A Presentation On Computer Security Submitted To: Submitted By: Mr.Neeraj Kr. Pandey Yogesh Singh Rana B.Tech 2 nd year CS-B(T2) 1.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Cryptography and Network Security Chapter 20 Intruders
Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester By :wejad.n.mansour.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computer Viruses.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
 a crime committed on a computer network, esp. the Internet.
Honeypot and Intrusion Detection System
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Security CS Introduction to Operating Systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Understand Malware LESSON Security Fundamentals.
Ethical Hacking Keith Brooks CIO and Director of Services
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Filip Chytrý Everyone of you in here can help us improve online security....
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
From Basics to Pro Hacker
Botnets A collection of compromised machines
Seminar On Ethical Hacking Submitted To: Submitted By:
Operating Systems Services provided on internet
Botnets A collection of compromised machines
NET 311 Information Security
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Test 3 review FTP & Cybersecurity
6. Application Software Security
Presentation transcript:

A Presentation On Computer Security Submitted To: Submitted By: Mr.Neeraj Kr. Pandey Yogesh Singh Rana B.Tech 2 nd year CS-B(T2) 1

Virus!! They don’t just attack you computer but actually first they attack you as mostly they need some user interaction to get your PC infected and for that they play with your mind and fool you to do so. 2

Protecting against Virus. For protecting your PC from virus you not only need to have a updated antivirus and firewall installed but also be aware of the ways virus fools you. Example:- like you commonly run external scripts send by virus on your scrapbook. 3

Must Know About A program that monitors your actions. While they are sometimes like a remote control program used by a hacker, software companies to gather data about customers. The practice is generally frowned upon. 4 An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data. Definition from: Texas State Library and Archives Commission - SPYWARE TROJAN HORSE Definition from: BlackICE Internet Security Systems -

Symptoms Targeted Pop-ups Slow Connection Targeted (Spam) Unauthorized Access Spam Relaying System Crash Program Customisation 5 SPYWARE SPYWARE / TROJAN SPYWARE TROJAN HORSE SPYWARE / TROJAN SPYWARE

Spyware-Network Overview 6 Push Advertising Pull Tracking Personal data Image Source – Image derived and produced by; Andrew Brown, Tim Cocks and Kumutha Swampillai, February 2004.

Virus, Worm, Trojan Horse, Spyware Virus cannot replicate themselves but worm and Trojan can do that. A virus cannot be spread without a human action such as running an infected file or program but worm and Trojan have the capabilities to spread themselves automatically from computer to computer through network connection. 7

A virus do not consume system memory but worm consumes too much system memory and network bandwidth. Trojans are used by malicious users to access your computer information but viruses and worms can’t do so, they simply infect your computer. Spyware collect data from your computer without consent for Precision Marketing by various companies 8

Hackers The Attitude to the Infinity 9

What is Hacker? It’s about technical adeptness, being delight in solving problems and overcoming limits. There is a community of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker. 10

The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’. 11

There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and freaking the phone system. Real hackers call these people ‘crackers’ and have nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end. The basic difference is this: hackers build things, crackers break them. 12

The Hacker Attitude Don’t learn to Hack, Hack to Learn. The world is full of fascinating problems waiting to be solved. No problem should ever have to be solved twice. Boredom and drudgery are evil. Attitude is no substitute for competence. 13

Don’t learn to Hack, Hack to Learn Hackers solve problems and build things, and they believe in freedom and voluntary mutual help.. You also have to develop a kind of faith in your own learning capacity — a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you'll learn enough to solve the next piece — and so on, until you're done. 14

The world is full of fascinating problems waiting to be solved Being a hacker is lots of fun, but it's a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence. If you aren't the kind of person that feels this way naturally, you'll need to become one in order to make it as a hacker. Otherwise you'll find your hacking energy is drained by distractions like money, and social approval. 15

No problem should ever have to be solved twice. Creative brains are a valuable, limited resource. They shouldn't be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there To behave like a hacker, you have to believe that the thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones 16

Boredom and drudgery are evil. Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren't doing what only they can do — solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil. To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers). 17

Attitude is no substitute for competence. To be a hacker, you have to develop some of these attitudes. But copying an attitude alone won't make you a hacker. Becoming a hacker will take intelligence, practice, dedication, and hard work. Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won't let posers waste their time, but they worship competence. The hacker attitude is vital, but skills are even more vital. Attitude is no substitute for competence, and there's a certain basic toolkit of skills which you have to have before any hacker will dream of calling you one. This toolkit changes slowly over time as technology creates new skills and makes old ones obsolete. 18

Basic Hacking Skills Learn how to program. Get one of the open-source Unixes and learn to use and run it. Learn how to use the World Wide Web and write HTML. If you don't have functional English, learn it. 19

Class of Hackers Black hats Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as ‘Crackers.’ Gray Hats Individuals who work both offensively and defensively at various times. White Hats Individuals professing hacker skills and using them for defensive purposes. Also known as ‘Security Analysts’. 20

