SlideShare a Scribd company logo
Chapter 3
Protecting Systems
 At least one in ten web pages are booby-trapped
with malware (link Ch 3a)
 Just viewing an infected Web page installs
malware on your computer, if your operating
system and browser are vulnerable
 Explain how to harden operating systems
 List ways to prevent attacks through a Web
browser
 Define SQL injection and explain how to protect
against it
 Explain how to protect systems from
communications-based attacks
 Describe various software security applications
 Updates to the operating system
 Protecting against buffer overflows
 Configuring operating system protections
 Operating systems are huge and contain many bugs
(errors in code)
 Linux contains 0.17 bug per 1,000 lines of code
 Typical commercial software contains 20-30 bugs per
1,000 lines of code (link Ch 3b)
 81 bugs a day were reported for Windows Vista Beta 2
(link Ch 3c)
 Some of those bugs create vulnerabilities
 Security patch
 A general software security update intended to cover
vulnerabilities that have been discovered
 Hotfix addresses a specific customer situation
 Often may not be distributed outside that customer’s
organization
 Service pack
 A cumulative package of all security updates plus
additional features
 Automatic
Updates
Options
 Patches can
sometimes
create new
problems
 Used to manage patches locally instead of relying
upon the vendor’s online update service
 Advantages
 Administrators can test patches before deploying
them
 Every machine is updated simultaneously
 Users cannot disable or circumvent updates
 Can save bandwidth and time
 Computers that do not have Internet access can
receive updates
 Buffer overflow
 Occurs when a process attempts to store data in
random access memory (RAM) beyond the
boundaries of a fixed-length storage buffer
 Extra data overflows into the adjacent memory
locations and under certain conditions may cause the
computer to stop functioning
 Attackers also use a buffer overflow in order to
compromise a computer
 Basic defenses
 Write “defensive” program code that will protect
against these attacks
 Use a programming language that makes these
attacks more difficult
 For Windows-based systems, there are two
defenses against buffer overflows
 Data execution prevention (DEP)
 Address space layout randomization (ASLR)
 Most modern CPUs support an NX (No
eXecute) bit to designate a part of memory
for containing only data
 DEP will not allow code in the memory area
to be executed
 Windows Vista allows software developers to
enable NX hardware protection specifically
for the application software that they develop
 In Windows 7
 Start, right-click
Computer,
Properties,
Advanced System
Settings, Advanced
Tab, Performance
Settings
 Randomly assigns executable operating system
code to one of 256 possible locations in memory
 This makes it harder for an attacker to locate
and take advantage of any functionality inside
these executables
 ASLR is most effective when it is used in
conjunction with DEP
 Download Process Explorer (link Ch 3e)
 View, Show Lower Pane
 View, Lower Pane View, DLLS
 View, Select Columns, DLL tab, Base Address
 Select explorer.exe and find ntdll.dll
 Reboot to see base address change
 (link Ch 3d)
 Four steps:
 Security policy
 Define defense mechanisms company will use
 Configuration baseline
 Operating System settings
 Security template
 A set of settings in a single package
 Deployment
 Manually or through Group Policy
 Cookies
 JavaScript
 Java
 ActiveX
 Cross-site scripting (XSS)
 Cookies are computer files that contain user-
specific information
 Types of cookies
 First-party cookie
 Third-party cookie
 Cookies can pose a privacy risk
 Cookies can be used to track the browsing or buying
habits of a user
 Defenses against cookies include disabling the
creation of cookies or deleting them once they are
created
 JavaScript
 Developed by Netscape
 Scripting language that does not create standalone
applications
 Scripting language
 A computer programming language that is typically
interpreted into a language the computer can understand
 Visiting a Web site that automatically downloads a
program to run on a local computer can be
dangerous
 Several defense mechanisms prevent JavaScript
programs from causing serious harm:
 JavaScript cannot read or write files
 JavaScript cannot connect to other machines on your
LAN
 Other security concerns remain:
 JavaScript programs can capture and send user
information without the user’s knowledge or
authorization
 The defense against JavaScript is to disable it
within the Web browser
 Java
 A complete object-oriented programming language
created by Sun Microsystems
 Can be used to create standalone applications
 Java applet
 A separate program stored on a Web server and
downloaded onto a user’s computer along with HTML
code
 Can also be made into hostile programs
 Sandbox is a defense against a hostile Java
applet
 Surrounds program and keeps it away from private
data and other resources on a local computer
 Two types of Java applets:
 Unsigned Java applet: program that does not come
from a trusted source
 Signed Java applet: has information proving the
program is from a trusted source and has not been
altered
 Set of technologies developed by Microsoft
 Not a programming language but a set of rules for
how applications should share information
 ActiveX controls
 Also called add-ons or ActiveX applications
 Represent a specific way of implementing ActiveX
 Can perform many of the same functions of a Java applet,
but do not run in a sandbox
 Have full access to Windows operating system
 ActiveX poses a number of security concerns
 Nearly all ActiveX control security mechanisms
are set in Internet Explorer
 ActiveX controls do not rely exclusively on
Internet Explorer
 However, can be installed and executed
independently
 The defense against ActiveX is to disable it
within the Web browser
 Cross Site Scripting (XSS)
 An attack in which malicious code is inserted into a
specific type of dynamic Web page
 Typically involves using client-side scripts written in
JavaScript or ActiveX
 Designed to extract information from the victim and
then pass the information to the attacker
 Targeted to Web sites that dynamically generate
Web pages that redisplay (echo) user input that has
