SlideShare a Scribd company logo
SPOOFING
Computer Network Security 2
Spoofing
Guessing or otherwise obtaining the
network authentication credentials of an
entity (a user, an account, a process, a node,
a device) permits an attacker to create a full
communication under the entity’s identity.
Examples of spoofing are masquerading,
session hijacking, and man-in-the-middle
attacks.
Computer Network Security 3
Masquerade
In a masquerade one host pretends to be another.
A common example is URL confusion. e.g. coca-
cola.com vs cocacola.com; xyz.net vs xyz.com
Domain names can easily be confused, or
someone can easily mistype certain names.
In another version of a masquerade, the attacker
exploits a flaw in the victim’s web server and is
able to overwrite the victim’s web pages.
Collect user information and perhaps pass it on to
the original
Computer Network Security 4
Session hijacking
Session hijacking is intercepting and carrying on a session
begun by another entity.
Suppose two entities have entered into a session but then a
third entity intercepts the traffic and carries on the session
in the name of the other.
A different type of example involves an interactive
session, e.g. If a system administrator logs in remotely to a
privileged account, a session hijack utility could intrude in
the communication and pass commands as if they came
from the administrator.
Computer Network Security 5
Man-in-the-Middle Attack
A man-in-the-middle attack is a similar form of
attack, in which one entity intrudes between two
others.
The difference between man-in-the-middle and
hijacking is that a man-in-the-middle usually
participates from the start of the session, whereas
a session hijacking occurs after a session has been
established.
The difference is largely semantic and not too
significant.
Computer Network Security 6
Man-in-the-Middle Attack
Man-in-the-middle attacks are frequently described in
protocols. To see how, suppose you want to exchange
encrypted information with your friend.
You contact the key server and ask for a secret key with
which to communicate with your friend. The key server
responds by sending a key to you and your friend.
One man-in-the-middle attack assumes someone can see
and enter into all parts of this protocol.
A malicious middleman intercepts the response key and
can then eavesdrop on, or even decrypt, modify, and re-
encrypt any subsequent communications between you and
your friend.
Intrusion Detection Systems
(IDS)
Computer Network Security 8
Intrusion Detection Systems (IDS)
An IDS is like an alarm system for your network.
The network is protected, but without the IDS (alarm), you
would never know whether an attacker was trying to gain
entry.
The goal of Intrusion detection is to monitor network
assets to detect unusual behaviour, inappropriate activity,
and attacks, or stop the attack (intrusion) and even provide
information to prosecute the attacker.
IDSs function on three premises:
Where to watch
What to watch for
What to do
Computer Network Security 9
Intrusion Detection Systems (IDS)
The first premises “where to watch” tells the IDS the
logical location it will be monitoring for something to
happen.
The Second premises “what to watch for” tells the IDS
conditions for which it is supposed to be looking for to
raise an alarm or some kind of action.
The Third premises “what to do” is the action the IDS
has been told to take when a situation meets certain
parameters.
Real world examples of an IDS in action.
1. you install an IDs to watch the internet connection and those
trying to get into your network through your firewall.
Computer Network Security 10
Intrusion Detection Systems (IDS)
2. You tell the IDS what types of hacks and attacks to look for based
on their packet and connection type and what activities these
might generate.
3. You tell the IDS to page you and send you an e-mail when one of
these attacks occurs.
There are some flaws in the whole IDS operating
principle.
First, the IDS can watch only one interface at a time.
Secondly, the IDS watches only for conditions that you
tell it about.
Finally, an IDS can actually become an ally to hackers.
Computer Network Security 11
Intrusion Detection Systems (IDS)
IDS can be deployed in a variety of
locations within a network to further
increase in organization’s security and
protection.
In general, two basic forms of IDS are used
today.
Network intrusion detection system (NIDS).
Host intrusion detection system (HIDS).
Computer Network Security 12
Network Intrusion Detection Systems
(NIDS)
NIDS reside directly on the n/w and watches all
the traffic that traverses the n/w.
NIDS are effective at both watching for
inbound/outbound traffic flows and traffic
between hosts on or between local n/w segments.
NIDS are typically deployed in front of and
behind firewalls and VPN gateways to measure
the effectiveness of those security devices and
interact with them to add more depth to the
networks security.
Computer Network Security 13
Host Intrusion Detection Systems
(HIDS)
HIDS are specialized software application that are
installed on a computer (typically a user) to watch
