definition: types of security,media stories,goals of computer security,security basics,some of types attack,network attacks,web attacks,os,application and software are attacks,social engineering:network attacks ,packet sniffing,main in the middle,dns hacking......conclusion
2. COMPUTER SECRITY
o Computer and network security was not at all well
known,even about 12 years ago
o Today ,it is something everyone is aware of the need ,but nit
sure what is really means
o Interesting topic of threads ,counter measures
risks,stories,events and paranoia
3. MEDIA STORIES
o Consumers are bombarded with media reports narrating
dangers of the online world
o IDENTITY THEFT
o EMBEZZIEMENT AND FRAUD
o CREDIT CARD THEFT
o CORPORATE LOSS
4. GOALS OF COMPUTER SECURITY
o INTEGRITY
o Guarantee that the data is what we except
o CONFIDENTIALITY
o The information must just be accessible to the
authorized people
o RELIABILITY
o Computer should work without having unexpected
problems
o AUTHENTICATION
o Guarantee that only authorized persons can access to
the resource
5. SECURITY BASICS
WHAT DOES IT MEANS TO BE SECURE ????
o “Include protection of information from theft or corruption
or the preservation of availability as defined in the security
policy.”
o TYPES OF SECURITY
o Network security
o System and software security
o Physical security
o Software cannot protect software (may be hardware can )
o Networks can be protected better than software
6. SOME OF TYPES ATTACK
SOME COMMON ATTACKS
Network attacks
o Packet sniffing man –in –the middle, DNS hacking
Web attacks
o Phishing , SQL injection ,cross site scripting
OS , Application and software attacks
o Virus , trojans , worms , rootkits , buffer overflow
Social Engineering
o (NOT social networking)
7. NETWORK ATTACKS
o PACKET SNIFFING
o Internet traffic consists of the data “PACKETS” an
these can be “SNIFFED”
o Leads to other attacks such as password sniffing
,cookie stealing session hijacking information
technology
o MAN IN THE MIDDLE
o Insert a router in the path between client and server
and change the packet as they pass through
o DNS HIJACKING
o Insert malicious routers in DNS tablets TO send
traffic for genuine sites to malicious sites