1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.

Slides:



Advertisements
Similar presentations
1 Pertemuan > > Matakuliah: >/ > Tahun: > Versi: >
Advertisements

Arsitektur Jaringan Pertemuan 09 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
1 Pertemuan 04 Proxy/Cache Matakuliah: H0491/Praktikum Jaringan Komputer Tahun: 2005 Versi: 1/0.
1 Pertemuan 10 Membuat dan mengelola resiko dan kriminalitas sistem informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Pertemuan 10 Arsitektur Jaringan Model OSI Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 An Overview of Computer Security computer security.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
1 Pertemuan 01 Pandangan Umum Jaringan Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Blekinge Institute of Technology, Sweden
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
1 Pertemuan 03 Routing Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
1 Pertemuan 3 Information at Risk Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 01 Teknologi Jaringan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 20 Time & Condition Clauses with Future reference Matakuliah: G0134 – Grammar III Tahun: 2005 Versi: revisi 1.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 09 Model Fungsional Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Introduction (Pendahuluan)  Information Security.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
1 Pertemuan 8 The Object Definition Language (Lanjutan) Matakuliah: M0174/OBJECT ORIENTED DATABASE Tahun: 2005 Versi: 1/0.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Storage Security and Management: Security Framework
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lecture 1: Overview modified from slides of Lawrie Brown.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Network Security Introduction
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Network Security and Cryptography
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Pertemuan 04 Proxy/Cache
Information System and Network Security
Pertemuan 22 The Business Views of the Technology Architecture
Data & Network Security
Introduction to Information Security
CNET334 - Network Security
Pertemuan 11 Model TCP/IP
Network Security Ola Flygt Växjö University
Introduction to Cryptography
Presentation transcript:

1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat memperhitungkan ancaman dan serangan terhadap jaringan

3 Outline Materi Mekanisme Terjadinya Serangan Metode Pencegahan Serangan

4 Security Goals Integrity Confidentiality Avaliability

5 Security Threats and Attacks A threat is a potential violation of security. –Flaws in design, implementation, and operation. An attack is any action that violates security. –Active adversary. Common threats: –Snooping/eavesdropping, alteration, spoofing, repudiation of origin, denial of receipt, delay and denial of service.

6 Types of Attacks Passive ThreadsActive Threads Release of Message Contents Traffic Analysis MasqueradeReplayModification of Message Contents Denial of Service

7 Attacks, Services and Mechanisms Security Attack: –Any action that compromises the security of information. Security Mechanism: –A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: – A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

8 Security Attacks

9 IPv4 Infrastructure No authentication for the source Various approaches exist to address the problem: –Router/firewall filtering –TCP handshake

10 Vulnerability A vulnerability (or security flaw) is a specific failure of the security controls. Using the failure to violate the site security: exploiting the vulnerability; the person who does this: an attacker. It can be due to: –Lapses in design, implementation, and operation procedures. –Even security algorithms/systems are not immune! We will go over some examples in this course.

11 IP Protocol Vulnerabilities Authentication based on IP source address –But no effective mechanisms against IP spoofing Consequences (possible exploits) –Denial of Service attacks on infrastructures IP Spoofing and SYN Flood Smurf and Fraggle attacks OSPF Max Sequence

12 Methods of Defence Encryption Software Controls (access limitations in a data base, in operating system protect each user from other users) Hardware Controls (smartcard) Policies (frequent changes of passwords) Physical Controls

13 Impact of Attacks –Theft of confidential information –Unauthorized use of Network bandwidth Computing resource –Spread of false information –Disruption of legitimate services All attacks can be related and are dangerous!

14 The Security Life Cycle The iterations of –Threats –Policy –Specification –Design –Implementation –Operation and maintenance