SlideShare a Scribd company logo
Network Security &
System Admin
Presented By :
Md Sahabuddin
1
2
NETWORK SECURITY
• Information & Network penetration do occur
- from outsiders & insiders
in spite of having various security measures
such as Anti-virus, Firewalls, Routers
• There are two ways to attack computers
- Gain physical access to machines & conduct
physical attack
- Attack by use of malicious software; Malware
Organization
 What is Security all about?
 What is at Risk?
 Why Risks Exist?
 General Threat Perceptions
 Security
 Data (local, Remote)
 Communications
 Secure Backup
 Network Perimeter Security
 General Policy
 Min. Security Enforcement
 Intrusion Detection System
 Cryptographic Security
 VPN: A Roadmap
 Points for Action
 Emergency Response Team
3
Who is vulnerable?
4
5
Security Goals
Confidentiality
Integrity
Avalaibility
What is Security all about?
 Confidentiality:
 Protecting sensitive information from unauthorized
disclosure or intelligible interception; Only seen by
entities to whom it is addressed
 Integrity:
 Not modified/destroyed in a unauthorized way;
safeguarding the accuracy & completeness of information
& software
 Access Control:
 Access (computation, data, service) follows the prescribed
policy
 Authentication:
 Verifying the identity claimed
6
Contd.
 Availability:
 System accessible/usable on demand
 Nonrepudiation:
 Protection against false denial of comm.
 Audit Trail:
 Chronological record of system activities to enable
reconstruction/examination of environments/activities
leading to an operation from inception to final results.
 Privacy:
 Breach of confidentiality is also invasion of privacy.
 Collecting a dossier based upon his activities - inferring
habits, movements, expenditures  Security Risk
7
Active and Passive Threats
8
Common security attacks
and their countermeasures
 Finding a way into the network
 Firewalls
 Exploiting software bugs, buffer overflows
 Intrusion Detection Systems
 Denial of Service
 Ingress filtering, IDS
 TCP hijacking
 IPSec
 Packet sniffing
 Encryption (SSH, SSL, HTTPS)
 Social problems
 Education
9
General Threat Perceptions
 Network threatened by external running
malicious scripts (Malware)
 Adversaries attempting access protected
services, break into machines, snoop
communications, collect statistics of
transactions …
 Insiders and outsiders
 Disasters (natural and man-made)
10
Secure Storing of Data
(Local Storage)
 Physical Security
 Protect machine
 Limit network access
 Most secure (without
external access)
 Suppose it falls into
an adversary
 All the data can be
obtained in the clear
 Cryptographic Secure.
 Protects even if the m/c
falls to adversary
 Of course person having
access can delete --
Hence, BACKUP
 Data Integrity
 Cryptography: Fragile
 System issues, user
interfaces , Crypto-file
servers …
11
Eternal Blue Attack
 EternalBlue exploits a vulnerability in Microsoft's
implementation of the Server Message Block (SMB)
protocol. This vulnerability is denoted by entry CVE-
2017-0144 .
 Execution of Attack.
12
13
14
15
16
17
18
Network Scanning
19
20
Closing Open Ports
21
22
23
24
Firewalls
 A firewall is like a castle with a drawbridge
 Only one point of access into the network
 This can be good or bad
 Can be hardware or software
 Ex. Some routers come with firewall
functionality
 ipfw, ipchains, pf on Unix systems, Windows
XP and Mac OS X have built in firewalls
25
Firewall
 Used to filter packets based on a combination
of features
 These are called packet filtering firewalls
 There are other types too, but they will not be discussed
 Ex. Drop packets with destination port of 23
(Telnet)
 Can use any combination of IP/UDP/TCP header
information
 man ipfw on unix47 for much more detail
 But why don’t we just turn Telnet off?
26
Firewall
27
Intranet
DMZInternet
Firewall
Firewall
Web server, email
server, web proxy,
etc
Firewall
 Here is what a computer with a default
Windows 7 install looks like:
 135/tcp open loc-srv
 139/tcp open netbios-ssn
 445/tcp open microsoft-ds
 1025/tcp open NFS-or-IIS
 3389/tcp open ms-term-serv
 5000/tcp open UPnP
 Might need some of these services, or might
not be able to control all the machines on the
network
28
Configuring Windows Firewall
29
30
31
32
33
34
DoS (Denial of Service)
 Purpose: Make a network service
unusable, usually by overloading the
server or network
 Many different kinds of DoS attacks
 SYN flooding
 SMURF
 Distributed attacks
 Mini Case Study: Code-Red
35
Denial of Service
 SYN flooding attack
 Send SYN packets with bogus source address
 Why?
 Server responds with SYN ACK and keeps state
about TCP half-open connection
 Eventually, server memory is exhausted with this state
 Solution: use “SYN cookies”
 In response to a SYN, create a special “cookie” for the
connection, and forget everything else
 Then, can recreate the forgotten information when the
ACK comes in from a legitimate connection
36
Denial of Service
37
Internet
Perpetrator Victim
ICMP echo (spoofed source address of victim)
Sent to IP broadcast address
ICMP echo reply
Smurf Attack
38
Intrusion Detection Systems
 Attack detection, with automated response
 Damage prevention and containment
 Tracing and isolation of attack origin points
 Used to monitor for “suspicious activity” on a
network
 Can protect against known software exploits, like buffer
overflows
 Open Source IDS: Snort, www.snort.org
39
Intrusion Detection
 Uses “intrusion signatures”
 Well known patterns of behavior
 Ping sweeps, port scanning, web server indexing, OS
fingerprinting, DoS attempts, etc.
 However, IDS is only useful if contingency
plans are in place to curb attacks as they are
occurring
40
Snort Configuration
41
42
Black & White List
43
44
45
WPA 2 (Wi-Fi Protected Access 2 )
46
Wi-Fi Protected Access 2 is a network
security technology commonly used on Wi-Fiwireless
networks. It's an upgrade from the
original WPA technology, which was designed as a
replacement for the older and much less secure WEP.
WPA2 is used on all certified Wi-Fi hardware since 2006 and is
based on the IEEE 802.11i technology standard for data
encryption.
Cracking WPA 2 Network :
47
48
49
50
51
52
DDoS (Distributed Denial of Service)
 DDoS is a type of DOS attack where multiple
compromised systems, which are often infected with
a Trojan, are used to target a single system causing
aDenial of Service (DoS) attack.
 Victims of a DDoS attack consist of both the end targeted
system and all systems maliciously used and controlled
by the hacker in the distributed attack.
 The DDoS attack uses multiple computers and Internet
connections to flood the targeted resource. DDoS attacks
are often global attacks, distributed via botnets.
53
Execution of DDoS Attack
54
55
56
57
58
59
60
61
Security related URLs
 http://www.robertgraham.com/pubs/netwo
rk-intrusion-detection.html
 http://online.securityfocus.com/infocus/152
7
 http://www.snort.org/
 http://www.cert.org/
 http://www.nmap.org/
 http://grc.com/dos/grcdos.htm
 http://lcamtuf.coredump.cx/newtcp/
THANK YOU
62

