SlideShare a Scribd company logo
1
Part 2  Access Control 1Security+ Guide to Network Security Fundamentals, Third Edition
1
11
1 1 tohttps://github.com/syaifulahdan/
INFORMATION SECURITY
Network Security
 Overview
 What is Security
 Why do we Need Security
 Who is Vulnerable
 Common Security attack and there
countermeasure
 Firewalls
 Intrussion Detection
 Dictionary Attack
 Denial of Service
 TCP Attacks
 Five Minute Break
 Packet Sniffing
 Social Problems
 Conclusion
• Justin Weisz
• jweisz@andrew.cmu.edu
2
Part 2  Access Control 2Security+ Guide to Network Security Fundamentals, Third Edition
2
22
2 2 tohttps://github.com/syaifulahdan/
2
A Brief History of the World
3
Part 2  Access Control 3Security+ Guide to Network Security Fundamentals, Third Edition
3
33
3 3 tohttps://github.com/syaifulahdan/
3
Overview
• What is security?
• Why do we need security?
• Who is vulnerable?
• Common security attacks and countermeasures
– Firewalls & Intrusion Detection Systems
– Denial of Service Attacks
– TCP Attacks
– Packet Sniffing
– Social Problems
4
Part 2  Access Control 4Security+ Guide to Network Security Fundamentals, Third Edition
4
44
4 4 tohttps://github.com/syaifulahdan/
4
What is “Security”
• Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
5
Part 2  Access Control 5Security+ Guide to Network Security Fundamentals, Third Edition
5
55
5 5 tohttps://github.com/syaifulahdan/
5
What is “Security”
• Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
6
Part 2  Access Control 6Security+ Guide to Network Security Fundamentals, Third Edition
6
66
6 6 tohttps://github.com/syaifulahdan/
6
What is “Security”
• Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
7
Part 2  Access Control 7Security+ Guide to Network Security Fundamentals, Third Edition
7
77
7 7 tohttps://github.com/syaifulahdan/
7
What is “Security”
• Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
8
Part 2  Access Control 8Security+ Guide to Network Security Fundamentals, Third Edition
8
88
8 8 tohttps://github.com/syaifulahdan/
8
Why do we need security?
• Protect vital information while still allowing
access to those who need it
– Trade secrets, medical records, etc.
• Provide authentication and access control for
resources
– Ex: AFS
• Guarantee availability of resources
– Ex: 5 9’s (99.999% reliability)
9
Part 2  Access Control 9Security+ Guide to Network Security Fundamentals, Third Edition
9
99
9 9 tohttps://github.com/syaifulahdan/
9
Who is vulnerable?
• Financial institutions and banks
• Internet service providers
• Pharmaceutical companies
• Government and defense agencies
• Contractors to various government agencies
• Multinational corporations
• ANYONE ON THE NETWORK
10
Part 2  Access Control 10Security+ Guide to Network Security Fundamentals, Third Edition
10
1010
10 10 tohttps://github.com/syaifulahdan/
10
Common security attacks and
their countermeasures
• Finding a way into the network
– Firewalls
• Exploiting software bugs, buffer overflows
– Intrusion Detection Systems
• Denial of Service
– Ingress filtering, IDS
• TCP hijacking
– IPSec
• Packet sniffing
– Encryption (SSH, SSL, HTTPS)
• Social problems
– Education
11
Part 2  Access Control 11Security+ Guide to Network Security Fundamentals, Third Edition
11
1111
11 11 tohttps://github.com/syaifulahdan/
11
Firewalls
• Basic problem – many network applications
and protocols have security problems that
are fixed over time
– Difficult for users to keep up with changes and
keep host secure
– Solution
• Administrators limit access to end hosts by using a
firewall
• Firewall is kept up-to-date by administrators
12
Part 2  Access Control 12Security+ Guide to Network Security Fundamentals, Third Edition
12
1212
12 12 tohttps://github.com/syaifulahdan/
12
Firewalls
• A firewall is like a castle with a drawbridge
– Only one point of access into the network
– This can be good or bad
• Can be hardware or software
– Ex. Some routers come with firewall functionality
– ipfw, ipchains, pf on Unix systems, Windows XP
and Mac OS X have built in firewalls
13
Part 2  Access Control 13Security+ Guide to Network Security Fundamentals, Third Edition
13
1313
13 13 tohttps://github.com/syaifulahdan/
13
Firewalls
Intranet
DMZInternet
Firewall
Firewall
Web server, email
server, web proxy,
etc
14
Part 2  Access Control 14Security+ Guide to Network Security Fundamentals, Third Edition
14
1414
14 14 tohttps://github.com/syaifulahdan/
14
Firewalls
• Used to filter packets based on a combination of
features
– These are called packet filtering firewalls
• There are other types too, but they will not be discussed
– Ex. Drop packets with destination port of 23 (Telnet)
– Can use any combination of IP/UDP/TCP header
information
– man ipfw on unix47 for much more detail
• But why don’t we just turn Telnet off?
15
Part 2  Access Control 15Security+ Guide to Network Security Fundamentals, Third Edition
15
1515
15 15 tohttps://github.com/syaifulahdan/
15
Firewalls
• Here is what a computer with a default
Windows XP install looks like:
– 135/tcp open loc-srv
– 139/tcp open netbios-ssn
– 445/tcp open microsoft-ds
– 1025/tcp open NFS-or-IIS
– 3389/tcp open ms-term-serv
– 5000/tcp open UPnP
• Might need some of these services, or might
not be able to control all the machines on the
network
16
Part 2  Access Control 16Security+ Guide to Network Security Fundamentals, Third Edition
16
1616
16 16 tohttps://github.com/syaifulahdan/
16
Firewalls
• What does a firewall rule look like?
– Depends on the firewall used
• Example: ipfw
– /sbin/ipfw add deny tcp from cracker.evil.org to
wolf.tambov.su telnet
• Other examples: WinXP & Mac OS X have
built in and third party firewalls
– Different graphical user interfaces
– Varying amounts of complexity and power
17
Part 2  Access Control 17Security+ Guide to Network Security Fundamentals, Third Edition
17
1717
17 17 tohttps://github.com/syaifulahdan/
17
Intrusion Detection
• Used to monitor for “suspicious activity” on a
network
– Can protect against known software exploits, like
buffer overflows
• Open Source IDS: Snort, www.snort.org
18
Part 2  Access Control 18Security+ Guide to Network Security Fundamentals, Third Edition
18
1818
18 18 tohttps://github.com/syaifulahdan/
18
Intrusion Detection
• Uses “intrusion signatures”
– Well known patterns of behavior
• Ping sweeps, port scanning, web server indexing, OS
fingerprinting, DoS attempts, etc.
• Example
– IRIX vulnerability in webdist.cgi
– Can make a rule to drop packets containing the line
• “/cgi-bin/webdist.cgi?distloc=?;cat%20/etc/passwd”
• However, IDS is only useful if contingency plans are
