Download presentation
1
Intro to Network Security
Politeknik Elektronika Negeri Surabaya 2007 PENS-ITS
2
Introduction Penilaian Max terlambat 15 menit dari pelajaran dimulai
Tugas 25% UAS 40% UTS 30% Kehadiran 5% Max terlambat 15 menit dari pelajaran dimulai Di atas 15 menit diberi tugas dan dipresentasikan PENS-ITS
3
Overview PENS-ITS
4
Network Services DMZ INTERNET PENS-ITS ROUTER GTW FIREWALL EIS
CISCO Router Using acl , block malware from outside INTERNET NOC MULTILAYER SWITCH ROUTER All Server in DMZ GTW Manage using SSH , - Secure Webmin FIREWALL FIREWALL - IDS PROXY ( Squid ) Linux bridge , iptables All access to Internet must through Proxy shorewall , snort , Managable Switchs DMZ portsentry , acidlab Block unwanted user from port , manage from WEB SQL Database ( MySQL ) Access only from localhost ( 127 . . . 1 ) EIS WWW DOMAIN L 3 Switch Block malware on physical port from inside LECTURER network EMPLOYEE E - MAIL , PROXY Traffic Monitoring CACTI Http :// noc . eepis - its . edu E - Mail server HTTPS , SPAM EEPISHOTSPOT ( Spamassassin ) , Virus Access from wifi , signal Scanner ( ClamAV ) only in EEPIS campus Authentication from Proxy FILESERVER STUDENTS Internal Server EEPIS - INFORMATION SYSTEM PENS-ITS ( EIS http :// eis . eepis - its . edu ) EEPISHOTSPOT Http :// fileserver . eepis - its . edu
5
Incorrect permissions
Why Secure a Network? Internal attacker External attacker Corporate Assets Incorrect permissions Virus A network security design protects assets from threats and vulnerabilities in an organized manner To design security, analyze risks to your assets and create responses PENS-ITS
6
Computer Security Principles
Confidentiality Protecting information from exposure and disclosure Integrity Decrease possible problems caused by corruption of data Availability Make information always available PENS-ITS
7
Exploits (1) What is an Exploit? Types of attacks
Crackers break into a computer network by exploiting weaknesses in operating system services. Types of attacks Local Remote PENS-ITS
8
SANS Security Threats SANS/FBI top 20 security threats
Goals attackers try to achieve Gain unauthorized access Obtain administrative or root level Destroy vital data Deny legitimate users service Individual selfish goals Criminal intent PENS-ITS
9
Security Statistics: Attack Trends
Computer Security Institute ( Growing Incident Frequency Incidents reported to the Computer Emergency Response Team/Coordination Center 1997: 2,134 1998: 3,474 (75% growth from previous year) 1999: 9,859 (164% growth) 2000: 21,756 (121% growth) 2001: 52,658 (142% growth) Tomorrow? PENS-ITS
10
Attack Targets SecurityFocus 31 million Windows-specific attacks
22 million UNIX/LINUX attacks 7 million Cisco IOS attacks All operating systems are attacked! PENS-ITS
11
Hackers Vs Crackers Ethical Hackers vs. Crackers
Hacker usually is a programmer constantly seeks further knowledge, freely share what they have discovered, and never intentionally damage data. Cracker breaks into or otherwise violates system integrity with malicious intent. They destroy vital data or cause problems for their targets. PENS-ITS
12
Pengelompokan Attack PENS-ITS
13
Pengelompokan Attacks
Physical Access Attacks -- Wiretapping/menyadap Server Hacking Vandalism/perusakan Social Engineering -- Opening Attachments Password Theft Information Theft Dialog Attacks -- Eavesdropping (Mendengar yg tdk boleh) Impersonation (meniru) Message Alteration Merubah message Penetration Attacks (Usaha menembus) Malware -- Viruses Worms Denial of Service Break-in Scanning (Probing) PENS-ITS
14
Social Engineering Definisi Social enginering
seni dan ilmu memaksa orang untuk memenuhi harapan anda ( Bernz ), Suatu pemanfaatan trik-trik psikologis hacker luar pada seorang user legitimate dari sebuah sistem komputer (Palumbo) Mendapatkan informasi yang diperlukan (misalnya sebuah password) dari seseorang daripada merusak sebuah sistem (Berg). Tujuan dasar social engineering sama seperti umumnya hacking: mendapatkan akses tidak resmi pada sistem atau informasi untuk melakukan penipuan, intrusi jaringan, mata-mata industrial, pencurian identitas, atau secara sederhana untuk mengganggu sistem atau jaringan. Target-target tipikal termasuk perusahaan telepon dan jasa-jasa pemberian jawaban, perusahaan dan lembaga keuangan dengan nama besar, badan-badan militer dan pemerintah dan rumah sakit. PENS-ITS
15
Bentuk Social Engineering
Social Engineering dengan telepon Seorang hacker akan menelpon dan meniru seseorang dalam suatu kedudukan berwenang atau yang relevan dan secara gradual menarik informasi dari user. Diving Dumpster Sejumlah informasi yang sangat besar bisa dikumpulkan melalui company Dumpster. Social engineering on-line : Internet adalah lahan subur bagi para teknisi sosiaal yang ingin mendapatkan password Berpura-pura menjadi administrator jaringan, mengirimkan melalui jaringan dan meminta password seorang user. Persuasi Sasaran utamanya adalah untuk meyakinkan orang untuk memberikan informasi yang sensitif Reverse social engineering sabotase, iklan, dan assisting PENS-ITS
16
Penetration Attacks Steps
Port scanner Network enumeration Gaining & keeping root / administrator access Using access and/or information gained Leaving backdoor Attack Denial of Services (DoS) :Network flooding Buffer overflows : Software error Malware :Virus, worm, trojan horse Brute force Covering his tracks PENS-ITS
17
Scanning (Probing) Attacks