More Related Content

What's hot

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
Soban Ahmad
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Hishan Shouketh
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
Arun Mahajan
 
Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
Firewalls
FirewallsFirewalls
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
karanwayne
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
yogendrasinghchahar
 
Firewall
FirewallFirewall
Network security
Network securityNetwork security
Network security
mustafa aadel
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
 
Firewall
FirewallFirewall
Firewall
lmbriscoe
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Firewall
FirewallFirewall

What's hot (20)

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
Network security
 Network security Network security
Network security
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
FireWall
FireWallFireWall
FireWall
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 

Similar to Network security and System Admin

Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
Education
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
Education
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Network Security
Network SecurityNetwork Security
Network Security
DURYODHAN MAHAPATRA
 
Day4
Day4Day4
Day4
Jai4uk
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
ApdiazizHussein
 
Network Security
Network SecurityNetwork Security
Network Security
Fatima Zohra BENHACINE
 
Network Security
Network SecurityNetwork Security
Network Security
Puneet Abichandani
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
Dhanvanthkesavan
 
Network seurity
Network seurityNetwork seurity
Network seurity
Naqash Rasheed
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 
System and web security
System and web securitySystem and web security
System and web security
chirag patil
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 

Similar to Network security and System Admin (20)

Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Day4
Day4Day4
Day4
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
System and web security
System and web securitySystem and web security
System and web security
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Network security and System Admin