in place to curb attacks as they are occurring
19
Part 2  Access Control 19Security+ Guide to Network Security Fundamentals, Third Edition
19
1919
19 19 tohttps://github.com/syaifulahdan/
19
Minor Detour…
• Say we got the /etc/passwd file from the IRIX
server
• What can we do with it?
20
Part 2  Access Control 20Security+ Guide to Network Security Fundamentals, Third Edition
20
2020
20 20 tohttps://github.com/syaifulahdan/
20
Dictionary Attack
• We can run a dictionary attack on the passwords
– The passwords in /etc/passwd are encrypted with the
crypt(3) function (one-way hash)
– Can take a dictionary of words, crypt() them all, and
compare with the hashed passwords
• This is why your passwords should be meaningless
random junk!
– For example, “sdfo839f” is a good password
• That is not my andrew password
• Please don’t try it either
21
Part 2  Access Control 21Security+ Guide to Network Security Fundamentals, Third Edition
21
2121
21 21 tohttps://github.com/syaifulahdan/
21
Denial of Service
• Purpose: Make a network service unusable,
usually by overloading the server or network
• Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
– Mini Case Study: Code-Red
22
Part 2  Access Control 22Security+ Guide to Network Security Fundamentals, Third Edition
22
2222
22 22 tohttps://github.com/syaifulahdan/
22
Denial of Service
• SYN flooding attack
• Send SYN packets with bogus source address
– Why?
• Server responds with SYN ACK and keeps state
about TCP half-open connection
– Eventually, server memory is exhausted with this state
• Solution: use “SYN cookies”
– In response to a SYN, create a special “cookie” for the
connection, and forget everything else
– Then, can recreate the forgotten information when the
ACK comes in from a legitimate connection
23
Part 2  Access Control 23Security+ Guide to Network Security Fundamentals, Third Edition
23
2323
23 23 tohttps://github.com/syaifulahdan/
23
Denial of Service
24
Part 2  Access Control 24Security+ Guide to Network Security Fundamentals, Third Edition
24
2424
24 24 tohttps://github.com/syaifulahdan/
24
Denial of Service
• SMURF
– Source IP address of a broadcast ping is forged
– Large number of machines respond back to
victim, overloading it
25
Part 2  Access Control 25Security+ Guide to Network Security Fundamentals, Third Edition
25
2525
25 25 tohttps://github.com/syaifulahdan/
25
Denial of Service
26
Part 2  Access Control 26Security+ Guide to Network Security Fundamentals, Third Edition
26
2626
26 26 tohttps://github.com/syaifulahdan/
26
Denial of Service
• Distributed Denial of Service
– Same techniques as regular DoS, but on a much larger
scale
– Example: Sub7Server Trojan and IRC bots
• Infect a large number of machines with a “zombie” program
• Zombie program logs into an IRC channel and awaits commands
• Example:
– Bot command: !p4 207.71.92.193
– Result: runs ping.exe 207.71.92.193 -l 65500 -n 10000
– Sends 10,000 64k packets to the host (655MB!)
• Read more at: http://grc.com/dos/grcdos.htm
27
Part 2  Access Control 27Security+ Guide to Network Security Fundamentals, Third Edition
27
2727
27 27 tohttps://github.com/syaifulahdan/
27
Denial of Service
• Mini Case Study – CodeRed
– July 19, 2001: over 359,000 computers infected
with Code-Red in less than 14 hours
– Used a recently known buffer exploit in Microsoft
IIS
– Damages estimated in excess of $2.6 billion
28
Part 2  Access Control 28Security+ Guide to Network Security Fundamentals, Third Edition
28
2828
28 28 tohttps://github.com/syaifulahdan/
28
Denial of Service
• Why is this under the Denial of Service
category?
– CodeRed launched a DDOS attack against
www1.whitehouse.gov from the 20th to the 28th
of every month!
– Spent the rest of its time infecting other hosts
29
Part 2  Access Control 29Security+ Guide to Network Security Fundamentals, Third Edition
29
2929
29 29 tohttps://github.com/syaifulahdan/
29
Denial of Service
• How can we protect ourselves?
– Ingress filtering
• If the source IP of a packet comes in on an interface
which does not have a route to that packet, then drop
it
• RFC 2267 has more information about this
– Stay on top of CERT advisories and the latest
security patches
• A fix for the IIS buffer overflow was released sixteen
days before CodeRed had been deployed!
30
Part 2  Access Control 30Security+ Guide to Network Security Fundamentals, Third Edition
30
3030
30 30 tohttps://github.com/syaifulahdan/
30
TCP Attacks
• Recall how IP works…
– End hosts create IP packets and routers process
them purely based on destination address alone
• Problem: End hosts may lie about other fields
which do not affect delivery
– Source address – host may trick destination into
believing that the packet is from a trusted source
• Especially applications which use IP addresses as a
simple authentication method
• Solution – use better authentication methods
31
Part 2  Access Control 31Security+ Guide to Network Security Fundamentals, Third Edition
31
3131
31 31 tohttps://github.com/syaifulahdan/
31
TCP Attacks
• TCP connections have associated state
– Starting sequence numbers, port numbers
• Problem – what if an attacker learns these
values?
– Port numbers are sometimes well known to begin
with (ex. HTTP uses port 80)
– Sequence numbers are sometimes chosen in
very predictable ways
32
Part 2  Access Control 32Security+ Guide to Network Security Fundamentals, Third Edition
32
3232
32 32 tohttps://github.com/syaifulahdan/
32
TCP Attacks
• If an attacker learns the associated TCP
state for the connection, then the connection
can be hijacked!
• Attacker can insert malicious data into the
TCP stream, and the recipient will believe it
came from the original source
– Ex. Instead of downloading and running new
program, you download a virus and execute it
33
Part 2  Access Control 33Security+ Guide to Network Security Fundamentals, Third Edition
33
3333
33 33 tohttps://github.com/syaifulahdan/
33
TCP Attacks
• Say hello to Alice, Bob and Mr. Big Ears
34
Part 2  Access Control 34Security+ Guide to Network Security Fundamentals, Third Edition
34
3434
34 34 tohttps://github.com/syaifulahdan/
34
TCP Attacks
• Alice and Bob have an established TCP
connection
35
Part 2  Access Control 35Security+ Guide to Network Security Fundamentals, Third Edition
35
3535
35 35 tohttps://github.com/syaifulahdan/
35
TCP Attacks
• Mr. Big Ears lies on the path between Alice
and Bob on the network
– He can intercept all of their packets
36
Part 2  Access Control 36Security+ Guide to Network Security Fundamentals, Third Edition
36
3636
36 36 tohttps://github.com/syaifulahdan/
36
TCP Attacks
• First, Mr. Big Ears must drop all of Alice’s
