Download presentation
Presentation is loading. Please wait.
1
Intro to Information Assurance & Security
CMGT/400 Intro to Information Assurance & Security Philip Robbins – October 15, 2013 (Week 2) University of Phoenix Mililani Campus
2
Agenda: Week 2 Review Week 1 Review Assignment #1 Week 2 Readings
Components of Data Security Data Security Methodologies Apply security methods in situational cases Quiz #2 Assignment #2 2
3
Week 1 Review Why is information important?
What are the Information Security Services? What is Information Assurance? What is Information Systems Risk Management? 3
4
Chapter 15: Types of Attacks & Malware
First Defense - Eliminate Vulnerabilities - Vulnerabilities are exploited by Threats - Can all Vulnerabilities be eliminated? - Can Risk ever be zero?
5
Chapter 15: Types of Attacks & Malware
Anatomy of an Attack - Perform Reconnaissance (Profile Target) - Scan Target Network - Research Vulnerabilities - Perform Attack - Create Backdoor - Cover Tracks
6
Chapter 15: Types of Attacks & Malware
Perform Reconnaissance (Profile Target)
7
Chapter 15: Types of Attacks & Malware
Perform Reconnaissance (Profile Target)
8
Chapter 15: Types of Attacks & Malware
Perform Reconnaissance (Profile Target)
9
Chapter 15: Types of Attacks & Malware
Scan Target External Network
10
Chapter 15: Types of Attacks & Malware
Scan Target External Network
11
Chapter 15: Types of Attacks & Malware
Scan Target External Network
12
Chapter 15: Types of Attacks & Malware
Scan Target (Internal) Network
13
Chapter 15: Types of Attacks & Malware
Researching Vulnerabilities
14
Chapter 15: Types of Attacks & Malware
Performing an Attack
15
Chapter 15: Types of Attacks & Malware
Performing an Attack
16
Chapter 15: Types of Attacks & Malware
Creating a backdoor - Vulnerability may not be there next time. - Create new account; user//password. - Allow remote connection.
17
Chapter 15: Types of Attacks & Malware
Covering their Tracks a.k.a “Hack and Cover” Erase log files
18
Chapter 15: Types of Attacks & Malware
Covering their Tracks a.k.a “Hack and Cover” Change time stamps
19
Chapter 15: Types of Attacks & Malware
Denial-of-Service Attacks - Crash, take offline, overwhelm with requests - Affects availability
20
Chapter 15: Types of Attacks & Malware
Denial-of-Service Attacks - SYN Flood
21
Chapter 15: Types of Attacks & Malware
Denial-of-Service Attacks - SYN Flood (# requests >> timeout period; req limit reached; legit user req are blocked.)
22
Chapter 15: Types of Attacks & Malware
Denial-of-Service Attacks - Ping of Death
23
Chapter 15: Types of Attacks & Malware
Denial-of-Service Attacks - Ping of Death
24
Chapter 15: Types of Attacks & Malware
Man-in-the-Middle Attack - Session Hijacking (cookies) - Router Compromised
25
Chapter 15: Types of Attacks & Malware
Replay Attack - Capture communication & retransmit later - Bypass authentication methods
26
Chapter 15: Types of Attacks & Malware
Drive-by Download Attacks - Automated download of Malware Phishing - Fraudulent to gain user / login information Spear Phishing - Targeted Phishing (contains info specific to target)
27
Chapter 15: Types of Attacks & Malware
Pharming - Use of fake websites to obtain credentials DNS poisoning (Domain Name -> IP) - Change of cached DNS tables. ARP poisoning (OSI L3 -> L2) - Change of cached ARP tables.
28
Chapter 15: Types of Attacks & Malware
Password Guessing - Weak passwords - Dictionary Attacks - Brute force Attacks - Hybrid Attack (i.e. s3cr3t)
29
Chapter 15: Types of Attacks & Malware
Software Exploitation - Buffer Overflow Attacks - Injection Attacks - Malware - Virus - Trojan Horse - Spyware - Logic Bombs - Rootkits - Worms ……………………………etc. etc. etc.
30
Chapter 15: Types of Attacks & Malware
Minimize Possibility of Attack - Baseline systems - Update patches for OS & Applications! - Run limited services - Limit disclosure of information to public
31
Chapter 15: Types of Attacks & Malware
Minimize Possibility of Attack
32
Chapter 15: Types of Attacks & Malware
Types of Hats - White Hats (Penetration Tester improving sec.) - Black Hats (Hacker / Attacker) - Grey Hats (Between White and Black) - Red Hat (Enterprise Linux)
33
Chapter 15 Review Questions
33
34
Question #1 What is the difference between port scanning and ping sweeps? 34
35
Question #2 A SYN flood is an example of what type of attack?
