e-security
Yıldırım TAM
WHAT WILL WE SEE IN THIS LECTURE
Structure of Network System
Threats and Type of Attacks
Cryptography
Analysis of e-security
OSI
(OPEN SYSTEMS INTERCONNECTION)
LAYERS
Physical
Media,Signal and Binary Transmission
Data Link
Mac and LLC (Phyiscal addressing)
Network
Path Determination and TCP/IP (Logical
addressing)
Transport
End to End Connections and Reliability
Session
Interhost Communication
Presentation
Data Representation
and Encryption
Application
Network Process to Application
TCP VS UDP
FINALLY PROCESS
FIREWALL
FIREWALL - HARDWARE
FIREWALL - SOFTWARE
TYPE OF ATTACKS
Passive Attack
Active Attack
Insider Attack
Close-in Attack
Phishing Attack
Buffer overflow
Exploit attack
Password attack
PASSIVE ATTACK
USER PCs
HACKER
UNWITTING
HOST
“ZOMBIE”
OTHER
NETWORK
COMPUTERS
VICTIM’S
SERVER
ACTIVE ATTACK (EXAMPLE: DOS ATTACK)
INSIDER ATTACK
CLOSE – IN – ATTACK (EXAMPLE :SOCIAL ENGINEERING ATTACK)
PHISHING ATTACK
BUFFER ATTACK
EXPLOID ATTACK
PASSWORD ATTACK (EXAMPLE:SQL INJECTION)
CRYPTOLOGY
WHAT IS THE CRYPTOLOGY?
Cryptography
Cryptanalysis
HISTORY OF CRYPTOLOGY
ENIGMA
BASIC ELEMENTS OF CRYPTOGRAPHY
WHAT PROVIDES CRYPTOGRAPHY?
Confidentiality
Message Integrity
Authentication
Non-repudiation
ALGORITHM OF CRYPTOLOGY
Known Symmetrical Algorithms
Data Encryption Standard (DES)
56 bit key
Triple DES, DESX, GDES, RDES
168 bit key
RC2, RC4, RC5
variable length up to 2048 bits
IDEA - basis of PGP
128 bit key
Blowfish
variable length up to 448 bits
CRYPTOGRAPHIC SERVICES ALLOW
Digital Signatures
Certificates (Digital Ids)
Secure Channels
DIGITAL SIGNATURES
SECURE SOCKETS LAYER
TYPES OF MALWARE
root@root:~# Exploit
root@root:~# WORM
root@root:~# Rootkit
root@root:~# Trojan
root@root:~# Adware
root@root:~# Spyware
EXPLOİT
exp@root:~# Vulnerability
exp@root :~# System
exp@root :~# Unauthorized
exp@root :~# Spread Out Spam
exp@root :~# Java,Html,Js
EXPLOİT
WORM
wrm@root:~# Auto Clone
wrm@root :~# Spread
wrm@root :~# Not need attach
wrm@root :~# Consume
wrm@root :~# Any action user
wrm@root :~# Backdoor P2P
WORM
WORM
#STORM
wrm@root :~# 2007
wrm@root :~# attach mail
wrm@root :~# wincom32.exe
wrm@root :~# services.exe
wrm@root :~# P2P
#CONFİCKER
wrm@root :~# 2008
wrm@root :~# Windows
wrm@root :~# Buffer
wrm@root :~# 9 billion
wrm@root :~# Services
#CODERED
wrm@root :~# Servers
wrm@root :~# 2001
wrm@root :~# IIS
wrm@root :~# 359,000
wrm@root :~# Whitehouse
ROOTKİT
root@root:~# System -Hide
root@root:~# Response
root@root:~# Not -alone
root@root:~# Remote
root@root:~# Crack -Keygen
root@root:~# Use you -Pri
ROOTKİT
#SONY CD
root@root:~# 2005
root@root:~# copy -protect
root@root:~# Access
root@root:~# ‘$sys$’
root@root:~# Lawsuit
#Greek Wiretapping
root@root:~# 2004
root@root:~# Govern tapping
root@root:~# Ericsson
root@root:~# Tel Central
root@root:~# deActive log
SPAM
wrm@root:~# junk email
wrm@root :~# Phishing
wrm@root :~# script or.exe
wrm@root :~# Botnets
wrm@root :~# Collect
wrm@root :~# Pharmacy %81
TROJAN
trj@root:~# Backdoor-exploit-rk
trj@root :~# left data
trj@root :~# Unauthorized
trj@root :~# carries out
ADWARE
adw@root :~# Freeware
adw@root :~# keylogger
adw@root :~# Pop -up
adw@root :~# Tracks
adw@root :~# Related
adw@root :~# Consume
SPYWARE
spy@root :~# system monitors,
trojans, adware, and tracking
cookies
spy@root :~# not knowledge
spy@root :~# not spread-itself
spy@root :~# ie ,Windows
spy@root :~# usage -commercial
spy@root :~# identity theft
SPYWARE
spy@root :~# -CoolWebSearch
spy@root :~# -huntbar
spy@root :~# -movieland
spy@root :~# -kazaa
THREAT INTELLIGENCE
SECURITY CAPABILITIES
GEOPOLITICAL AND
INDUSTRY
USER AND CORPORATE
E securty
E securty
E securty
E securty
E securty
E securty
E securty
E securty
E securty
E securty

E securty