not been properly validated
 Cross Site Scripting (XSS) attack steps
 An attacker searches for a Web site that redisplays a
bad login (See Figures 3-8 and 3-9)
 The attacker then creates an attack URL that
contains the embedded JavaScript commands
 A fake e-mail is sent to unsuspecting users with the
attack URL as a modified embedded link in the e-mail
 The unsuspecting victim clicks on the attack URL and
enters his username and password
 Defenses against XSS involve both Web masters
of legitimate sites as well as users
 Webmasters should check that all user input is
validated and that attackers do not have the ability to
inject code
 They also should be sure that all Web services and
database software is patched to prevent XSS
 Users should never click on embedded links in e-mails
 Link Ch 3e
 One of the most common types of attacks
 Uses a form of injection like XSS
 Hinges on an attacker being able to enter an
SQL database query into a dynamic Web page
 SQL (structured query language)
 A language used to view and manipulate data that is
stored in a relational database
 Hackthissite.org
 Don't put anything true about you on this site--
they are real criminals
 Displays entire username database
 Comic from xkcd
 Variations to the SQL injection attack
 Deleting data from the database
 Accessing the host operating system through
function calls
 Retrieving a list of all usernames and passwords
 E-mail systems use two TCP/IP protocols to send
and receive messages
 Simple Mail Transfer Protocol (SMTP) handles outgoing
mail
 Post Office Protocol (POP3 for the current version)
handles incoming mail
 IMAP (Internet Mail Access Protocol)
 A more advanced protocol that solves many problems
 E-mail remains on the e-mail server
 Mail can be organized into folders and read from any
computer
 Current version is IMAP4
 SMTP relay
 SMTP servers can forward e-mail sent from an e-mail
client to a remote domain
 SMTP open relay
 If SMTP relay is not controlled, an attacker can use it to
forward thousands of spam e-mail messages
 The defenses against SMTP open relay are to turn
off mail relay altogether
 So that all users send and receive e-mail from the local
SMTP server only or limit relays to only local users
 Instant messaging (IM)
 Real-time communication between two or more
users
 Can also be used to chat between several users
simultaneously, to send and receive files, and to
receive real-time stock quotes and news
 Basic IM has several security vulnerabilities
 IM provides a direct connection to the user’s
computer; attackers can use this connection to
spread viruses and worms
 IM is not encrypted by default so attackers could view
the content of messages
 Steps to secure IM include:
 Keep the IM server within the organization’s firewall
and only permit users to send and receive messages
with trusted internal workers
 Enable IM virus scanning
 Block all IM file transfers
 Encrypt messages
 Peer-to-peer (P2P) network
 Uses a direct connection between users
 Does not have servers, so each device simultaneously
functions as both a client and a server to all other devices
connected to the network
 P2P networks are typically used for connecting
devices on an ad hoc basis
 For file sharing of audio, video, and data, or real-time data
transmission such as telephony traffic
 Viruses, worms, Trojan horses, and spyware can be
sent using P2P
 A new type of P2P network has emerged known
as BitTorrent
 Torrents are active Internet connections that
download a specific file available through a
tracker
 Server program operated by the person or organization
that wants to share the file
 With BitTorrent, files are advertised
 BitTorrent downloads are often illegal and
contain malware
 Antivirus
 Anti-spam
 Popup blockers
 Personal software firewalls
 Host intrusion detection systems
 Antivirus (AV) software
 Scan a computer for infections as well as monitor
computer activity and scan all new documents, such
as e-mail attachments, that might contain a virus
 If a virus is detected, options generally include
cleaning the file of the virus, quarantining the
infected file, or deleting the file
 The drawback of AV software is that it must be
continuously updated to recognize new viruses
 AV software use definition files or signature files
 Popup
 A small Web browser window that appears over the Web
site that is being viewed
 Popup blocker
 Allows the user to limit or block most popups
 Can be either a separate program or a feature
incorporated within a browser
 As a separate program, popup blockers are often
part of a package known as antispyware
 Helps prevent computers from becoming infected by
different types of spyware
 Two different options for installing a corporate
spam filter
 Install the spam filter with the SMTP server
 See Figure 3-14
 Install the spam filter with the POP3 server
 See Figure 3-15
 Another way to filter spam is for the
organization to contract with a third-party entity
 That filters out spam
 All e-mail is directed to the third-party’s remote
spam filter
 Where it is cleansed before it is redirected back to the
organization
 This can be accomplished by changing the MX (mail
exchange) record
 A third method is to filter spam on the local
computer
 Typically, the e-mail client contains several different
features to block spam, such as:
 Level of junk e-mail protection
 Blocked senders
 Allowed senders
 Blocked top level domain list
 A final method of spam filtering is to install separate
filtering software that works with the e-mail client
software
 Very effective
 Free
 Automatic -
effortless to use
 Firewall, sometimes called a packet filter
 Designed to prevent malicious packets from entering
or leaving computers
 Can be software-based or hardware-based
 Personal software firewall
 Runs as a program on a local system to protect it
against attacks
 Many operating systems now come with
personal software firewalls
 Or they can be installed as separate programs
 Monitors network traffic
 Detects and possibly prevents attempts to
 HIDS are software-based and run on a local computer
 These systems can be divided into four groups:
 File system monitors
 Logfile analyzers
 Connection analyzers
 Kernel analyzers
 HIDS compare new behavior against normal
behavior