packets since they must not be delivered to
Bob (why?)
Packets
The Void
37
Part 2  Access Control 37Security+ Guide to Network Security Fundamentals, Third Edition
37
3737
37 37 tohttps://github.com/syaifulahdan/
37
TCP Attacks
• Then, Mr. Big Ears sends his malicious
packet with the next ISN (sniffed from the
network)
ISN, SRC=Alice
38
Part 2  Access Control 38Security+ Guide to Network Security Fundamentals, Third Edition
38
3838
38 38 tohttps://github.com/syaifulahdan/
38
TCP Attacks
• What if Mr. Big Ears is unable to sniff the
packets between Alice and Bob?
– Can just DoS Alice instead of dropping her
packets
– Can just send guesses of what the ISN is until it
is accepted
• How do you know when the ISN is accepted?
– Mitnick: payload is “add self to .rhosts”
– Or, “xterm -display MrBigEars:0”
39
Part 2  Access Control 39Security+ Guide to Network Security Fundamentals, Third Edition
39
3939
39 39 tohttps://github.com/syaifulahdan/
39
TCP Attacks
• Why are these types of TCP attacks so
dangerous?
Web server
Malicious user
Trusting web client
40
Part 2  Access Control 40Security+ Guide to Network Security Fundamentals, Third Edition
40
4040
40 40 tohttps://github.com/syaifulahdan/
40
TCP Attacks
• How do we prevent this?
• IPSec
– Provides source authentication, so Mr. Big Ears
cannot pretend to be Alice
– Encrypts data before transport, so Mr. Big Ears
cannot talk to Bob without knowing what the
session key is
41
Part 2  Access Control 41Security+ Guide to Network Security Fundamentals, Third Edition
41
4141
41 41 tohttps://github.com/syaifulahdan/
41
Five Minute Break
• For your enjoyment, here is something
completely unrelated to this lecture:
42
Part 2  Access Control 42Security+ Guide to Network Security Fundamentals, Third Edition
42
4242
42 42 tohttps://github.com/syaifulahdan/
42
Packet Sniffing
• Recall how Ethernet works …
• When someone wants to send a packet to
some else …
• They put the bits on the wire with the
destination MAC address …
• And remember that other hosts are listening
on the wire to detect for collisions …
• It couldn’t get any easier to figure out what
data is being transmitted over the network!
43
Part 2  Access Control 43Security+ Guide to Network Security Fundamentals, Third Edition
43
4343
43 43 tohttps://github.com/syaifulahdan/
43
Packet Sniffing
• This works for wireless too!
• In fact, it works for any broadcast-based
medium
44
Part 2  Access Control 44Security+ Guide to Network Security Fundamentals, Third Edition
44
4444
44 44 tohttps://github.com/syaifulahdan/
44
Packet Sniffing
• What kinds of data can we get?
• Asked another way, what kind of information
would be most useful to a malicious user?
• Answer: Anything in plain text
– Passwords are the most popular
45
Part 2  Access Control 45Security+ Guide to Network Security Fundamentals, Third Edition
45
4545
45 45 tohttps://github.com/syaifulahdan/
45
Packet Sniffing
• How can we protect ourselves?
• SSH, not Telnet
– Many people at CMU still use Telnet and send their password in the
clear (use PuTTY instead!)
– Now that I have told you this, please do not exploit this information
– Packet sniffing is, by the way, prohibited by Computing Services
• HTTP over SSL
– Especially when making purchases with credit cards!
• SFTP, not FTP
– Unless you really don’t care about the password or data
– Can also use KerbFTP (download from MyAndrew)
• IPSec
– Provides network-layer confidentiality
46
Part 2  Access Control 46Security+ Guide to Network Security Fundamentals, Third Edition
46
4646
46 46 tohttps://github.com/syaifulahdan/
46
Social Problems
• People can be just as dangerous as
unprotected computer systems
– People can be lied to, manipulated, bribed,
threatened, harmed, tortured, etc. to give up
valuable information
– Most humans will breakdown once they are at
the “harmed” stage, unless they have been
specially trained
• Think government here…
47
Part 2  Access Control 47Security+ Guide to Network Security Fundamentals, Third Edition
47
4747
47 47 tohttps://github.com/syaifulahdan/
47
Social Problems
• Fun Example 1:
– “Hi, I’m your AT&T rep, I’m stuck on a pole. I
need you to punch a bunch of buttons for me”
48
Part 2  Access Control 48Security+ Guide to Network Security Fundamentals, Third Edition
48
4848
48 48 tohttps://github.com/syaifulahdan/
48
Social Problems
• Fun Example 2:
– Someone calls you in the middle of the night
• “Have you been calling Egypt for the last six hours?”
• “No”
• “Well, we have a call that’s actually active right now,
it’s on your calling card and it’s to Egypt and as a
matter of fact, you’ve got about $2000 worth of
charges on your card and … read off your AT&T card
number and PIN and then I’ll get rid of the charge for
you”
49
Part 2  Access Control 49Security+ Guide to Network Security Fundamentals, Third Edition
49
4949
49 49 tohttps://github.com/syaifulahdan/
49
Social Problems
• Fun Example 3:
– Who saw Office Space?
– In the movie, the three disgruntled employees
installed a money-stealing worm onto the
companies systems
– They did this from inside the company, where
they had full access to the companies systems
• What security techniques can we use to prevent this
type of access?
50
Part 2  Access Control 50Security+ Guide to Network Security Fundamentals, Third Edition
50
5050
50 50 tohttps://github.com/syaifulahdan/
50
Social Problems
• There aren’t always solutions to all of these problems
– Humans will continue to be tricked into giving out information they
shouldn’t
– Educating them may help a little here, but, depending on how bad
you want the information, there are a lot of bad things you can do to
get it
• So, the best that can be done is to implement a wide variety
of solutions and more closely monitor who has access to
what network resources and information
– But, this solution is still not perfect
51
Part 2  Access Control 51Security+ Guide to Network Security Fundamentals, Third Edition
51
5151
51 51 tohttps://github.com/syaifulahdan/
51
Conclusions
• The Internet works only because we implicitly
trust one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest
CERT security advisories to know how to
patch any security holes
52
Part 2  Access Control 52Security+ Guide to Network Security Fundamentals, Third Edition
52
5252
52 52 tohttps://github.com/syaifulahdan/
52
Security related URLs
• http://www.robertgraham.com/pubs/network-
intrusion-detection.html
• http://online.securityfocus.com/infocus/1527
• http://www.snort.org/
• http://www.cert.org/
• http://www.nmap.org/
• http://grc.com/dos/grcdos.htm
• http://lcamtuf.coredump.cx/newtcp/

