SlideShare a Scribd company logo
Security in Network
Computing
What is Security?
 Protecting and Preserving the confidentiality, integrity,
availability of information stored on computers or in transit
on a network.
 + Protecting the critical elements of a computer or network
system (the hardware, the software, communication system
…etc.)
 Ensure non-repudiation
 This requires the implementation of policy, awareness
training, education and technology
Another Definition
 Information security can be thought of as the protection of
the information system and its resources against accidental
or intentional disclosure of confidential data, unlawful
modification of data or programs, the destruction of data,
software or hardware, and ensuring non-repudiation.
Other Concerns
 Information security also includes the prevention of use of
one’s computer facilities for criminal activities including
computer related fraud and blackmail.
 Information security also involves the elimination of
weaknesses or vulnerabilities that might be exploited to
cause loss or harm.
The Main Pillars of Security
 The CIA Triangle:
 Confidentiality ensures that computer-related assets are accessed
only by authorized parties. That is, only those who should have
access to something will actually get that access. By "access," we
mean not only reading but also viewing, printing, or simply
knowing that a particular asset exists. Confidentiality is sometimes
called secrecy or privacy.
 Integrity means that assets can be modified only by authorized
parties or only in authorized ways. In this context, modification
includes writing, changing, changing status, deleting, and creating.
 Availability means that assets are accessible to authorized parties
at appropriate times. In other words, if some person or system has
legitimate access to a particular set of objects, that access should
not be prevented. For this reason, availability is sometimes known
by its opposite, denial of service.
The CIA Traingle
Some People Add Other
Properties
 Accuracy means information is free from error and has the
value the end user expects
 Authenticity is quality or state of being genuine or original,
rather than reproduced or fabricated; information is
authentic when it is what was originally created, placed,
stored, or transferred
 Utility of information is quality or state of having value for
some end purpose; information must be in a format
meaningful to end user
 Non-Repudiation: means that the sender or generator of
information cannot deny that he did send or generate the
information
Vulnerabilities, Threats, Attacks
and Controls
 An interesting definition of security is: “Prevent threats from
exploiting vulnerabilities to perform attacks”
 So, what do these terms mean?
Vulnerability
 A vulnerability is a weakness in the security system, for
example, in procedures, design, or implementation, that
might be exploited to cause loss or harm.
 For instance, a particular system may be vulnerable to
unauthorized data manipulation because the system does
not verify a user's identity before allowing data access.
Threat
A threat to a computing system is a set of
circumstances that has the potential to
cause loss or harm.
Control
 A control is an action, device, procedure, or technique that
removes or reduces a vulnerability.
 A threat is blocked by control of a vulnerability.
Types of Threats
 To devise controls, we must know as much about threats as
possible. We can view any threat as being one of four kinds:
 interception,
 interruption,
 modification,
 fabrication
Interception
 Information disclosure/information leakage
 An unauthorized party gains access to an asset.
 This is an attack on confidentiality.
 The unauthorized party could be a person, a program, or a
computer.
 Examples include:
 wiretapping to capture data in a network
 the illicit copying of files or programs
Interception
Interruption
 An asset of the system is destroyed or becomes unavailable
or unusable. This is an attack on the availability.
 Examples include destruction of a piece of hardware, such
as a hard disk, the cutting of a communication link, or the
disabling of the file management system.
 DOS - Denial of Service Attacks have become very well
known.
Interruption
Modification
 Modification is integrity violation.
 An unauthorized party not only gains access to but tampers
with an asset.
 This is an attack on the integrity.
 Examples include changing values in a data file, altering a
program so that it performs differently, and modifying the
content of a message being transmitted in a network.
Modification
Fabrication
 An unauthorized party inserts counterfeit objects into the
system. This is an attack on the authenticity.
 Examples include the insertion of spurious messages in a
network or the addition of records to a file.
Fabrication
Some Threat Categories
Actions to Protect Against a
Harm
 Harm occurs when a threat is realized against a
vulnerability. To protect against harm, then, we can
neutralize the threat, close the vulnerability, or both. The
possibility for harm to occur is called risk. We can deal with
harm in several ways. We can seek to
 prevent it, by blocking the attack or closing the vulnerability
 deter it, by making the attack harder but not impossible
 deflect it, by making another target more attractive (or this one
less so)
 detect it, either as it happens or some time after the fact
 recover from its effects
Attacks
 A human who exploits a vulnerability perpetrates an attack
on the system.
 An attack can also be launched by another system, as when
one system sends an overwhelming set of messages to
another, virtually shutting down the second system's ability
to function.