More Related Content

What's hot

Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
Xperteks
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
EnclaveSecurity
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
Hameda Hurmat
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
Jose Manuel Ortega Candel
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
Real Estate
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
Pratik Tamgadge
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
Damian T. Gordon
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
AjayKumar73315
 
Firewalls
FirewallsFirewalls
Firewalls
Ram Dutt Shukla
 
Secure Code Warrior - Unrestricted file upload
Secure Code Warrior - Unrestricted file uploadSecure Code Warrior - Unrestricted file upload
Secure Code Warrior - Unrestricted file upload
Secure Code Warrior
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Salem Trabelsi
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Tratando as vulnerabilidades do Top 10 com php
Tratando as vulnerabilidades do Top 10 com phpTratando as vulnerabilidades do Top 10 com php
Tratando as vulnerabilidades do Top 10 com php
Conviso Application Security
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
davidjohnrace
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
What is active directory
What is active directoryWhat is active directory
What is active directory
Adeel Khurram
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
Herman Arnedo
 

What's hot (20)

Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
Secure Code Warrior - Unrestricted file upload
Secure Code Warrior - Unrestricted file uploadSecure Code Warrior - Unrestricted file upload
Secure Code Warrior - Unrestricted file upload
 
Operating system security
Operating system securityOperating system security
Operating system security
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Tratando as vulnerabilidades do Top 10 com php
Tratando as vulnerabilidades do Top 10 com phpTratando as vulnerabilidades do Top 10 com php
Tratando as vulnerabilidades do Top 10 com php
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 

Viewers also liked

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
Amy McMullin
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
Information Technology
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Information Technology
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
Information Technology
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and Procedures
Information Technology
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
Information Technology
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
Information Technology
 
Web303
Web303Web303
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
Information Technology
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Information Technology
 
Python 3000
Python 3000Python 3000
Python 3000
Bob Chao
 
Python programming lab2
Python programming lab2Python programming lab2
Python programming lab2
profbnk
 
Cc code cards
Cc code cardsCc code cards
Cc code cards
ysolanki78
 
Introduction to Graphics
Introduction to GraphicsIntroduction to Graphics
Introduction to Graphics
primeteacher32
 
Apache Web Server Setup 3
Apache Web Server Setup 3Apache Web Server Setup 3
Apache Web Server Setup 3
Information Technology
 
OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0guest4d09
 

Viewers also liked (20)

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and Procedures
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 
Web303
Web303Web303
Web303
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Python 3000
Python 3000Python 3000
Python 3000
 
Python programming lab2
Python programming lab2Python programming lab2
Python programming lab2
 
Cc code cards
Cc code cardsCc code cards
Cc code cards
 
Introduction to Graphics
Introduction to GraphicsIntroduction to Graphics
Introduction to Graphics
 
Apache Web Server Setup 3
Apache Web Server Setup 3Apache Web Server Setup 3
Apache Web Server Setup 3
 
OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0OSCON 2008: Porting to Python 3.0
OSCON 2008: Porting to Python 3.0
 

Similar to Ch03 Protecting Systems

Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
SecurityTube.Net
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
Report on xss and do s
Report on xss and do sReport on xss and do s
Report on xss and do s
mehr77
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
brittanyjespersen
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
AjaySahre
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
Vi Tính Hoàng Nam
 
2071
20712071
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
Bansari Shah
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
Barrel Software
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Software security
Software securitySoftware security
Software security
jes_d
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
AngelinaJasper
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Web-Security-Application.pptx
Web-Security-Application.pptxWeb-Security-Application.pptx
Web-Security-Application.pptx
hamidTalib2
 

Similar to Ch03 Protecting Systems (20)

Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Report on xss and do s
Report on xss and do sReport on xss and do s
Report on xss and do s
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
2071
20712071
2071
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Software security
Software securitySoftware security
Software security
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Web-Security-Application.pptx
Web-Security-Application.pptxWeb-Security-Application.pptx
Web-Security-Application.pptx
 

More from Information Technology

Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
Information Technology
 
SAN
SANSAN
SAN Review
SAN ReviewSAN Review
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
Information Technology
 
RAID Review
RAID ReviewRAID Review
Review of SQL
Review of SQLReview of SQL
Review of SQL
Information Technology
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
Information Technology
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
Information Technology
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
Information Technology
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
Information Technology
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
Information Technology
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
Information Technology
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
Information Technology
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
Information Technology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
Information Technology
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
Information Technology
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
Information Technology
 
Web Hacking
Web HackingWeb Hacking
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
Information Technology
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
Information Technology
 

More from Information Technology (20)

Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
 
SAN
SANSAN
SAN
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 

Ch03 Protecting Systems

  • 2.  At least one in ten web pages are booby-trapped with malware (link Ch 3a)  Just viewing an infected Web page installs malware on your computer, if your operating system and browser are vulnerable
  • 3.  Explain how to harden operating systems  List ways to prevent attacks through a Web browser  Define SQL injection and explain how to protect against it  Explain how to protect systems from communications-based attacks  Describe various software security applications
  • 4.
  • 5.  Updates to the operating system  Protecting against buffer overflows  Configuring operating system protections
  • 6.  Operating systems are huge and contain many bugs (errors in code)  Linux contains 0.17 bug per 1,000 lines of code  Typical commercial software contains 20-30 bugs per 1,000 lines of code (link Ch 3b)  81 bugs a day were reported for Windows Vista Beta 2 (link Ch 3c)  Some of those bugs create vulnerabilities
  • 7.
  • 8.
  • 9.  Security patch  A general software security update intended to cover vulnerabilities that have been discovered  Hotfix addresses a specific customer situation  Often may not be distributed outside that customer’s organization  Service pack  A cumulative package of all security updates plus additional features
  • 10.
  • 11.  Automatic Updates Options  Patches can sometimes create new problems
  • 12.  Used to manage patches locally instead of relying upon the vendor’s online update service  Advantages  Administrators can test patches before deploying them  Every machine is updated simultaneously  Users cannot disable or circumvent updates  Can save bandwidth and time  Computers that do not have Internet access can receive updates
  • 13.
  • 14.  Buffer overflow  Occurs when a process attempts to store data in random access memory (RAM) beyond the boundaries of a fixed-length storage buffer  Extra data overflows into the adjacent memory locations and under certain conditions may cause the computer to stop functioning  Attackers also use a buffer overflow in order to compromise a computer
  • 15.
  • 16.  Basic defenses  Write “defensive” program code that will protect against these attacks  Use a programming language that makes these attacks more difficult  For Windows-based systems, there are two defenses against buffer overflows  Data execution prevention (DEP)  Address space layout randomization (ASLR)
  • 17.  Most modern CPUs support an NX (No eXecute) bit to designate a part of memory for containing only data  DEP will not allow code in the memory area to be executed  Windows Vista allows software developers to enable NX hardware protection specifically for the application software that they develop
  • 18.  In Windows 7  Start, right-click Computer, Properties, Advanced System Settings, Advanced Tab, Performance Settings
  • 19.  Randomly assigns executable operating system code to one of 256 possible locations in memory  This makes it harder for an attacker to locate and take advantage of any functionality inside these executables  ASLR is most effective when it is used in conjunction with DEP
  • 20.  Download Process Explorer (link Ch 3e)  View, Show Lower Pane  View, Lower Pane View, DLLS  View, Select Columns, DLL tab, Base Address  Select explorer.exe and find ntdll.dll  Reboot to see base address change  (link Ch 3d)
  • 21.
  • 22.  Four steps:  Security policy  Define defense mechanisms company will use  Configuration baseline  Operating System settings  Security template  A set of settings in a single package  Deployment  Manually or through Group Policy
  • 23.
  • 24.  Cookies  JavaScript  Java  ActiveX  Cross-site scripting (XSS)
  • 25.  Cookies are computer files that contain user- specific information  Types of cookies  First-party cookie  Third-party cookie  Cookies can pose a privacy risk  Cookies can be used to track the browsing or buying habits of a user  Defenses against cookies include disabling the creation of cookies or deleting them once they are created
  • 26.  JavaScript  Developed by Netscape  Scripting language that does not create standalone applications  Scripting language  A computer programming language that is typically interpreted into a language the computer can understand  Visiting a Web site that automatically downloads a program to run on a local computer can be dangerous
  • 27.
  • 28.  Several defense mechanisms prevent JavaScript programs from causing serious harm:  JavaScript cannot read or write files  JavaScript cannot connect to other machines on your LAN  Other security concerns remain:  JavaScript programs can capture and send user information without the user’s knowledge or authorization  The defense against JavaScript is to disable it within the Web browser
  • 29.  Java  A complete object-oriented programming language created by Sun Microsystems  Can be used to create standalone applications  Java applet  A separate program stored on a Web server and downloaded onto a user’s computer along with HTML code  Can also be made into hostile programs
  • 30.
  • 31.  Sandbox is a defense against a hostile Java applet  Surrounds program and keeps it away from private data and other resources on a local computer  Two types of Java applets:  Unsigned Java applet: program that does not come from a trusted source  Signed Java applet: has information proving the program is from a trusted source and has not been altered
  • 32.
  • 33.  Set of technologies developed by Microsoft  Not a programming language but a set of rules for how applications should share information  ActiveX controls  Also called add-ons or ActiveX applications  Represent a specific way of implementing ActiveX  Can perform many of the same functions of a Java applet, but do not run in a sandbox  Have full access to Windows operating system  ActiveX poses a number of security concerns
  • 34.  Nearly all ActiveX control security mechanisms are set in Internet Explorer  ActiveX controls do not rely exclusively on Internet Explorer  However, can be installed and executed independently  The defense against ActiveX is to disable it within the Web browser
  • 35.  Cross Site Scripting (XSS)  An attack in which malicious code is inserted into a specific type of dynamic Web page  Typically involves using client-side scripts written in JavaScript or ActiveX  Designed to extract information from the victim and then pass the information to the attacker  Targeted to Web sites that dynamically generate Web pages that redisplay (echo) user input that has not been properly validated