Reply from Probe Packets to , , etc. Host Internet Attacker No Host Results is reachable is not reachable … No Reply Corporate Network PENS-ITS
18
Network Scanning PENS-ITS
19
Denial-of-Service (DoS) Flooding Attack
Message Flood Server Overloaded By Message Flood Attacker PENS-ITS
20
DoS By Example PENS-ITS
21
Dialog Attack Eavesdropping, biasa disebut dengan spoofing, cara penanganan dengan Encryption Impersonation dan message alteration ditangani dengan gabungan enkripsi dan autentikasi PENS-ITS
22
Eavesdropping on a Dialog
Hello Client PC Bob Server Alice Hello Attacker (Eve) intercepts and reads messages PENS-ITS
23
Password Attack By Example
PENS-ITS
24
Sniffing By Example PENS-ITS
25
KeyLogger PENS-ITS
26
Attacker (Eve) intercepts
Message Alteration Dialog Client PC Bob Balance = $1,000,000 Balance = $1 Server Alice Balance = $1 Balance = $1,000,000 Attacker (Eve) intercepts and alters messages PENS-ITS
27
PENS-ITS
28
Security form Attack PENS-ITS
29
Network Penetration Attacks and Firewalls
Passed Packet Attack Packet Internet Firewall Hardened Client PC Internet Attacker Hardened Server Dropped Packet Internal Corporate Network Log File PENS-ITS
30
Intrusion Detection System
1. Suspicious Packet 4. Alarm Intrusion Detection System Network Administrator 2. Suspicious Packet Passed Internet Attacker Hardened Server 3. Log Packet Log File Corporate Network PENS-ITS
31
Encryption for Confidentiality
Encrypted Message “ ” Client PC Bob Server Alice “ ” Attacker (Eve) intercepts but cannot read Original Message “Hello” Decrypted Message “Hello” PENS-ITS
32
Impersonation and Authentication
I’m Bob Client PC Bob Prove it! (Authenticate Yourself) Attacker (Eve) Server Alice PENS-ITS
33
Secure Dialog System Secure Dialog Client PC Bob Automatically Handles
Negation of Security Options Authentication Encryption Integrity Server Alice Attacker cannot read messages, alter messages, or impersonate PENS-ITS
34
Hardening Host Computers
The Problem Computers installed out of the box have known vulnerabilities Not just Windows computers Hackers can take them over easily They must be hardened—a complex process that involves many actions PENS-ITS
35
Hardening Host Computers
Elements of Hardening Physical security Secure installation and configuration Fix known vulnerabilities Turn off unnecessary services (applications) Harden all remaining applications (Chapter 9) (more on next page) PENS-ITS
36
Hardening Host Computers
Elements of Hardening (continued) Manage users and groups Manage access permissions For individual files and directories, assign access permissions specific users and groups Back up the server regularly Advanced protections PENS-ITS
37
Hardening Host Computers
Security Baselines Guide the Hardening Effort Specifications for how hardening should be done Different for different operating systems Different for different types of servers (webservers, mail servers, etc.) Needed because it is easy to forget a step PENS-ITS
38
Installation and Patching
Installation Offers Many Options, Some of Which Affect Security For example, in Windows, the NTFS file system is better for security than FAT32 Need a security baseline to guide option choices during installation PENS-ITS
39
Installation and Patching
Known Vulnerabilities Most programs have known vulnerabilities Exploits are programs that take advantage of known vulnerabilities PENS-ITS
40
Installation and Patching
Known Vulnerabilities Vulnerability reporters send vulnerability reports to vendors Vulnerability reporters often say that vendors take too long to fix vulnerabilities Vendors say that vulnerability reporters do not give them enough time, report too much detail to the press PENS-ITS
41
Installation and Patching
Fixes Work-around: A series of actions to be taken; no new software Patches: New software to be added to the operating system Upgrades: Newer versions of programs usually fix older vulnerabilities. PENS-ITS
42
Installation and Patching
Upgrades Often, security vulnerabilities are fixed in new versions If a version is too old, the vendor might stop offering fixes It might be good to wait to upgrade until after the first round of bug and security fixes PENS-ITS
43
Turning Off Unnecessary Services
Operating system vendors used to install many services by default This made them easier to use. When use changes, services do not have to be turned on. Attackers have found flaws in many of these rare services PENS-ITS
44
Turning Off Unnecessary Services
Vendors now install fewer services by default— lock down mode Turn to security baseline to see what services to turn on and off Easier to install too few and add than to install too many and remove unwanted services PENS-ITS
45
Managing Users and Groups
Introduction Every user must have an account There can also be groups Can assign security measures to groups These measures apply to the individual group members automatically Faster and easier than assigning security measures to individuals PENS-ITS
46
Managing Permissions Principle of Least Permissions: Give Users the Minimum Permissions Needed for Their Job More feasible to add permissions selectively than to start with many, reduce for security PENS-ITS
47
Advanced Server Hardening Techniques
Reading Event Logs The importance of logging to diagnose problems Failed logins, changing permissions, starting programs, kernel messages, etc. Backup File Encryption File Integrity Checker PENS-ITS
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.