More Related Content

What's hot

HSM Key change flow using thales
HSM Key change flow using thalesHSM Key change flow using thales
HSM Key change flow using thales
Galih Lasahido
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
NetProtocol Xpert
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows SystemConferencias FIST
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
Aamlan Saswat Mishra
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
primeteacher32
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
Maganathin Veeraragaloo
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Pgp
PgpPgp
Pgp
precy02
 

What's hot (20)

HSM Key change flow using thales
HSM Key change flow using thalesHSM Key change flow using thales
HSM Key change flow using thales
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Pgp
PgpPgp
Pgp
 

Similar to Chapter 6 network security

Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
Network Security
Network SecurityNetwork Security
Network Security
Mohammed Adam
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
sureshfsp
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_securitySerious_SamSoul
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
imran6994
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
arrenfill
 
network.ppt
network.pptnetwork.ppt
network.ppt
ssuser22bbca
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppt
halosidiq1
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
tahaniali27
 
lec21-securitytcp attacks and others.ppt
lec21-securitytcp attacks and others.pptlec21-securitytcp attacks and others.ppt
lec21-securitytcp attacks and others.ppt
navidkamrava
 
INTERNET SECURITY.ppt
INTERNET SECURITY.pptINTERNET SECURITY.ppt
INTERNET SECURITY.ppt
AVUDAI1
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
ramana899986
 
Network Security
Network SecurityNetwork Security
Network Security
20EUEC020ASHIQA
 
Lesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptxLesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptx
calf_ville86
 
EC3401 Networks security PRAVEEN KUMAR K
EC3401 Networks security PRAVEEN KUMAR KEC3401 Networks security PRAVEEN KUMAR K
EC3401 Networks security PRAVEEN KUMAR K
praveenme12
 
Network seurity
Network seurityNetwork seurity
Network seurity
Naqash Rasheed
 

Similar to Chapter 6 network security (20)

Network Security
Network  SecurityNetwork  Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network security
Network securityNetwork security
Network security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
network.ppt
network.pptnetwork.ppt
network.ppt
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppt
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
lec21-securitytcp attacks and others.ppt
lec21-securitytcp attacks and others.pptlec21-securitytcp attacks and others.ppt
lec21-securitytcp attacks and others.ppt
 
