Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

KULIAH III THREAT AND ATTACK (2) Aswin Suharsono KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Introduction to Security Computer Networks Computer Networks Term B10.
Threats To A Computer Network
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
1-1 Internet Overview: roadmap 1.5 Protocol layers, service models 1.6 Internet for Wireless 1.7 Internet under attack: security overview Lecture 3.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Introduction 1 Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Quiz Review.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
COM320 Computer Networks and Operating Systems Kevin Curran.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 5 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Last quiz question….
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Introduction1-1 CNT 5106C Computer Networks Ahmed Helmy Computer & Information Science & Engineering (CISE) Dept University of Florida
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
Computer Networks CSE 434 Fall 2009 Sandeep K. S. Gupta Arizona State University Research Experience.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Computer Networks CS1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Introduction 1-1 Networking Admin  1 to 4 lectures a week for 11 weeks for a total of 23 lectures  Interleaves with Functional Programming  First prac.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Introduction 1-1 Chapter 1 Introduction (2/2) CSEE 4119 Computer Networks.
Session 2.
Introduction1-1 What’s the Internet: “nuts and bolts” view  millions of connected computing devices: hosts = end systems  run network apps Home network.
COMP 562: “Advanced Topics in Networking” Qian Zhang Spring 2009 HKUST Introduction 1-1.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
DELAYS, LAYERED NETWORK MODEL AND NETWORK SECURITY.
Introduction 1-1 Chapter 1: Introduction roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Advanced Computer Network
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note.
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Based on the book Computer Networking: A Top Down Approach, Jim Kurose,
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 3 Omar Meqdadi Department of Computer Science and Software Engineering.
Introduction1-1 CNT 5106C Computer Networks Ahmed Helmy Computer & Information Science & Engineering (CISE) Dept University of Florida
COM594: Mobile Technology Lecture Week 1 Hardware and Protocols.
Computer Networks CS1652 Jack Lange University of Pittsburgh
Chapter 1: Introduction
Computer Networks and Communications
Presentation transcript:

Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security (See “Computer Security and Privacy” course) 1.7 History

Introduction1-2 Network Security  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against attacks  how to design architectures that are immune to attacks  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”  Internet protocol designers playing “catch-up”  Security considerations in all layers!

Introduction1-3 Bad guys can put malware into hosts via Internet  Malware can get in host from a virus, worm, or trojan horse.  Spyware malware can record keystrokes, web sites visited, upload info to collection site.  Infected host can be enrolled in a botnet, used for spam and DDoS attacks.  Malware is often self-replicating: from an infected host, seeks entry into other hosts

Introduction1-4 Bad guys can put malware into hosts via Internet  Trojan horse  Hidden part of some otherwise useful software  Today often on a Web page (Active-X, plugin)  Virus  infection by receiving object (e.g., attachment), actively executing  self-replicating: propagate itself to other hosts, users  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)

Introduction1-5 Bad guys can attack servers and network infrastructure  Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets toward target from compromised hosts target

Introduction1-6 The bad guys can sniff packets Packet sniffing:  broadcast media (shared Ethernet, wireless)  promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload  Wireshark software used for end-of-chapter labs is a (free) packet-sniffer

Introduction1-7 The bad guys can use false source addresses  IP spoofing: send packet with false source address A B C src:B dest:A payload

Introduction1-8 The bad guys can record and playback  record-and-playback : sniff sensitive info (e.g., password), and use later  password holder is that user from system point of view A B C src:B dest:A user: B; password: foo

Introduction1-9 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History (READ ON YOUR OWN)

Introduction1-10 Introduction: Summary Covered a “ton” of material!  Internet overview  what’s a protocol?  network edge, core, access network  packet-switching versus circuit-switching  Internet structure  performance: loss, delay, throughput  layering, service models  security  history (read on your own) You now have:  context, overview, “feel” of networking  more depth, detail to follow!