3. The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
There’re two sides to a coin. Internet also has it’s own
disadvantages that is Cyber crime- Illegal activity
committed on the internet .
INTRODUCTION
5. Hacker vs Cracker
The general view is that, while hackers build things,
crackers break things.
Cracker is the name given to hackers who break into
computers for criminal gain; whereas, hackers can also be
internet security experts hired to find
vulnerabilities in systems .
6. Types Of Hackers
A Black hat hacker is an individual with extensive
computer knowledge whose purpose is to breach
or bypass internet security.
Gray hat hackers refers to a computer hacker or
computer security expert whose ethical
standards fall somewhere between purely
altruistic and purely malicious.
7. White hat hacker refers to ethical
computer hacker who specializes in penetration testing
and in other testing methodologies to ensure the
security of an organization's information systems.
ANONYMOUS GROUP
Anonymous is a international network of activist and hacktivist entities. The
group became known for a series of well-publicized publicity stunts and
distributed denial-of-service (DDoS) attacks on government, religious, and
corporate website .
8. Firewall is a network security system that monitors
and controls the incoming and outgoing network traffic
based on predetermined security rules.
A firewall typically establishes a barrier between a
trusted, secure internal network and another outside
network, such as the Internet, that is assumed not to
be secure or trusted.
9. Hardware Firewalls
Protect an entire network
Implemented on the router level
Usually more expensive, harder to configure
Software Firewalls
Protect a single computer
Usually less expensive, easier to configure
10. FIREWALL ARCHITECTURES
The configuration that works best for a particular organization
depends on three factors:
The objectives of the network
the organization‘s ability to develop and implement the
architectures
the budget available for the function
Packet filtering
routers
Screened
subnet firewalls.Dual-homed
firewalls
Screened host
firewalls
11. Bastion Host
A bastion host is a special purpose computer on a
network specifically designed and configured to
withstand attacks.
Generally , placed outside the firewall
For example a proxy server, and all other services
are removed or limited to reduce the threat to the
computer.
12. Architecture with high complexity
In this architectural approach , the bastion host contains two NICs
(Network Interface Cards)
One NIC is connected to the external network, and one is connected to
the internal network, providing an additional layer of protection.
Implementation of this architecture often makes use of NATs.
13. WHAT IS NAT ?
Function as network-level proxy
Convert IP addresses of internal hosts to IP address
assigned by firewall
14. Taking advantage of this , NAT prevents external
attacks from reaching internal machines with
addresses in specified ranges.
Hide TCP/IP information of hosts in the network being
protected, preventing hackers from getting address of
actual host
15.
16. ADVANTAGES OF DUAL – HOMED ARCHITECTURE
High protection as compared to Packet Filtering and
Screened host architecture.
Overall Strong protection at low expense
LIMITATIONS OF DUAL – HOMED ARCHITECTURE
It can disable the connection to the external network, and as
traffic volume increases, it can become over- loaded.
18. • The standard TCP port 22 has been assigned for contacting
SSH servers.
• An SSH tunnel can provide a secure path over the Internet,
through a firewall to a virtual machine.
«Secure Shell (SSH) is a cryptographic network
protocol for secure data communication, remote
shell services or command execution and other
secure network services between two networked
computers that connects, via a secure
channel over an insecure network, a server and
a client
Definition
19. Client-> Computer programs that can make requests to servers and fetch
responses are called clients
Server->A web server can listen to requests and respond back with data on
the same connection
Structure
20. SSH-Usage
• SecureSHell handles the set up and generation of an
encrypted TCP connection
• SSH can handle secure remote logins (ssh)
• SSH can handle secure file copy (scp)
. SSH can even drive secure FTP (sftp)
23. I Password Authentication
Password Authentication
• The user specifies the username
and corresponding password.
Prompts for Password
you
server
ssh
sshd
you> ssh
mac-1
password: ****
other>
24. • Doesn’t require user credentials
(password or key)
• Provides trust based on hostname and
user id
• User id on both system has to be the
same
• Disabled by default -- not that useful
II Host-based Authentication
25. CYBER AWARENESS
Premise one: Cyber security should be viewed and managed as a strategic
activity that impacts the enterprise’s most valued assets.
Premise two: Designs and plans for cyber security should be data driven to
move from reactive to predictive responses. Shared intelligence among
countries and organizations is critical.
Findings from a recent survey conducted by IBM indicated that organizations
most able to handle or avoid security breaches had some unique
characteristics:
1. Security leaders had a strategic voice in the enterprise;
2. Cyber security was not viewed as an IT issue but as an enterprise wide
responsibility
3. Security budgets were managed at a senior level;
4. Security was considered early in the design of new products and
services; o Measurement and accountability were part of the security
design;
5. A culture of proactively protecting the enterprise existed.
26. Putty
Putty is a SSH client ,open source software used to connect client to
a sever.
.Control over the SSH encryption key
and protocol version.
. Unicode support.
. Support for local serial port
connections.
features
-According to «IT-dictionary», Secure Shell is an alternative protocol to TelNET and Rlogin which connects to UNIX servers.
-SSH was created in 1995 by Finland University Researcher and it was initially open source, as far as it went closed source in 1999
-Normally a data is transmitted between client and server but not in a secure line, like internet.
-To transmit data in a secure line, we use SecureSHell
-This protocol handles TCP-servise one more time, to terminate a secure session utilizing secure encryption.
-There are three available authentication methods
-These for Automatic and secure authentication of both ends connection.
Both the server and the client are authenticated to prevent identiy
spoofing. For example: Trojan horses.
-This is the difference between authentication without without key and with key
-a ready-command «ssh» requests a connection to server
After going through the research paper by Georgia Tech Research Institute, the following premises could be highlighted: