Download presentation
Presentation is loading. Please wait.
Published byConrad McDowell Modified over 9 years ago
1
Security in Computing Security in Networks
2
I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity 5.Unknown perimeter 6.Unknown path
3
I.Threats in networks B. Attackers 1.for the challenge 2.for money, reward, espionage; organised crime because of reward 3.for ideology
4
I.Threats in networks C. Steps in an attack 1.reconnaissance a)port scan b)social engineering 2.attacking the network itself: eavesdropping and active wiretapping 3.attacking the infrastructure: protocol attacks
5
I.Threats in networks 4.attacking an endpoint a)defeating authentication 1)guessing (spoofing); masquerade, phishing, hijacking; man-in-the middle attack b)defeating confidentiality 1)delivery problems c)defeating integrity 1)message forgery 2)noise
6
I.Threats in networks d)website attacks 1)defacement 2)buffer overflow on a host of server 3)compromising applications on a host server, e.g.: http:// www.CDs-r-us.com/buy.asp?i 1 =459012&p 1 =1599 http:// www.CDs-r-us.com/buy.asp?i 1 =459012&p 1 =1599 &i2=365217&p2=1499
7
I.Threats in networks e)denial of service 1)flooding 2)distributed denial of service
8
I.Threats in networks f)hostile code 1)active code (or mobile code) 2)bots (or robots) – similar to Distributed denial of Service 3)script kiddies – people who download and run attack scripts – simple scripts for many of the popular attacks
9
II.Network controls A.Architecture 1)segmented (idea similar to OS) – one server to handle Http, another for application code, another to handle DB request 2)redundant – function to run on more than one node 3)protected against single points of failure – fault tolerance 4)segment controlled by firewall
10
II.Network controls A.Encryption 1.link – encryption at layer 1 and 2 of the OSI model 2.end-to-end – security from one end of transmission to the other 3.“virtual” private network – a sense of a “private” although part of public network 4.IPSEc (IP Layer) - similar to SSL
11
II.Network controls C.Content integrity check (detect, not prevent) 1.error codes, checksums, cryptographic checksums D.Authentication E.Wireless security protocols 1.WEP (Wired Equivalent Privacy) 2.WPA - WPA2 extends WPA (WiFi Protected Access) – alternative to WEP
12
III.Other A.Firewalls B.Intrusion detection systems C.Secure email
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.