Download presentation
Presentation is loading. Please wait.
Published byFlorence Goodman Modified over 8 years ago
1
Security Operations Chapter 11 Part 3 Pages 1279 to 1309
2
E-Mail Security Security, authenticity and integrity were not considered. Easy to spoof From: Phishing
3
E-Mail Security PGP – http://www.symantec.com/encryption/ http://www.symantec.com/encryption/ – http://www.gpg4win.org/ http://www.gpg4win.org/ – Uses Public Key Encryption S/MIME – Public Key PKI
4
E-Mail Relaying Public mail server in DMZ Mail servers use a relay agent to send a message from one mail server to another. If not properly configured, can be used to send spam. A company’s email server should only accept email destined for its domain and should not forward messages to other mail servers and domains.
5
E-Mail Employ antivirus and content filter both on incoming and outgoing email.
6
Fax Security Fax can sit in a bin until the recipient picks it up. Pass between computer and fax device Fax encrypter – encrypts all fax data
7
Tools Hackers (Black Hats) – find vulnerabilities to exploit Penetration Testers (White Hats) – test for vulnerabilities to be fixed Sophisticated tools have become easier to use with GUI interfaces by script kiddies
8
DDoS Attack Figure 11-8 on page 1287
9
Scanners Operating system fingerprinting Open ports Server software version Vulnerability scanners use a database of vulnerabilities – Nessus
10
Browsing Forced browsing for files Google hacking to locate documents Shoulder surfing Dumpster diving
11
Network Sniffers Wireshark Put NIC into promiscuous mode “Sniffers are becoming less successful because of the move to switched environment.” SSH instead of telnet
12
Session hijacking Attacker temporarily takes David off the network and responds to Kristy Figure 11-10 on page 1292
13
Password Cracking John the Ripper L0phtcrack Dictionary and brute force Longer passwords with variety of character sets.
14
Backdoors Installed by Trojan Horse Many antiviruses and IDSs look for signatures and behavior patterns
15
Attacks List on pages 1293-4 Some are dates so you need continuing education.
16
Vulnerability Testing Manual or automated Scope of the test must be agreed upon. Could knock a server offline. Personnel Testing Physical Testing System and network testing
17
Penetration Testing Testing the network and its systems by attacking it. Five Step Process – page 1300 Types – page 1300 Figure page 1301 Georgia Weidman, “Penetration Testing”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.