A. Malicious Code B. Denial of Service C. Man-in-the-Middle D. Spoofing 35
36
Question #2 A SYN flood is an example of what type of attack?
A. Malicious Code B. Denial of Service C. Man-in-the-Middle D. Spoofing 36
37
Question #3 An attack in which the attacker simply listens for
all traffic being transmitted across a network, in the hope of viewing something such as a user ID and password combination, is known as: A man-in-the-middle attack B. A denial-of-service attack C. A sniffing attack D. A backdoor attack 37
38
Question #3 An attack in which the attacker simply listens for
all traffic being transmitted across a network, in the hope of viewing something such as a user ID and password combination, is known as: A man-in-the-middle attack B. A denial-of-service attack C. A sniffing attack D. A backdoor attack 38
39
Question #4 Which attack takes advantage of a trusted
relationship that exists between two systems? Spoofing B. Password guessing C. Sniffing D. Brute-force 39
40
Question #4 Which attack takes advantage of a trusted
relationship that exists between two systems? Spoofing B. Password guessing C. Sniffing D. Brute-force 40
41
Question #5 A piece of malicious code that must attach itself
to another file to replicate itself is known as: Worm B. Virus C. Trojan D. Logic Bomb 41
42
Question #5 A piece of malicious code that must attach itself
to another file to replicate itself is known as: Worm B. Virus C. Trojan D. Logic Bomb 42
43
Question #6 A piece of malicious code that appears to be
designed to do one thing (and may in fact do that thing) but that hides some other payload (often malicious) is known as: Worm B. Virus C. Trojan D. Logic Bomb 43
44
Question #6 A piece of malicious code that appears to be
designed to do one thing (and may in fact do that thing) but that hides some other payload (often malicious) is known as: Worm B. Virus C. Trojan D. Logic Bomb 44
45
Question #7 (last one) Malicious code that is set to execute its payload on a specific date or at a specific time is known as: Worm B. Virus C. Trojan D. Logic Bomb 45
46
Question #7 (last one) Malicious code that is set to execute its payload on a specific date or at a specific time is known as: Worm B. Virus C. Trojan D. Logic Bomb 46
47
Break Let’s take a break…
48
Chapter 16: Email & Instant Messaging
Internet Protocols - SMTP (TCP Port 25) Simple Mail Transfer Protocol - POP3 (TCP Port 110) Post Office Protocol version 3 - IMAP (TCP Port 143) Internet Message Access Protocol Why are all these protocols TCP (not UDP) based?
49
Chapter 16: Email & Instant Messaging
Security - Viruses typically spread through attachments. - Remember a Virus requires a file to infect. - SPAM (unsolicited commercial ) - Open relay SMTP servers (Port 25) for mail relaying. - Instant messaging is similar to .
50
Chapter 16: Email & Instant Messaging
Encryption S/MIME - Secure/Multipurpose Internet Mail Extensions (used to support content: images, audio, apps) - X.509 Certificate Standard (40-bit RC2, 3 DES) PGP - Pretty Good Privacy - PKI & X.509 (use of public & private keys) - IDEA, 3DES, CAST
51
Chapter 16 Review Questions
51
52
Question #1 Why is an open e-mail relay bad?
It allows anyone to remotely control the server. B. It makes the server reboot once a day. C. No will go through. D. It will allow anyone to send spam through the server. 52
53
Question #1 Why is an open e-mail relay bad?
It allows anyone to remotely control the server. B. It makes the server reboot once a day. C. No will go through. D. It will allow anyone to send spam through the server. 53
54
Question #2 What is greylisting?
A. messages are temporarily rejected so that the sender is forced to resend. B. messages are run through a strong set of filters before delivery. C. messages are sent through special secure servers. D. is sent directly from the local host to the remote host, bypassing servers entirely. 54
55
Question #2 (last one) What is greylisting?
A. messages are temporarily rejected so that the sender is forced to resend. B. messages are run through a strong set of filters before delivery. C. messages are sent through special secure servers. D. is sent directly from the local host to the remote host, bypassing servers entirely. 55
56
Classroom Exercise Draft the body of an email message to the
users of your organization describing the risk of malware and the what they can do to avoid infection. Think first about what malware is and how one gets it on their (the company’s) computer. Post your draft message in OLS within the “Chat Room” Forum. (Include your name/s in the title of the post). 10 to 15 minutes (individual *or* groups of two). 56
57
Break Let’s take a break…
58
Chapter 17: Web Components
Secure Socket Layer (SSL) Transport Layer Security (TLS) - Cryptographic protocols that provide encrypted communication security over the internet. - Adds integrity and mutual authentication functionality to TCP (SSL v3/TLS).