INTERNET SECURITY.ppt
INTERNET SECURITY.pptINTERNET SECURITY.ppt
INTERNET SECURITY.ppt
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Lesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptxLesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptx
 
EC3401 Networks security PRAVEEN KUMAR K
EC3401 Networks security PRAVEEN KUMAR KEC3401 Networks security PRAVEEN KUMAR K
EC3401 Networks security PRAVEEN KUMAR K
 
lec security
lec securitylec security
lec security
 
Network seurity
Network seurityNetwork seurity
Network seurity
 

More from Syaiful Ahdan

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
Syaiful Ahdan
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
Syaiful Ahdan
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
Syaiful Ahdan
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
Syaiful Ahdan
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
Syaiful Ahdan
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
Syaiful Ahdan
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
Syaiful Ahdan
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
Syaiful Ahdan
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
Syaiful Ahdan
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
Syaiful Ahdan
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
Syaiful Ahdan
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
Syaiful Ahdan
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
Syaiful Ahdan
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
Syaiful Ahdan
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
Syaiful Ahdan
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
Syaiful Ahdan
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
Syaiful Ahdan
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administrator
Syaiful Ahdan
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
Syaiful Ahdan
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
Syaiful Ahdan
 

More from Syaiful Ahdan (20)

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administrator
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Chapter 6 network security

