SlideShare a Scribd company logo
1 of 18
March 19, 2017 Lithuania
1
Network Security
Daniyal Hosseini
Ahmet Cuvadaroglu High School
Istanbul, Turkey
asoltaj@yahoo.com
March 19, 2017 Lithuania 2
Overview
 What is security?
 Why do we need security?
 Who is vulnerable?
 Countermeasures against common security attacks
- Firewalls & Intrusion Detection Systems
- Denial of Service Attacks
- Social Problems
What is security?
15-441 Networks Fall 2002 3
March 19, 2017 Lithuania 4
What is “Security”
 Dictionary.com says:
– 1. Freedom from risk or danger.
– 2. Freedom from doubt, anxiety, or fear.
– 3. Something that gives safety, such as:
• 1. A group or department of private guards:
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, by a business or homeowner, to prevent a
crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
March 19, 2017 Lithuania 5
Why do we need security?
 Protect vital information when we still let
access to those who need it
– Trade secrets, medical records, etc.
 Guarantee availability of resources
March 19, 2017 Lithuania 6
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Contractors to various government agencies
 Multinational corporations
 ANYONE ON THE NETWORK
March 19, 2017 Lithuania 7
Counter-measures against
common security attacks
 Finding a way into the network
– Firewalls
 Exploiting software bugs, buffer overflows
– Intrusion Detection Systems
 TCP hijacking
– IPSec
 Social problems
– Education
March 19, 2017 Lithuania 8
Firewalls
 A firewall is like a castle with a drawbridge
– Only one point of access into the network
– This can be good or bad
 Can be hardware or software
– Ex. Some routers come with firewall functionality
– ipfw, ipchains, pf on Unix systems, Windows XP
and Mac OS X have built in firewalls
March 19, 2017 Lithuania 9
Firewalls
Basic problems:
- Many network applications have security
problems that are fixed over time.
– Difficult for users to up-date and keep host
secure.
Solution
• Administrators limit access to end hosts by using a
firewall.
• Firewall is kept up-to-date by administrators.
March 19, 2017 Lithuania 10
Firewalls
Intranet
DMZInternet
Firewall
Firewall
Web server, email
server, web proxy,
etc
March 19, 2017 Lithuania 11
Firewalls
 Used to filter packets based on a combination of
features
March 19, 2017 Lithuania 12
Intrusion Detection
 Used to monitor for “suspicious activity” on a
network
– Can protect against known software exploits, like
buffer overflows
 Open Source IDS: Snort, www.snort.org
March 19, 2017 Lithuania 13
Denial of Service
 Some cyber attackes make a network service
unusable, usually by overloading the server
or network.
 Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
– Mini Case Study: Code-Red
March 19, 2017 Lithuania 14
Denial of Service
March 19, 2017 Lithuania 15
Social Problems
- People can be dangerous like unprotected
computer systems
– People can be manipulated to give up valuable
information
– Most humans will break down once they are at
the “harmed” stage, if they are not specially
trained.
• Think government here…
March 19, 2017 Lithuania 16
Social Problems
 The best that can be done is to implement a wide variety of
solutions and more closely monitor who has access to
network resources and information
– But, this solution is still not perfect.
March 19, 2017 Lithuania 17
Conclusions
 The Internet works only because we implicitly
trust one another.
 It is very easy to exploit this trust
 The same is true for software
 It is important to stay on top of the latest
CERT security advisories to know how to
patch any security holes
March 19, 2017 Lithuania 18
Security related URLs
 http://www.robertgraham.com/pubs/network-
intrusion-detection.html
 http://online.securityfocus.com/infocus/1527
 http://www.snort.org/
 http://www.cert.org/
 http://www.nmap.org/
 http://grc.com/dos/grcdos.htm
 http://lcamtuf.coredump.cx/newtcp/

More Related Content

What's hot

Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityBizSmart Select
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionIsaiah Edem
 
iAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUPiAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUPIstvan Balazs
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth GeersCODE BLUE
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
APNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Arm Igf
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
Introduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and PracticeIntroduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and Practicegasuba4673
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1vincentleone
 
Introduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and PracticeIntroduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and Practicegozuf
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 

What's hot (19)

Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber Security
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
iAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUPiAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUP
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
It securities
It securitiesIt securities
It securities
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
APNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC update PNG IXP Inauguration
APNIC update PNG IXP Inauguration
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Introduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and PracticeIntroduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and Practice
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
 
Introduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and PracticeIntroduction to Network Security: Theory and Practice
Introduction to Network Security: Theory and Practice
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 

Similar to Network Security

Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelSURFnet
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Grid Analytics Europe 2016: "Defend the Grid", April 2016
Grid Analytics Europe 2016: "Defend the Grid", April 2016Grid Analytics Europe 2016: "Defend the Grid", April 2016
Grid Analytics Europe 2016: "Defend the Grid", April 2016OMNETRIC
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Bonagiri Rajitha
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1UDCNTT
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, ArduinoParis Open Source Summit
 

Similar to Network Security (20)

Network security
Network securityNetwork security
Network security
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Grid Analytics Europe 2016: "Defend the Grid", April 2016
Grid Analytics Europe 2016: "Defend the Grid", April 2016Grid Analytics Europe 2016: "Defend the Grid", April 2016
Grid Analytics Europe 2016: "Defend the Grid", April 2016
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
 