  • 1. Network Security & System Admin Presented By : Md Sahabuddin 1
  • 2. 2 NETWORK SECURITY • Information & Network penetration do occur - from outsiders & insiders in spite of having various security measures such as Anti-virus, Firewalls, Routers • There are two ways to attack computers - Gain physical access to machines & conduct physical attack - Attack by use of malicious software; Malware
  • 3. Organization  What is Security all about?  What is at Risk?  Why Risks Exist?  General Threat Perceptions  Security  Data (local, Remote)  Communications  Secure Backup  Network Perimeter Security  General Policy  Min. Security Enforcement  Intrusion Detection System  Cryptographic Security  VPN: A Roadmap  Points for Action  Emergency Response Team 3
  • 6. What is Security all about?  Confidentiality:  Protecting sensitive information from unauthorized disclosure or intelligible interception; Only seen by entities to whom it is addressed  Integrity:  Not modified/destroyed in a unauthorized way; safeguarding the accuracy & completeness of information & software  Access Control:  Access (computation, data, service) follows the prescribed policy  Authentication:  Verifying the identity claimed 6
  • 7. Contd.  Availability:  System accessible/usable on demand  Nonrepudiation:  Protection against false denial of comm.  Audit Trail:  Chronological record of system activities to enable reconstruction/examination of environments/activities leading to an operation from inception to final results.  Privacy:  Breach of confidentiality is also invasion of privacy.  Collecting a dossier based upon his activities - inferring habits, movements, expenditures  Security Risk 7
  • 8. Active and Passive Threats 8
  • 9. Common security attacks and their countermeasures  Finding a way into the network  Firewalls  Exploiting software bugs, buffer overflows  Intrusion Detection Systems  Denial of Service  Ingress filtering, IDS  TCP hijacking  IPSec  Packet sniffing  Encryption (SSH, SSL, HTTPS)  Social problems  Education 9
  • 10. General Threat Perceptions  Network threatened by external running malicious scripts (Malware)  Adversaries attempting access protected services, break into machines, snoop communications, collect statistics of transactions …  Insiders and outsiders  Disasters (natural and man-made) 10
  • 11. Secure Storing of Data (Local Storage)  Physical Security  Protect machine  Limit network access  Most secure (without external access)  Suppose it falls into an adversary  All the data can be obtained in the clear  Cryptographic Secure.  Protects even if the m/c falls to adversary  Of course person having access can delete -- Hence, BACKUP  Data Integrity  Cryptography: Fragile  System issues, user interfaces , Crypto-file servers … 11
  • 12. Eternal Blue Attack  EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE- 2017-0144 .  Execution of Attack. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 20. 20
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. Firewalls  A firewall is like a castle with a drawbridge  Only one point of access into the network  This can be good or bad  Can be hardware or software  Ex. Some routers come with firewall functionality  ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls 25
  • 26. Firewall  Used to filter packets based on a combination of features  These are called packet filtering firewalls  There are other types too, but they will not be discussed  Ex. Drop packets with destination port of 23 (Telnet)  Can use any combination of IP/UDP/TCP header information  man ipfw on unix47 for much more detail  But why don’t we just turn Telnet off? 26
  • 28. Firewall  Here is what a computer with a default Windows 7 install looks like:  135/tcp open loc-srv  139/tcp open netbios-ssn  445/tcp open microsoft-ds  1025/tcp open NFS-or-IIS  3389/tcp open ms-term-serv  5000/tcp open UPnP  Might need some of these services, or might not be able to control all the machines on the network 28
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. DoS (Denial of Service)  Purpose: Make a network service unusable, usually by overloading the server or network  Many different kinds of DoS attacks  SYN flooding  SMURF  Distributed attacks  Mini Case Study: Code-Red 35
  • 36. Denial of Service  SYN flooding attack  Send SYN packets with bogus source address  Why?  Server responds with SYN ACK and keeps state about TCP half-open connection  Eventually, server memory is exhausted with this state  Solution: use “SYN cookies”  In response to a SYN, create a special “cookie” for the connection, and forget everything else  Then, can recreate the forgotten information when the ACK comes in from a legitimate connection 36
  • 37. Denial of Service 37 Internet Perpetrator Victim ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply
  • 39. Intrusion Detection Systems  Attack detection, with automated response  Damage prevention and containment  Tracing and isolation of attack origin points  Used to monitor for “suspicious activity” on a network  Can protect against known software exploits, like buffer overflows  Open Source IDS: Snort, www.snort.org 39
  • 40. Intrusion Detection  Uses “intrusion signatures”  Well known patterns of behavior  Ping sweeps, port scanning, web server indexing, OS fingerprinting, DoS attempts, etc.  However, IDS is only useful if contingency plans are in place to curb attacks as they are occurring 40
  • 42. 42
  • 43. Black & White List 43
  • 44. 44
  • 45. 45
  • 46. WPA 2 (Wi-Fi Protected Access 2 ) 46 Wi-Fi Protected Access 2 is a network security technology commonly used on Wi-Fiwireless networks. It's an upgrade from the original WPA technology, which was designed as a replacement for the older and much less secure WEP. WPA2 is used on all certified Wi-Fi hardware since 2006 and is based on the IEEE 802.11i technology standard for data encryption. Cracking WPA 2 Network :
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 52
  • 53. DDoS (Distributed Denial of Service)  DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing aDenial of Service (DoS) attack.  Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.  The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets. 53
  • 54. Execution of DDoS Attack 54
  • 55. 55
  • 56. 56
  • 57. 57
  • 58. 58
  • 59. 59
  • 60. 60
  • 61. 61 Security related URLs  http://www.robertgraham.com/pubs/netwo rk-intrusion-detection.html  http://online.securityfocus.com/infocus/152 7  http://www.snort.org/  http://www.cert.org/  http://www.nmap.org/  http://grc.com/dos/grcdos.htm  http://lcamtuf.coredump.cx/newtcp/