  • 1. 1 Part 2  Access Control 1Security+ Guide to Network Security Fundamentals, Third Edition 1 11 1 1 tohttps://github.com/syaifulahdan/ INFORMATION SECURITY Network Security  Overview  What is Security  Why do we Need Security  Who is Vulnerable  Common Security attack and there countermeasure  Firewalls  Intrussion Detection  Dictionary Attack  Denial of Service  TCP Attacks  Five Minute Break  Packet Sniffing  Social Problems  Conclusion • Justin Weisz • jweisz@andrew.cmu.edu
  • 2. 2 Part 2  Access Control 2Security+ Guide to Network Security Fundamentals, Third Edition 2 22 2 2 tohttps://github.com/syaifulahdan/ 2 A Brief History of the World
  • 3. 3 Part 2  Access Control 3Security+ Guide to Network Security Fundamentals, Third Edition 3 33 3 3 tohttps://github.com/syaifulahdan/ 3 Overview • What is security? • Why do we need security? • Who is vulnerable? • Common security attacks and countermeasures – Firewalls & Intrusion Detection Systems – Denial of Service Attacks – TCP Attacks – Packet Sniffing – Social Problems
  • 4. 4 Part 2  Access Control 4Security+ Guide to Network Security Fundamentals, Third Edition 4 44 4 4 tohttps://github.com/syaifulahdan/ 4 What is “Security” • Dictionary.com says: – 1. Freedom from risk or danger; safety. – 2. Freedom from doubt, anxiety, or fear; confidence. – 3. Something that gives or assures safety, as: • 1. A group or department of private guards: Call building security if a visitor acts suspicious. • 2. Measures adopted by a government to prevent espionage, sabotage, or attack. • 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 5. 5 Part 2  Access Control 5Security+ Guide to Network Security Fundamentals, Third Edition 5 55 5 5 tohttps://github.com/syaifulahdan/ 5 What is “Security” • Dictionary.com says: – 1. Freedom from risk or danger; safety. – 2. Freedom from doubt, anxiety, or fear; confidence. – 3. Something that gives or assures safety, as: • 1. A group or department of private guards: Call building security if a visitor acts suspicious. • 2. Measures adopted by a government to prevent espionage, sabotage, or attack. • 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 6. 6 Part 2  Access Control 6Security+ Guide to Network Security Fundamentals, Third Edition 6 66 6 6 tohttps://github.com/syaifulahdan/ 6 What is “Security” • Dictionary.com says: – 1. Freedom from risk or danger; safety. – 2. Freedom from doubt, anxiety, or fear; confidence. – 3. Something that gives or assures safety, as: • 1. A group or department of private guards: Call building security if a visitor acts suspicious. • 2. Measures adopted by a government to prevent espionage, sabotage, or attack. • 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 7. 7 Part 2  Access Control 7Security+ Guide to Network Security Fundamentals, Third Edition 7 77 7 7 tohttps://github.com/syaifulahdan/ 7 What is “Security” • Dictionary.com says: – 1. Freedom from risk or danger; safety. – 2. Freedom from doubt, anxiety, or fear; confidence. – 3. Something that gives or assures safety, as: • 1. A group or department of private guards: Call building security if a visitor acts suspicious. • 2. Measures adopted by a government to prevent espionage, sabotage, or attack. • 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 8. 8 Part 2  Access Control 8Security+ Guide to Network Security Fundamentals, Third Edition 8 88 8 8 tohttps://github.com/syaifulahdan/ 8 Why do we need security? • Protect vital information while still allowing access to those who need it – Trade secrets, medical records, etc. • Provide authentication and access control for resources – Ex: AFS • Guarantee availability of resources – Ex: 5 9’s (99.999% reliability)
  • 9. 9 Part 2  Access Control 9Security+ Guide to Network Security Fundamentals, Third Edition 9 99 9 9 tohttps://github.com/syaifulahdan/ 9 Who is vulnerable? • Financial institutions and banks • Internet service providers • Pharmaceutical companies • Government and defense agencies • Contractors to various government agencies • Multinational corporations • ANYONE ON THE NETWORK
  • 10. 10 Part 2  Access Control 10Security+ Guide to Network Security Fundamentals, Third Edition 10 1010 10 10 tohttps://github.com/syaifulahdan/ 10 Common security attacks and their countermeasures • Finding a way into the network – Firewalls • Exploiting software bugs, buffer overflows – Intrusion Detection Systems • Denial of Service – Ingress filtering, IDS • TCP hijacking – IPSec • Packet sniffing – Encryption (SSH, SSL, HTTPS) • Social problems – Education
  • 11. 11 Part 2  Access Control 11Security+ Guide to Network Security Fundamentals, Third Edition 11 1111 11 11 tohttps://github.com/syaifulahdan/ 11 Firewalls • Basic problem – many network applications and protocols have security problems that are fixed over time – Difficult for users to keep up with changes and keep host secure – Solution • Administrators limit access to end hosts by using a firewall • Firewall is kept up-to-date by administrators
  • 12. 12 Part 2  Access Control 12Security+ Guide to Network Security Fundamentals, Third Edition 12 1212 12 12 tohttps://github.com/syaifulahdan/ 12 Firewalls • A firewall is like a castle with a drawbridge – Only one point of access into the network – This can be good or bad • Can be hardware or software – Ex. Some routers come with firewall functionality – ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls
  • 13. 13 Part 2  Access Control 13Security+ Guide to Network Security Fundamentals, Third Edition 13 1313 13 13 tohttps://github.com/syaifulahdan/ 13 Firewalls Intranet DMZInternet Firewall Firewall Web server, email server, web proxy, etc
  • 14. 14 Part 2  Access Control 14Security+ Guide to Network Security Fundamentals, Third Edition 14 1414 14 14 tohttps://github.com/syaifulahdan/ 14 Firewalls • Used to filter packets based on a combination of features – These are called packet filtering firewalls • There are other types too, but they will not be discussed – Ex. Drop packets with destination port of 23 (Telnet) – Can use any combination of IP/UDP/TCP header information – man ipfw on unix47 for much more detail • But why don’t we just turn Telnet off?
  • 15. 15 Part 2  Access Control 15Security+ Guide to Network Security Fundamentals, Third Edition 15 1515 15 15 tohttps://github.com/syaifulahdan/ 15 Firewalls • Here is what a computer with a default Windows XP install looks like: – 135/tcp open loc-srv – 139/tcp open netbios-ssn – 445/tcp open microsoft-ds – 1025/tcp open NFS-or-IIS – 3389/tcp open ms-term-serv – 5000/tcp open UPnP • Might need some of these services, or might not be able to control all the machines on the network
  • 16. 16 Part 2  Access Control 16Security+ Guide to Network Security Fundamentals, Third Edition 16 1616 16 16 tohttps://github.com/syaifulahdan/ 16 Firewalls • What does a firewall rule look like? – Depends on the firewall used • Example: ipfw – /sbin/ipfw add deny tcp from cracker.evil.org to wolf.tambov.su telnet • Other examples: WinXP & Mac OS X have built in and third party firewalls – Different graphical user interfaces – Varying amounts of complexity and power