Attacks: Another Definition
 An attack is a deliberate act that exploits vulnerability
 Accomplished by threat agent to damage or steal
organization’s information or physical asset
 Exploit is a technique to compromise a system
 Vulnerability is an identified weakness of a controlled system
whose controls are not present or are no longer effective
 Attack is the use of an exploit to achieve the compromise of a
controlled system
Sli
de
24
Slide 24
Eavesdropping
Common packet sniffers: TCPdump, Wireshark
Solution - Encrypt Data
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Cryptanalysis
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Cryptanalysis
Find useful information from ciphertext data
e.g. analyze statistical structure
Defense method
Use longer keys and stronger encryption algorithm
Password Pilfering
Password Pilfering
Password protection is often the first
defense line
probably the only defense available in the
system
Methods to pilfer user password:
Guessing
Social engineering
Dictionary attacks
Password sniffing
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Guessing
Easiest, particularly on short or default passwords
10 most commonly-used passwords (ref. PC Magazine):
 password
 123456
 qwerty (which are keys below 123456 on standard keyboard
 abc123
 letmein
 monkey
 myspace1
 Password1
 Blink182
 The user’s own first name
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Social Engineering
Methods of using social skills to pilfer secret information
 Physical Impersonation
The attacker pretends to be another person to delude the victim
(See example on page 6 from textbook)
 Phishing
The most common form of mass social engineering attacks in recent
years
Disguised email messages or masquerade web sites
 See the next slide for a real phishing example verbatim (note the typos
in the phishing email), where the link in the email is a trap
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Date: Fri, 5 Oct 2007 16:11:46 -0700
From: US Bank SCD-Verify@usbank.com
Subject: US Bank – Internet Online Access is Locked – October 5, 2007 at 12:23:05 PM
Dear US Bank Customer,
We’re sorry, but you reached the maximum number of attempts allowed to login into your US
Bank account. For your protection, we have locked your account.
Consequently, we placed a temporary restriction on your account. We did this to protect your
account from any fraudulent activity.
Please click below and complete the steps to Remove Limitations. This allows us to confirm your
identity and unlock your US Bank online account
http://www4-usbank.com/
If we do no receive the appropriate account verification within 48 hours, then we will assume this
US Bank account is fraudulent and will be suspented.
US Bank, Member FDIC. @2007 US Bank Corporation. All Rights Reserved.
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
In general, any phishing email would contain a link to a
bogus Web site, called a phishing site
Other forms
 Collect recycled papers from recycling bins
 Web browser pop up a window asking for user login
Defense Method – Anti-phishing extensions of web
browsers are emerging technology for detecting and
blocking phishing sites
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Dictionary Attacks
Only encrypted passwords should be stored in a
computer system
in UNIX/Linux:
passwords are stored in a file named shadows
under directory /etc
in Windows XP:
passwords are stored in a file named SAM,
which is stored in the system’s registry
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
A typical dictionary attack proceeds as follows:
 Obtain information of user names and the corresponding
encrypted passwords
 Run the encryption routine used by the underlying system on all
dictionary words, names, and dates
 Compare each output obtained from step 2 with the encrypted
passwords obtained from step 1. If a match presents, a user
password is found
Constructing a Rainbow table helps to reduce the table size and
make the computation manageable
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Rainbow Table
Password Hash value
w11
w21
…
wk1
h(w1 n1)
h(w2 n2)
…
h(wk nk)
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 r is a reduction function
 h is a cryptographic hash function
 w11 is a given password. Apply h and r alternatively to obtain a
chain of passwords that are different pairwise:
where, w1i = r(h(w1,i-1 ), i = 2,3,…,n1 and store (w11, h(w1n1))
 Select wj1 not occurred in previous chains
Repeat this procedure k times generating k rows in the rainbow table
Let f: A→B and g: B→A be two functions. Let y∈ B and i ≥ 0.
Define:
Let Q0 be an encrypted value of a password w. That is, Q0 =
h(w). If
for some i ≥ 0 and some j with 1 ≤ j ≤ k and i ≤ j, then w is
possible to appear in the jth chain of wj1,…wj,nj .
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 Algorithm to find w in a rainbow table:
1. Set Q1 ← Q0 and t ← 0. Let n = max{n1,…,nk}
2. Check if there is a 1 ≤ j ≤ k such that Q1 = h(wj,nj) and t ≤ n. If yes, goto
step 3; otherwise, goto step 4
3. Apply r and h alternatively on wj1 for 0 ≤ i ≤ j times until
wj,ni
= (r ○ h)i(wj1) is generated such that h(wj,ni
) = Q0 . If such a wj,ni
is
found, return w = wj,ni
; otherwise, goto step 4
4. Set Q1 ← h(r(Q1)) and t ← t + 1. If t ≤ n then goto step 2. Otherwise,
return “password not found.” (the rainbow table doesn’t contain the
password whose hash value equals Q0 )
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Password Sniffing
Password sniffers are software programs, used to capture
remote login information such as user names and user
passwords
Defense Method – encrypt all message, include login
information, using, e.g., SSH and HTTPS
Cain & Abel, a password recovery tool, can capture and
crack encrypted password for the Microsoft Operating
System
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Password Protection
Rules to help protect passwords from pilfering:
1. Use long passwords, with a combination of letters, capital letters, digits,
and other characters such as $,#,@. Do not use dictionary words, common
names and dates.
2. Do not reveal your passwords to anyone you do not know. Do not submit
to anyone who acts as if he has authority. If you have to give out your
password, do so face to face.
