks into multiple clients and plants Zombie programs on them n Attacker sends commands to Zombie programs which execute the attacks n First appeared in 2000 with Mafiaboy attack against cnn.com, ebay.com, etrade.com, dell.com, etc.

14 Review Question 2 All DoS messages are requests that require a response message from the target TF DDoS can be seen as a way to launch a denial of service attack rather than a type of attack TF Single-message DoS attacks send unusual messages for which the software designer on the target device did not plan. TF Why don’t all DoS attacks use IP address spoofing to maintain anonymity?

15 Intercepting messages n Eavesdropping: Intercepting confidential messages Attacker (Eve) Taps into the Conversation: Tries to Read Messages Client PC (Allex’s) Server (Steve’s) What is account #? Account number Message Exchange Eavesdropping is also called Person-in-the-middle attack

16 Intercepting messages n Message alteration Attacker intercepts the message, alters it and, then, forwards it Client PC Server Balance = $1.00 Balance = $ Message Exchange Balance = $1.00 Balance = $ What is the balance?

17 Malware attacks n Types of malware: Viruses Worms Trojan horses Logic bombs

18 Virus n Program (script, macro) that: – Attaches to files – Performs annoying actions when they are executed – Performs destructive actions when they are executed – Spreads by user actions (floppy disk, flash drive, opening attachment, IRC, etc), not by themselves. n Could be – Boot sector virus: attaches itself to files in boot sector of HD – File infector virus: attaches itself to program files and user files – Polymorphic virus: mutates with every infection, making them hard to locate

19 Worm n Does not attach to files n A self-replicating computer program that propagate across a system n Uses a host computer’s resources and network connections to transfer a copy of itself to another computer n Harms the host computer by consuming processing time and memory n Harms the network by consuming the bandwidth Q: Distinguish between viruses and worms

20 Trojan horse n A computer program – That appears as a useful program like a game, a screen saver, etc. – But, is really a program designed to damage or take control of the host computer n When executed, a Trojan horse could – Format disks – Delete files – Open some TCP ports to allow a remote computer to take control of the host computer n NetBus and SubSeven used to be attackers’ favorite programs for target remote control

21 Trojan horse NetBus Interface

22 Logic bomb n Piece of malicious code intentionally inserted into a software system n The bomb is set to run when a certain condition is met – Passing of specified date/time – Deletion of a specific record in a database n Example: a programmer could insert a logic bomb that will function as follow: – Scan the payroll records each day. – If the programmer’s name is removed from payroll, then the logic bomb will destroy vital files weeks or months after the name removal.

23 Review Questions 3 n What kind of malware is a malicious program that could allow an attacker to take control of a target computer? n What kind of malware could harm a host computer by consuming processor time and random access memory?