  • 17. 17 Part 2  Access Control 17Security+ Guide to Network Security Fundamentals, Third Edition 17 1717 17 17 tohttps://github.com/syaifulahdan/ 17 Intrusion Detection • Used to monitor for “suspicious activity” on a network – Can protect against known software exploits, like buffer overflows • Open Source IDS: Snort, www.snort.org
  • 18. 18 Part 2  Access Control 18Security+ Guide to Network Security Fundamentals, Third Edition 18 1818 18 18 tohttps://github.com/syaifulahdan/ 18 Intrusion Detection • Uses “intrusion signatures” – Well known patterns of behavior • Ping sweeps, port scanning, web server indexing, OS fingerprinting, DoS attempts, etc. • Example – IRIX vulnerability in webdist.cgi – Can make a rule to drop packets containing the line • “/cgi-bin/webdist.cgi?distloc=?;cat%20/etc/passwd” • However, IDS is only useful if contingency plans are in place to curb attacks as they are occurring
  • 19. 19 Part 2  Access Control 19Security+ Guide to Network Security Fundamentals, Third Edition 19 1919 19 19 tohttps://github.com/syaifulahdan/ 19 Minor Detour… • Say we got the /etc/passwd file from the IRIX server • What can we do with it?
  • 20. 20 Part 2  Access Control 20Security+ Guide to Network Security Fundamentals, Third Edition 20 2020 20 20 tohttps://github.com/syaifulahdan/ 20 Dictionary Attack • We can run a dictionary attack on the passwords – The passwords in /etc/passwd are encrypted with the crypt(3) function (one-way hash) – Can take a dictionary of words, crypt() them all, and compare with the hashed passwords • This is why your passwords should be meaningless random junk! – For example, “sdfo839f” is a good password • That is not my andrew password • Please don’t try it either
  • 21. 21 Part 2  Access Control 21Security+ Guide to Network Security Fundamentals, Third Edition 21 2121 21 21 tohttps://github.com/syaifulahdan/ 21 Denial of Service • Purpose: Make a network service unusable, usually by overloading the server or network • Many different kinds of DoS attacks – SYN flooding – SMURF – Distributed attacks – Mini Case Study: Code-Red
  • 22. 22 Part 2  Access Control 22Security+ Guide to Network Security Fundamentals, Third Edition 22 2222 22 22 tohttps://github.com/syaifulahdan/ 22 Denial of Service • SYN flooding attack • Send SYN packets with bogus source address – Why? • Server responds with SYN ACK and keeps state about TCP half-open connection – Eventually, server memory is exhausted with this state • Solution: use “SYN cookies” – In response to a SYN, create a special “cookie” for the connection, and forget everything else – Then, can recreate the forgotten information when the ACK comes in from a legitimate connection
  • 23. 23 Part 2  Access Control 23Security+ Guide to Network Security Fundamentals, Third Edition 23 2323 23 23 tohttps://github.com/syaifulahdan/ 23 Denial of Service
  • 24. 24 Part 2  Access Control 24Security+ Guide to Network Security Fundamentals, Third Edition 24 2424 24 24 tohttps://github.com/syaifulahdan/ 24 Denial of Service • SMURF – Source IP address of a broadcast ping is forged – Large number of machines respond back to victim, overloading it
  • 25. 25 Part 2  Access Control 25Security+ Guide to Network Security Fundamentals, Third Edition 25 2525 25 25 tohttps://github.com/syaifulahdan/ 25 Denial of Service
  • 26. 26 Part 2  Access Control 26Security+ Guide to Network Security Fundamentals, Third Edition 26 2626 26 26 tohttps://github.com/syaifulahdan/ 26 Denial of Service • Distributed Denial of Service – Same techniques as regular DoS, but on a much larger scale – Example: Sub7Server Trojan and IRC bots • Infect a large number of machines with a “zombie” program • Zombie program logs into an IRC channel and awaits commands • Example: – Bot command: !p4 207.71.92.193 – Result: runs ping.exe 207.71.92.193 -l 65500 -n 10000 – Sends 10,000 64k packets to the host (655MB!) • Read more at: http://grc.com/dos/grcdos.htm
  • 27. 27 Part 2  Access Control 27Security+ Guide to Network Security Fundamentals, Third Edition 27 2727 27 27 tohttps://github.com/syaifulahdan/ 27 Denial of Service • Mini Case Study – CodeRed – July 19, 2001: over 359,000 computers infected with Code-Red in less than 14 hours – Used a recently known buffer exploit in Microsoft IIS – Damages estimated in excess of $2.6 billion
  • 28. 28 Part 2  Access Control 28Security+ Guide to Network Security Fundamentals, Third Edition 28 2828 28 28 tohttps://github.com/syaifulahdan/ 28 Denial of Service • Why is this under the Denial of Service category? – CodeRed launched a DDOS attack against www1.whitehouse.gov from the 20th to the 28th of every month! – Spent the rest of its time infecting other hosts
  • 29. 29 Part 2  Access Control 29Security+ Guide to Network Security Fundamentals, Third Edition 29 2929 29 29 tohttps://github.com/syaifulahdan/ 29 Denial of Service • How can we protect ourselves? – Ingress filtering • If the source IP of a packet comes in on an interface which does not have a route to that packet, then drop it • RFC 2267 has more information about this – Stay on top of CERT advisories and the latest security patches • A fix for the IIS buffer overflow was released sixteen days before CodeRed had been deployed!
  • 30. 30 Part 2  Access Control 30Security+ Guide to Network Security Fundamentals, Third Edition 30 3030 30 30 tohttps://github.com/syaifulahdan/ 30 TCP Attacks • Recall how IP works… – End hosts create IP packets and routers process them purely based on destination address alone • Problem: End hosts may lie about other fields which do not affect delivery – Source address – host may trick destination into believing that the packet is from a trusted source • Especially applications which use IP addresses as a simple authentication method • Solution – use better authentication methods
  • 31. 31 Part 2  Access Control 31Security+ Guide to Network Security Fundamentals, Third Edition 31 3131 31 31 tohttps://github.com/syaifulahdan/ 31 TCP Attacks • TCP connections have associated state – Starting sequence numbers, port numbers • Problem – what if an attacker learns these values? – Port numbers are sometimes well known to begin with (ex. HTTP uses port 80) – Sequence numbers are sometimes chosen in very predictable ways
  • 32. 32 Part 2  Access Control 32Security+ Guide to Network Security Fundamentals, Third Edition 32 3232 32 32 tohttps://github.com/syaifulahdan/ 32 TCP Attacks • If an attacker learns the associated TCP state for the connection, then the connection can be hijacked! • Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source – Ex. Instead of downloading and running new program, you download a virus and execute it
  • 33. 33 Part 2  Access Control 33Security+ Guide to Network Security Fundamentals, Third Edition 33 3333 33 33 tohttps://github.com/syaifulahdan/ 33 TCP Attacks • Say hello to Alice, Bob and Mr. Big Ears