The red book
The red book  The red book
The red book
 
Forensics
ForensicsForensics
Forensics
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados PessoaisDiretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Information security
Information securityInformation security
Information security
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014Jisc e safety presentation AoC 2014
Jisc e safety presentation AoC 2014
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 

More from Apostolos Syropoulos

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolApostolos Syropoulos
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...Apostolos Syropoulos
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectApostolos Syropoulos
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceApostolos Syropoulos
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionApostolos Syropoulos
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςApostolos Syropoulos
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνApostolos Syropoulos
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραApostolos Syropoulos
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςApostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Apostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Apostolos Syropoulos
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαApostolos Syropoulos
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxApostolos Syropoulos
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...Apostolos Syropoulos
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesApostolos Syropoulos
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetApostolos Syropoulos
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουApostolos Syropoulos
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Apostolos Syropoulos
 

More from Apostolos Syropoulos (20)

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of school
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων Ξάνθης
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο Αβδήρων
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία Άβδηρα
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της Ξάνθης
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά Ασία
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
 
How to Convert Units of Measure
How to Convert Units of MeasureHow to Convert Units of Measure
How to Convert Units of Measure
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and Adjectives
 
Learning Simple Phrases in Greek
Learning Simple Phrases in GreekLearning Simple Phrases in Greek
Learning Simple Phrases in Greek
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek Alphabet
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μου
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...
 

Recently uploaded

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic ManagementBeyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Managementseank14
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfe-Market Hub
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样AS
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理F
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...mikehavy0
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样ayvbos
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodierahman018755
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Dewi Agency
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformonhackersuli
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27APNIC
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样AS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书F
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsrahman018755
 

Recently uploaded (20)

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic ManagementBeyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Management
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 

Network Security

  • 1. March 19, 2017 Lithuania 1 Network Security Daniyal Hosseini Ahmet Cuvadaroglu High School Istanbul, Turkey asoltaj@yahoo.com
  • 2. March 19, 2017 Lithuania 2 Overview  What is security?  Why do we need security?  Who is vulnerable?  Countermeasures against common security attacks - Firewalls & Intrusion Detection Systems - Denial of Service Attacks - Social Problems
  • 3. What is security? 15-441 Networks Fall 2002 3
  • 4. March 19, 2017 Lithuania 4 What is “Security”  Dictionary.com says: – 1. Freedom from risk or danger. – 2. Freedom from doubt, anxiety, or fear. – 3. Something that gives safety, such as: • 1. A group or department of private guards: • 2. Measures adopted by a government to prevent espionage, sabotage, or attack. • 3. Measures adopted, by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 5. March 19, 2017 Lithuania 5 Why do we need security?  Protect vital information when we still let access to those who need it – Trade secrets, medical records, etc.  Guarantee availability of resources
  • 6. March 19, 2017 Lithuania 6 Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Contractors to various government agencies  Multinational corporations  ANYONE ON THE NETWORK
  • 7. March 19, 2017 Lithuania 7 Counter-measures against common security attacks  Finding a way into the network – Firewalls  Exploiting software bugs, buffer overflows – Intrusion Detection Systems  TCP hijacking – IPSec  Social problems – Education
  • 8. March 19, 2017 Lithuania 8 Firewalls  A firewall is like a castle with a drawbridge – Only one point of access into the network – This can be good or bad  Can be hardware or software – Ex. Some routers come with firewall functionality – ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls
  • 9. March 19, 2017 Lithuania 9 Firewalls Basic problems: - Many network applications have security problems that are fixed over time. – Difficult for users to up-date and keep host secure. Solution • Administrators limit access to end hosts by using a firewall. • Firewall is kept up-to-date by administrators.
  • 10. March 19, 2017 Lithuania 10 Firewalls Intranet DMZInternet Firewall Firewall Web server, email server, web proxy, etc
  • 11. March 19, 2017 Lithuania 11 Firewalls  Used to filter packets based on a combination of features
  • 12. March 19, 2017 Lithuania 12 Intrusion Detection  Used to monitor for “suspicious activity” on a network – Can protect against known software exploits, like buffer overflows  Open Source IDS: Snort, www.snort.org
  • 13. March 19, 2017 Lithuania 13 Denial of Service  Some cyber attackes make a network service unusable, usually by overloading the server or network.  Many different kinds of DoS attacks – SYN flooding – SMURF – Distributed attacks – Mini Case Study: Code-Red
  • 14. March 19, 2017 Lithuania 14 Denial of Service
  • 15. March 19, 2017 Lithuania 15 Social Problems - People can be dangerous like unprotected computer systems – People can be manipulated to give up valuable information – Most humans will break down once they are at the “harmed” stage, if they are not specially trained. • Think government here…
  • 16. March 19, 2017 Lithuania 16 Social Problems  The best that can be done is to implement a wide variety of solutions and more closely monitor who has access to network resources and information – But, this solution is still not perfect.
  • 17. March 19, 2017 Lithuania 17 Conclusions  The Internet works only because we implicitly trust one another.  It is very easy to exploit this trust  The same is true for software  It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
  • 18. March 19, 2017 Lithuania 18 Security related URLs  http://www.robertgraham.com/pubs/network- intrusion-detection.html  http://online.securityfocus.com/infocus/1527  http://www.snort.org/  http://www.cert.org/  http://www.nmap.org/  http://grc.com/dos/grcdos.htm  http://lcamtuf.coredump.cx/newtcp/