  • 36.  Cross Site Scripting (XSS) attack steps  An attacker searches for a Web site that redisplays a bad login (See Figures 3-8 and 3-9)  The attacker then creates an attack URL that contains the embedded JavaScript commands  A fake e-mail is sent to unsuspecting users with the attack URL as a modified embedded link in the e-mail  The unsuspecting victim clicks on the attack URL and enters his username and password
  • 37.
  • 38.
  • 39.
  • 40.  Defenses against XSS involve both Web masters of legitimate sites as well as users  Webmasters should check that all user input is validated and that attackers do not have the ability to inject code  They also should be sure that all Web services and database software is patched to prevent XSS  Users should never click on embedded links in e-mails
  • 42.  One of the most common types of attacks  Uses a form of injection like XSS  Hinges on an attacker being able to enter an SQL database query into a dynamic Web page  SQL (structured query language)  A language used to view and manipulate data that is stored in a relational database
  • 43.  Hackthissite.org  Don't put anything true about you on this site-- they are real criminals
  • 44.  Displays entire username database
  • 46.  Variations to the SQL injection attack  Deleting data from the database  Accessing the host operating system through function calls  Retrieving a list of all usernames and passwords
  • 47.
  • 48.  E-mail systems use two TCP/IP protocols to send and receive messages  Simple Mail Transfer Protocol (SMTP) handles outgoing mail  Post Office Protocol (POP3 for the current version) handles incoming mail  IMAP (Internet Mail Access Protocol)  A more advanced protocol that solves many problems  E-mail remains on the e-mail server  Mail can be organized into folders and read from any computer  Current version is IMAP4
  • 49.
  • 50.  SMTP relay  SMTP servers can forward e-mail sent from an e-mail client to a remote domain  SMTP open relay  If SMTP relay is not controlled, an attacker can use it to forward thousands of spam e-mail messages  The defenses against SMTP open relay are to turn off mail relay altogether  So that all users send and receive e-mail from the local SMTP server only or limit relays to only local users
  • 51.  Instant messaging (IM)  Real-time communication between two or more users  Can also be used to chat between several users simultaneously, to send and receive files, and to receive real-time stock quotes and news  Basic IM has several security vulnerabilities  IM provides a direct connection to the user’s computer; attackers can use this connection to spread viruses and worms  IM is not encrypted by default so attackers could view the content of messages
  • 52.  Steps to secure IM include:  Keep the IM server within the organization’s firewall and only permit users to send and receive messages with trusted internal workers  Enable IM virus scanning  Block all IM file transfers  Encrypt messages
  • 53.  Peer-to-peer (P2P) network  Uses a direct connection between users  Does not have servers, so each device simultaneously functions as both a client and a server to all other devices connected to the network  P2P networks are typically used for connecting devices on an ad hoc basis  For file sharing of audio, video, and data, or real-time data transmission such as telephony traffic  Viruses, worms, Trojan horses, and spyware can be sent using P2P
  • 54.  A new type of P2P network has emerged known as BitTorrent  Torrents are active Internet connections that download a specific file available through a tracker  Server program operated by the person or organization that wants to share the file  With BitTorrent, files are advertised  BitTorrent downloads are often illegal and contain malware
  • 55.  Antivirus  Anti-spam  Popup blockers  Personal software firewalls  Host intrusion detection systems
  • 56.  Antivirus (AV) software  Scan a computer for infections as well as monitor computer activity and scan all new documents, such as e-mail attachments, that might contain a virus  If a virus is detected, options generally include cleaning the file of the virus, quarantining the infected file, or deleting the file  The drawback of AV software is that it must be continuously updated to recognize new viruses  AV software use definition files or signature files
  • 57.  Popup  A small Web browser window that appears over the Web site that is being viewed  Popup blocker  Allows the user to limit or block most popups  Can be either a separate program or a feature incorporated within a browser  As a separate program, popup blockers are often part of a package known as antispyware  Helps prevent computers from becoming infected by different types of spyware
  • 58.
  • 59.  Two different options for installing a corporate spam filter  Install the spam filter with the SMTP server  See Figure 3-14  Install the spam filter with the POP3 server  See Figure 3-15
  • 60.
  • 61.
  • 62.  Another way to filter spam is for the organization to contract with a third-party entity  That filters out spam  All e-mail is directed to the third-party’s remote spam filter  Where it is cleansed before it is redirected back to the organization  This can be accomplished by changing the MX (mail exchange) record
  • 63.  A third method is to filter spam on the local computer  Typically, the e-mail client contains several different features to block spam, such as:  Level of junk e-mail protection  Blocked senders  Allowed senders  Blocked top level domain list  A final method of spam filtering is to install separate filtering software that works with the e-mail client software
  • 64.  Very effective  Free  Automatic - effortless to use
  • 65.  Firewall, sometimes called a packet filter  Designed to prevent malicious packets from entering or leaving computers  Can be software-based or hardware-based  Personal software firewall  Runs as a program on a local system to protect it against attacks  Many operating systems now come with personal software firewalls  Or they can be installed as separate programs
  • 66.  Monitors network traffic  Detects and possibly prevents attempts to  HIDS are software-based and run on a local computer  These systems can be divided into four groups:  File system monitors  Logfile analyzers  Connection analyzers  Kernel analyzers  HIDS compare new behavior against normal behavior