  • 34. 34 Part 2  Access Control 34Security+ Guide to Network Security Fundamentals, Third Edition 34 3434 34 34 tohttps://github.com/syaifulahdan/ 34 TCP Attacks • Alice and Bob have an established TCP connection
  • 35. 35 Part 2  Access Control 35Security+ Guide to Network Security Fundamentals, Third Edition 35 3535 35 35 tohttps://github.com/syaifulahdan/ 35 TCP Attacks • Mr. Big Ears lies on the path between Alice and Bob on the network – He can intercept all of their packets
  • 36. 36 Part 2  Access Control 36Security+ Guide to Network Security Fundamentals, Third Edition 36 3636 36 36 tohttps://github.com/syaifulahdan/ 36 TCP Attacks • First, Mr. Big Ears must drop all of Alice’s packets since they must not be delivered to Bob (why?) Packets The Void
  • 37. 37 Part 2  Access Control 37Security+ Guide to Network Security Fundamentals, Third Edition 37 3737 37 37 tohttps://github.com/syaifulahdan/ 37 TCP Attacks • Then, Mr. Big Ears sends his malicious packet with the next ISN (sniffed from the network) ISN, SRC=Alice
  • 38. 38 Part 2  Access Control 38Security+ Guide to Network Security Fundamentals, Third Edition 38 3838 38 38 tohttps://github.com/syaifulahdan/ 38 TCP Attacks • What if Mr. Big Ears is unable to sniff the packets between Alice and Bob? – Can just DoS Alice instead of dropping her packets – Can just send guesses of what the ISN is until it is accepted • How do you know when the ISN is accepted? – Mitnick: payload is “add self to .rhosts” – Or, “xterm -display MrBigEars:0”
  • 39. 39 Part 2  Access Control 39Security+ Guide to Network Security Fundamentals, Third Edition 39 3939 39 39 tohttps://github.com/syaifulahdan/ 39 TCP Attacks • Why are these types of TCP attacks so dangerous? Web server Malicious user Trusting web client
  • 40. 40 Part 2  Access Control 40Security+ Guide to Network Security Fundamentals, Third Edition 40 4040 40 40 tohttps://github.com/syaifulahdan/ 40 TCP Attacks • How do we prevent this? • IPSec – Provides source authentication, so Mr. Big Ears cannot pretend to be Alice – Encrypts data before transport, so Mr. Big Ears cannot talk to Bob without knowing what the session key is
  • 41. 41 Part 2  Access Control 41Security+ Guide to Network Security Fundamentals, Third Edition 41 4141 41 41 tohttps://github.com/syaifulahdan/ 41 Five Minute Break • For your enjoyment, here is something completely unrelated to this lecture:
  • 42. 42 Part 2  Access Control 42Security+ Guide to Network Security Fundamentals, Third Edition 42 4242 42 42 tohttps://github.com/syaifulahdan/ 42 Packet Sniffing • Recall how Ethernet works … • When someone wants to send a packet to some else … • They put the bits on the wire with the destination MAC address … • And remember that other hosts are listening on the wire to detect for collisions … • It couldn’t get any easier to figure out what data is being transmitted over the network!
  • 43. 43 Part 2  Access Control 43Security+ Guide to Network Security Fundamentals, Third Edition 43 4343 43 43 tohttps://github.com/syaifulahdan/ 43 Packet Sniffing • This works for wireless too! • In fact, it works for any broadcast-based medium
  • 44. 44 Part 2  Access Control 44Security+ Guide to Network Security Fundamentals, Third Edition 44 4444 44 44 tohttps://github.com/syaifulahdan/ 44 Packet Sniffing • What kinds of data can we get? • Asked another way, what kind of information would be most useful to a malicious user? • Answer: Anything in plain text – Passwords are the most popular
  • 45. 45 Part 2  Access Control 45Security+ Guide to Network Security Fundamentals, Third Edition 45 4545 45 45 tohttps://github.com/syaifulahdan/ 45 Packet Sniffing • How can we protect ourselves? • SSH, not Telnet – Many people at CMU still use Telnet and send their password in the clear (use PuTTY instead!) – Now that I have told you this, please do not exploit this information – Packet sniffing is, by the way, prohibited by Computing Services • HTTP over SSL – Especially when making purchases with credit cards! • SFTP, not FTP – Unless you really don’t care about the password or data – Can also use KerbFTP (download from MyAndrew) • IPSec – Provides network-layer confidentiality
  • 46. 46 Part 2  Access Control 46Security+ Guide to Network Security Fundamentals, Third Edition 46 4646 46 46 tohttps://github.com/syaifulahdan/ 46 Social Problems • People can be just as dangerous as unprotected computer systems – People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information – Most humans will breakdown once they are at the “harmed” stage, unless they have been specially trained • Think government here…
  • 47. 47 Part 2  Access Control 47Security+ Guide to Network Security Fundamentals, Third Edition 47 4747 47 47 tohttps://github.com/syaifulahdan/ 47 Social Problems • Fun Example 1: – “Hi, I’m your AT&T rep, I’m stuck on a pole. I need you to punch a bunch of buttons for me”
  • 48. 48 Part 2  Access Control 48Security+ Guide to Network Security Fundamentals, Third Edition 48 4848 48 48 tohttps://github.com/syaifulahdan/ 48 Social Problems • Fun Example 2: – Someone calls you in the middle of the night • “Have you been calling Egypt for the last six hours?” • “No” • “Well, we have a call that’s actually active right now, it’s on your calling card and it’s to Egypt and as a matter of fact, you’ve got about $2000 worth of charges on your card and … read off your AT&T card number and PIN and then I’ll get rid of the charge for you”
  • 49. 49 Part 2  Access Control 49Security+ Guide to Network Security Fundamentals, Third Edition 49 4949 49 49 tohttps://github.com/syaifulahdan/ 49 Social Problems • Fun Example 3: – Who saw Office Space? – In the movie, the three disgruntled employees installed a money-stealing worm onto the companies systems – They did this from inside the company, where they had full access to the companies systems • What security techniques can we use to prevent this type of access?
  • 50. 50 Part 2  Access Control 50Security+ Guide to Network Security Fundamentals, Third Edition 50 5050 50 50 tohttps://github.com/syaifulahdan/ 50 Social Problems • There aren’t always solutions to all of these problems – Humans will continue to be tricked into giving out information they shouldn’t – Educating them may help a little here, but, depending on how bad you want the information, there are a lot of bad things you can do to get it • So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information – But, this solution is still not perfect
  • 51. 51 Part 2  Access Control 51Security+ Guide to Network Security Fundamentals, Third Edition 51 5151 51 51 tohttps://github.com/syaifulahdan/ 51 Conclusions • The Internet works only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
  • 52. 52 Part 2  Access Control 52Security+ Guide to Network Security Fundamentals, Third Edition 52 5252 52 52 tohttps://github.com/syaifulahdan/ 52 Security related URLs • http://www.robertgraham.com/pubs/network- intrusion-detection.html • http://online.securityfocus.com/infocus/1527 • http://www.snort.org/ • http://www.cert.org/ • http://www.nmap.org/ • http://grc.com/dos/grcdos.htm • http://lcamtuf.coredump.cx/newtcp/