all inbound and outbound communication traffic
to and from that server and to monitor the file
system for changes.
HIDS are extremely effective on mission-critical,
internet-accessible application server, such as web
server or e-mail servers, because they can watch
the application at source to protect them.
Computer Network Security 14
Intrusion Detection Systems (IDS)
Both types of sensors offer different
techniques for detecting and deferring
malicious activity.
Both should be deployed to provide the
most effective enhancement to a layered
defence strategy.
FIREWALLS
Computer Network Security 16
What is a Firewall?
A firewall is a security device that sits on the edge
of your Internet connection and functions as an
Internet Border Security Officer.
It constantly looks at all the traffic entering and
exiting your connection, waiting for traffic it can
block or reject in response to an established rule.
The firewall is law and protection in a lawless
global web.
Firewalls can protect both individual computer
and corporate networks from hostile intrusions
from the internet.
Computer Network Security 17
Why Do I Need a Firewall?
It is no secret: hackers are out there, and they are
out to get us. Often, we do not know who they are,
but we do know where they are and where we do
not want them to be (in our n/w).
Like pirates of old roamed the seas, hackers roam
the wide expanses of the internet. You do not want
them to enter your n/w and roam among the
computers that connect to it.
You know that you must protect your n/w from
these attackers, and one of the most efficient
methods of protecting your n/w is to install a
firewall.
Computer Network Security 18
Why Do I Need a Firewall?
By default, any good firewall prevent n/w traffic
from passing between the internet and your
internal n/w. this does not mean that the firewall
will stop all traffic-that defeats the purpose of
being on the internet.
It does mean that the firewall is configured to
allow only web browsing (HTTP/port 80) to
access it from the internet.
Technically, a firewall is a specialized version of a
router. Apart from the basic routing functions and
rules, a router can be configured to perform the
firewall functionality, with the help of additional
software resources.
Computer Network Security 19
Common rules and features
Block incoming n/w traffic based on source or
destination- blocking unwanted incoming traffic is the
most common features of a firewall and is the main reason
for a firewall.
Block outgoing n/w traffic based on source or
destination- many firewalls can also screen n/w traffic
from your internal n/w to the internet. E.g. prevent your
employee from accessing inappropriate websites.
Block n/w traffic based on content- More advanced
firewall can screen n/w traffic for unacceptable content.
E.g. a firewall that is integrated with a virus scanner can
prevent files that contain viruses from entering your n/w.
Computer Network Security 20
Common rules and features
Make internal resources available- Although the
primary purpose of a firewall is to prevent
unwanted n/w traffic from passing through it, you
can configure many firewalls to allow selective
access to internal resources, such as a public web
server, while still preventing other access from the
internet to your internal n/w.
Allow connections to internal n/w- A Common
method for employee to connect to a n/w is using
virtual private n/w (VPNs). VPNs allow to secure
connections from the internet to a corporate
networks. E.g. telesales and travelling people can
use a VPN to connect to corporate n/w
Computer Network Security 21
Common rules and features
Make internal resources available-When
screening n/w traffic to and from the
internet, it is also important to know what
your firewall is doing, who tried to break
into your n/w, and who tried to access
inappropriate material on the internet.
Computer Network Security 22
Implementing a Firewall
The choice of available firewalls is almost
mind-boggling theses days; they come in
every shape, size and parameter.
The type of firewall you install depends on
exact requirement for protection and
management, as well as the size of your n/w
or what is to be protected by the firewall.
Firewalls usually fall into one of the
following categories
Computer Network Security 23
Implementing a Firewall
Persona firewall- is usually a piece of software that is
installed on a single PC to protect only the PC. These type
of firewalls are usually deployed on home PCs with
broadband connections or remote employees.
All-in-one-firewall- These kinds of firewalls are widely
used by broadband (cable or DSL) subscribers who have
the benefit of a single device that offers the following
features and functionality: router, Ethernet switches, WAP
and a firewall.
Small-to-medium office firewalls- These firewalls, such
as the Cisco PIX 501 or 506, are designed to provide
security and protection for small offices.
Enterprise firewalls- These firewalls, such as the Cisco
PIX 515, are designed for larger organization with
thousands of users.
Computer Network Security 24
ANY QUESTIONS
?