59
Chapter 17: Web Components
HTTPS (HTTP over SSL) - TCP Port 443 (Encrypted) HTTP - TCP Port 80 (Plaintext) FTPS (SSH & FTP) - TCP Port 989 & 990 (Encrypted) FTP - TCP Port 20 & 21 (Plaintext) TFTP - UDP Port 69
60
Chapter 17: Web Components
What is a Port? - Used by TCP and UDP - A special number present in the header of a data packet - Used to map data to a particular process running on a computer. Well Known Ports: 0 through 1023. Registered Ports: 1024 through Dynamic/Private : through
61
Chapter 17: Web Components
Code based Vulnerabilities - Java - JavaScript (code executed by the browser) - ActiveX (MSFT programs executed automatically) - Active Server Pages (ASP) (executed server side) - PHP (Dynamic Web Page Content)
62
Chapter 17: Web Components
63
Chapter 17: Web Components
64
Chapter 17 Review Questions
64
65
Question #1 SSL uses which port to carry HTTPS traffic? TCP Port 80
D. UDP Port 69 65
66
Question #1 SSL uses which port to carry HTTPS traffic? TCP Port 80
D. UDP Port 69 66
67
Question #2 To establish an SSL connection for e-mail and
HTTP across a firewall, you must: Open TCP ports 80, 25, 443, and 223. Open TCP ports 443, 465, and 995. C. Open a TCP port of choice and assign it to all SSL traffic. D. Do nothing; SSL tunnels past firewalls. 67
68
Question #2 To establish an SSL connection for e-mail and
HTTP across a firewall, you must: Open TCP ports 80, 25, 443, and 223. Open TCP ports 443, 465, and 995. C. Open a TCP port of choice and assign it to all SSL traffic. D. Do nothing; SSL tunnels past firewalls. 68
69
Question #3 (last one) ActiveX can be used for which of the following
purposes? Add functionality to a browser Update the operating system C. Both A and B D. Neither A nor B 69
70
Question #3 (last one) ActiveX can be used for which of the following
purposes? Add functionality to a browser Update the operating system C. Both A and B D. Neither A nor B 70
71
Break Let’s take a break…
72
Chapter 24: Secure Software Development
73
Chapter 24: Secure Software Development
74
Chapter 24: Secure Software Development
75
Chapter 24: Secure Software Development
76
Chapter 25: Disaster Recovery & Business Continuity
What is a Backup Plan (BP) vs Disaster Recovery Plan (DRP) vs Emergency Response Plan (ERP) vs Business Recovery Plan (BRP) vs Business Impact Analysis (BIA) vs Incident Response Plan (IRP) vs Continuity of Operations Plan (COOP) vs Contingency Plan? Policy & Planning Test, Audit, Update Configuration Control Protection, Detection, Reaction (Assessment, CND, Incident Response)
77
Chapter 25 Review Questions
77
78
Question #1 Which of the following computer recovery sites is only partially equipped with processing equipment? A. Cold Site B. Warm Site C. Hot Site Emergency Site 78
79
Question #1 Which of the following computer recovery sites is only partially equipped with processing equipment? A. Cold Site B. Warm Site C. Hot Site D. Emergency Site 79
80
Question #2 Which of the following specifically addresses cyber attacks against an organization's IT systems? Continuity of support plan Business continuity plan Incident response plan Continuity of operations plan 80
81
Question #2 Which of the following specifically addresses cyber attacks against an organization's IT systems? Continuity of support plan Business continuity plan Incident response plan Continuity of operations plan 81
82
Question #3 (last one) Which primary element of BCP includes carrying out vulnerability analysis? Scope and Plan Initiation Business Impact Assessment Business Continuity Plan Development Plan Approval and Implementation 82
83
Question #3 (last one) Which primary element of BCP includes carrying out vulnerability analysis? Scope and Plan Initiation Business Impact Assessment Business Continuity Plan Development Plan Approval and Implementation 83
84
Break Let’s take a break…
85
Quiz: Week 1 10-15 minutes
86
IDV Assignment due Week #3
Paper No. 2 Review potential information system risks. Pick a company / organization. Identify several threats & vulnerabilities; what risks are created by these? - How is the company managing its information security? 86
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.