Script Kiddies Person, normally … not technologically sophisticated, who randomly seeks out a specific weakness over the internet to gain root access to a system without really understanding what he is exploiting because the weakness was discovered by someone else. Phreak Person who breaks into … telecommunications systems. Ethical Hacker May be Independent or maybe group of consultants - Claims to be knowledgeable about black hat activities. 21

Responsibility of Hackers Write open-source software Help test and debug open-source software Publish useful information Serve the hacker culture itself 22

Disciplined Life of Hackers Again, to be a hacker, you have to enter the hacker mindset. There are some things you can do when you're not at a computer that seem to help. They're not substitutes for hacking (nothing is) but many hackers do them, and feel that they connect in some basic way with the essence of hacking. Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers). Develop your appreciation of puns and wordplay 23

Train in a martial-arts form. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most popular forms among hackers are definitely Asian empty- hand arts such as Tae Kwon Do, various forms of Karate, Kung Fu, Aikido, or Ju Jitsu. The most hackerly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness. Study an actual meditation discipline. The perennial favorite among hackers is Zen. Other styles may work as well, but be careful to choose one that doesn't require you to believe crazy things. Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn to play some musical instrument well, or how to sing. 24

The more of these things you already do, the more likely it is that you are natural hacker material. Why these things in particular is not completely clear, but they're connected with a mix of left- and right- brain skills that seems to be important; hackers need to be able to both reason logically and step outside the apparent logic of a problem at a moment's notice. Work as intensely as you play and play as intensely as you work. For true hackers, the boundaries between "play", "work", "science" and "art" all tend to disappear, or to merge into a high-level creative playfulness. Also, don't be content with a narrow range of skills. Though most hackers self-describe as programmers, they are very likely to be more than competent in several related skills — system administration, web design, and PC hardware troubleshooting are common ones. A hacker who's a system administrator, on the other hand, is likely to be quite skilled at script programming and web design. Hackers don't do things by halves; if they invest in a skill at all, they tend to get very good at it. 25

Hacking The Professionalism 26

Why this knowledge is necessary? Internet has grown very fast and security has lagged behind. In 1988 a "worm program" written by a college student shut down about 10 percent of computers connected to the Internet. This was the beginning of the era of cyber attacks. In India there is a demand for about 80,000 security professionals where as only 22,000 are available and security specialists markets are expanding unlike other technology professions. 27

95% of Web Apps Have Vulnerabilities Cross-site scripting (80 percent) SQL injection (62 percent) Parameter tampering (60 percent) Cookie poisoning (37 percent) Database server (33 percent) Web server (23 percent) Buffer overflow (19 percent) 28

Cross-site scripting 29

SQL injection Unvalidated input: “SQL Injection” example username= admin password= anything’ OR ‘x’=‘x Original Query SELECT count(*) FROM userinfo WHERE and Database will execute SELECT count(*) FROM userinfo WHERE name=‘admin’ and pass=‘anything’ OR ‘x’=‘x’ Got logged in successfully! 30

Phases Involved in Ethical Hacking Footprinting Scanning Enumeration Gaining Access Escalating privilege Pilfering Covering tracks Creating back doors Denial of service 31

Footprinting Objective  Gathering Target Address range, namespace, acquisition and other information gathering essential for attack. Techniques  Domain name lookup  Whois  Nslookup  Sam Spade  ARIN (American Registry of Internet Numbers) 32

Scanning Objective  Bulk target assessment and identification of listing services focuses the attacker’s attention on the most promising avenues of entry Techniques  Ping sweep  TCP/UDP port scan  OS Detection 33

Enumeration Objective  More intrusive probing now begins as attackers begin identifying valid user accounts or poorly protected resource shares Techniques  List user accounts  List file shares  Identify applications 34

Gaining Access Objective  Enough data has been gathered at this point to make an informed attempt to access the target Techniques  Password eavesdropping  File share brute forcing  Password file grab  Buffer overflows 35

Pilfering Objective  The information gathering process begins again to identify mechanisms to gain access to trusted systems Techniques  Elevate trusts  Search for clearnet passwords 36

Covering Tracks Objective  Once total ownership of the target is secured, hiding this fact from system administrators becomes paramount, lest they quickly end the romp Techniques  Clear logs  Hide tools 37

Creating Back Doors Objective  Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim of the intruder Techniques  Create rogue user accounts  Schedule batch jobs  Infect startup files  Plant remote control services  Install monitoring mechanisms  Replace apps with Trojans 38

Denial of Service Objective  If an attacker is unsuccessful in gaining access, they may use readily available exploit code to disable a target as a last resort Techniques  SYN flood  ICMP techniques  Identical SYN requests  Overlapping fragment/offset bugs  Out of bounds TCP options (OOB)  DDoS 39

Finally There is always more to learn like Evading IDS, Firewalls, Honey pots,Buffer Overflows, Cryptography, Sniffers and protective measures to be taken to defend against all these. 40

Thank You Questions?? 41