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Network security
Network securityNetwork security
Network security
Ali Kamil
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)amar koppal
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
samis
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Devil's Cafe
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
david rom
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
System and web security
System and web securitySystem and web security
System and web security
chirag patil
 
Network security
Network securityNetwork security
Network security
mustafa aadel
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
JIEMS Akkalkuwa
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Network security
Network securityNetwork security
Network security
 
The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)The use of honeynet to detect exploited systems (basic version)
The use of honeynet to detect exploited systems (basic version)
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
System and web security
System and web securitySystem and web security
System and web security
 
Network security
Network securityNetwork security
Network security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
Double guard
Double guardDouble guard
Double guard
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 

Similar to Lecture 5

Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
RechieJohnRelator
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
infosec train
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
researchinventy
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
AnanthReddy38
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
Wail Hassan
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Lana Sorrels
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
Infosectrain3
 

Similar to Lecture 5 (20)

Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 

More from Education

A friendly introduction to differential equations
A friendly introduction to differential equationsA friendly introduction to differential equations
A friendly introduction to differential equations
Education
 
High-order Assembly Language/Shuttle (HAL/S)
High-order Assembly Language/Shuttle (HAL/S)High-order Assembly Language/Shuttle (HAL/S)
High-order Assembly Language/Shuttle (HAL/S)
Education
 
assembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YUassembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YU
Education
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
Education
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
Education
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
Education
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Education
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
Education
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
Education
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
Education
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Education
 
Data warehousing labs maunal
Data warehousing labs maunalData warehousing labs maunal
Data warehousing labs maunal
Education
 

More from Education (12)

A friendly introduction to differential equations
A friendly introduction to differential equationsA friendly introduction to differential equations
A friendly introduction to differential equations
 
High-order Assembly Language/Shuttle (HAL/S)
High-order Assembly Language/Shuttle (HAL/S)High-order Assembly Language/Shuttle (HAL/S)
High-order Assembly Language/Shuttle (HAL/S)
 
assembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YUassembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YU
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Data warehousing labs maunal
Data warehousing labs maunalData warehousing labs maunal
Data warehousing labs maunal
 

Recently uploaded

Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Lecture 5

  • 2. Computer Network Security 2 Spoofing Guessing or otherwise obtaining the network authentication credentials of an entity (a user, an account, a process, a node, a device) permits an attacker to create a full communication under the entity’s identity. Examples of spoofing are masquerading, session hijacking, and man-in-the-middle attacks.
  • 3. Computer Network Security 3 Masquerade In a masquerade one host pretends to be another. A common example is URL confusion. e.g. coca- cola.com vs cocacola.com; xyz.net vs xyz.com Domain names can easily be confused, or someone can easily mistype certain names. In another version of a masquerade, the attacker exploits a flaw in the victim’s web server and is able to overwrite the victim’s web pages. Collect user information and perhaps pass it on to the original
  • 4. Computer Network Security 4 Session hijacking Session hijacking is intercepting and carrying on a session begun by another entity. Suppose two entities have entered into a session but then a third entity intercepts the traffic and carries on the session in the name of the other. A different type of example involves an interactive session, e.g. If a system administrator logs in remotely to a privileged account, a session hijack utility could intrude in the communication and pass commands as if they came from the administrator.
  • 5. Computer Network Security 5 Man-in-the-Middle Attack A man-in-the-middle attack is a similar form of attack, in which one entity intrudes between two others. The difference between man-in-the-middle and hijacking is that a man-in-the-middle usually participates from the start of the session, whereas a session hijacking occurs after a session has been established. The difference is largely semantic and not too significant.
  • 6. Computer Network Security 6 Man-in-the-Middle Attack Man-in-the-middle attacks are frequently described in protocols. To see how, suppose you want to exchange encrypted information with your friend. You contact the key server and ask for a secret key with which to communicate with your friend. The key server responds by sending a key to you and your friend. One man-in-the-middle attack assumes someone can see and enter into all parts of this protocol. A malicious middleman intercepts the response key and can then eavesdrop on, or even decrypt, modify, and re- encrypt any subsequent communications between you and your friend.
  • 8. Computer Network Security 8 Intrusion Detection Systems (IDS) An IDS is like an alarm system for your network. The network is protected, but without the IDS (alarm), you would never know whether an attacker was trying to gain entry. The goal of Intrusion detection is to monitor network assets to detect unusual behaviour, inappropriate activity, and attacks, or stop the attack (intrusion) and even provide information to prosecute the attacker. IDSs function on three premises: Where to watch What to watch for What to do
  • 9. Computer Network Security 9 Intrusion Detection Systems (IDS) The first premises “where to watch” tells the IDS the logical location it will be monitoring for something to happen. The Second premises “what to watch for” tells the IDS conditions for which it is supposed to be looking for to raise an alarm or some kind of action. The Third premises “what to do” is the action the IDS has been told to take when a situation meets certain parameters. Real world examples of an IDS in action. 1. you install an IDs to watch the internet connection and those trying to get into your network through your firewall.
  • 10. Computer Network Security 10 Intrusion Detection Systems (IDS) 2. You tell the IDS what types of hacks and attacks to look for based on their packet and connection type and what activities these might generate. 3. You tell the IDS to page you and send you an e-mail when one of these attacks occurs. There are some flaws in the whole IDS operating principle. First, the IDS can watch only one interface at a time. Secondly, the IDS watches only for conditions that you tell it about. Finally, an IDS can actually become an ally to hackers.
  • 11. Computer Network Security 11 Intrusion Detection Systems (IDS) IDS can be deployed in a variety of locations within a network to further increase in organization’s security and protection. In general, two basic forms of IDS are used today. Network intrusion detection system (NIDS). Host intrusion detection system (HIDS).
  • 12. Computer Network Security 12 Network Intrusion Detection Systems (NIDS) NIDS reside directly on the n/w and watches all the traffic that traverses the n/w. NIDS are effective at both watching for inbound/outbound traffic flows and traffic between hosts on or between local n/w segments. NIDS are typically deployed in front of and behind firewalls and VPN gateways to measure the effectiveness of those security devices and interact with them to add more depth to the networks security.
  • 13. Computer Network Security 13 Host Intrusion Detection Systems (HIDS) HIDS are specialized software application that are installed on a computer (typically a user) to watch all inbound and outbound communication traffic to and from that server and to monitor the file system for changes. HIDS are extremely effective on mission-critical, internet-accessible application server, such as web server or e-mail servers, because they can watch the application at source to protect them.
  • 14. Computer Network Security 14 Intrusion Detection Systems (IDS) Both types of sensors offer different techniques for detecting and deferring malicious activity. Both should be deployed to provide the most effective enhancement to a layered defence strategy.
  • 16. Computer Network Security 16 What is a Firewall? A firewall is a security device that sits on the edge of your Internet connection and functions as an Internet Border Security Officer. It constantly looks at all the traffic entering and exiting your connection, waiting for traffic it can block or reject in response to an established rule. The firewall is law and protection in a lawless global web. Firewalls can protect both individual computer and corporate networks from hostile intrusions from the internet.
  • 17. Computer Network Security 17 Why Do I Need a Firewall? It is no secret: hackers are out there, and they are out to get us. Often, we do not know who they are, but we do know where they are and where we do not want them to be (in our n/w). Like pirates of old roamed the seas, hackers roam the wide expanses of the internet. You do not want them to enter your n/w and roam among the computers that connect to it. You know that you must protect your n/w from these attackers, and one of the most efficient methods of protecting your n/w is to install a firewall.
  • 18. Computer Network Security 18 Why Do I Need a Firewall? By default, any good firewall prevent n/w traffic from passing between the internet and your internal n/w. this does not mean that the firewall will stop all traffic-that defeats the purpose of being on the internet. It does mean that the firewall is configured to allow only web browsing (HTTP/port 80) to access it from the internet. Technically, a firewall is a specialized version of a router. Apart from the basic routing functions and rules, a router can be configured to perform the firewall functionality, with the help of additional software resources.
  • 19. Computer Network Security 19 Common rules and features Block incoming n/w traffic based on source or destination- blocking unwanted incoming traffic is the most common features of a firewall and is the main reason for a firewall. Block outgoing n/w traffic based on source or destination- many firewalls can also screen n/w traffic from your internal n/w to the internet. E.g. prevent your employee from accessing inappropriate websites. Block n/w traffic based on content- More advanced firewall can screen n/w traffic for unacceptable content. E.g. a firewall that is integrated with a virus scanner can prevent files that contain viruses from entering your n/w.
  • 20. Computer Network Security 20 Common rules and features Make internal resources available- Although the primary purpose of a firewall is to prevent unwanted n/w traffic from passing through it, you can configure many firewalls to allow selective access to internal resources, such as a public web server, while still preventing other access from the internet to your internal n/w. Allow connections to internal n/w- A Common method for employee to connect to a n/w is using virtual private n/w (VPNs). VPNs allow to secure connections from the internet to a corporate networks. E.g. telesales and travelling people can use a VPN to connect to corporate n/w
  • 21. Computer Network Security 21 Common rules and features Make internal resources available-When screening n/w traffic to and from the internet, it is also important to know what your firewall is doing, who tried to break into your n/w, and who tried to access inappropriate material on the internet.
  • 22. Computer Network Security 22 Implementing a Firewall The choice of available firewalls is almost mind-boggling theses days; they come in every shape, size and parameter. The type of firewall you install depends on exact requirement for protection and management, as well as the size of your n/w or what is to be protected by the firewall. Firewalls usually fall into one of the following categories
  • 23. Computer Network Security 23 Implementing a Firewall Persona firewall- is usually a piece of software that is installed on a single PC to protect only the PC. These type of firewalls are usually deployed on home PCs with broadband connections or remote employees. All-in-one-firewall- These kinds of firewalls are widely used by broadband (cable or DSL) subscribers who have the benefit of a single device that offers the following features and functionality: router, Ethernet switches, WAP and a firewall. Small-to-medium office firewalls- These firewalls, such as the Cisco PIX 501 or 506, are designed to provide security and protection for small offices. Enterprise firewalls- These firewalls, such as the Cisco PIX 515, are designed for larger organization with thousands of users.
  • 24. Computer Network Security 24 ANY QUESTIONS ?