3. Change passwords periodically and do not reuse old passwords.
4. Do not use the same password for different accounts.
5. Do not use remote login software that does not encrypt user passwords
and other important personal information.
6. Shred all discarded papers using a good paper shredder.
7. Avoid entering any information in any popup window, and avoid clicking
on links in suspicious emails.
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Other User-Authentication Methods
 Use biometrics of unique biological features – connect
biometric devices to a computer, such as fingerprint readers
and retina scanners
 Use authenticating items – electronic passes authenticated by
the issuer.
Authentication using user passwords is by
far the easiest method
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Identity Spoofing
Identity spoofing attacks allow attackers
to impersonate a victim without using the
victim’s passwords
 Man-in-the-middle attacks.
 Message replays
 Network spoofing attacks
 Software exploitation attacks
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Man-in-the-middle Attacks
Compromise a network device (or installs one of his own) between two or
users. Using this device to intercept, modify, or fabricate data transmitted
between users.
Defense measures – encrypting and authenticating IP packets
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Message Replays
The attacker first intercepts a legitimate message, keeps it intact, and
then retransmits it at a later time to the original receiver
For example, an attacker may intercept an authentication pass of a
legitimate user, and use it to impersonate this user to get the services
from the system
Defense Mechanisms –
Attach a random number to the message. This number is referred to as nonce
Attach a time stamp to the message
The best method is to use a nonce and a time stamp together
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 IP spoofing is one of the major network spoofing techniques
 SYN flooding
 The attacker fills the target computer’s TCP buffer with a large
number of crafted SYN packets
 Purpose: Make the target computer unable to establish connection
(i.e., to mute the computer)
 ARP spoofing, which is also known as ARP poisoning
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Network Spoofing
• SYN flooding
Attacker fills the target computer’s TCP buffer with a large
volume of crafted SYN packets, making the target computer
unable to establish connections with other computers
1. Attacker sends to the target computer a large number of crafted SYN
packets
2. The victim’s computer is obliged to send an ACK packet to the crafted
source IP address contained in the SYN packet
3. Because the crafted source IP address is unreachable, the victim’s
computer will never receive the ACK packet it is waiting for, making the
crafted SYN packet remain in the TCP buffer
4. The TCP buffer is completely occupied by the crafted SYN packets
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• TCP Hijacking
V is a company computer
Alice, an employee of the company, is going to remote logon to V
Her TCP connection with V may be hijacked as follows:
1. Alice sends a SYN packet to V for remote login
2. The attacker hijacts this packet, and uses SYN flooding to mute V so that V can’t
complete the three-way handshake
3. The attacker predicts the correct TCP sequence number for the ACK supposed to
be sent from V to Alice. The attacker then crafts an ACK packet with the sequence
number and V’s IP address and sends it to Alice
4. Alice verifies the ACK packet and sends an ACK packet to the attacker to complete
this handshake
5. The TCP connection is now established between Alice and the attacker, instead of
between Alice and V
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• ARP Spoofing
The attacker changes the legitimate MAC address of a networked
computer to a different MAC address chosen by the attacker
Defense method –
Check MAC address and domain names
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Buffer-Overflow Exploitation
 Buffer-Overflow Exploitation
Buffer overflow, a.k.a. buffer overrun, is a common
software flaw. Buffer overflow occurs if the process
writes more data into a buffer area than it is supposed to
hold
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
It is possible to exploit buffer
overflows to redirect the victim’s
program to execute attackers’
own code located in a different
location. Such attacks often
exploit function calls in standard
memory layout, where the buffer
is placed in a heap and the
return address of the function
call is placed in a stack
 General steps of buffer-overflow attack:
1. Find a program that is prone to buffer overflows (e.g. programs
using functions that do not check bounds are good candidates)
2. Figure out the address of the attacker’s code
3. Determine the number of bytes long enough to overwrite the
return address
4. Overflow the buffer that rewrites the original return address of
the function call with the address of the attacker’s code
Defense method – Always add statements to check bounds
when dealing with buffers in a program
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Repudiation
In some situations the owner of the data
may want to deny ownership of the data to
evade legal consequences
 He may argue that he has never sent or received
the data in question
Defense method –
Use stronger encryption and authentication
algorithms
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Intrusion
 An unauthorized user gains access to someone else’s computer
systems. Configuration loopholes, protocol flaws, and software
side effects may all be exploited by intruders
 Intrusion detection is a technology for detecting intrusion
incidents. Closing TCP and UDP ports that may be exploited by
intruders can also help reduce intrusions
 IP scans and Port scans are common hacking tools. However, it
can also help users to identify in their own systems which ports
are open and which ports may be vulnerable.
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Traffic Analysis
The purpose is to determine who is talking to whom
by analyzing IP packets. Even if the payload of the IP
packet is encrypted, the attacker may still obtain
useful information from analyzing IP headers
Defense method – Encrypt IP headers. But an IP
packet with an encrypted IP header cannot be routed
to destination. Thus, network gateways are needed
 Network gateway also protects internal network topology
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
(1) Sender forwards an IP packet to gateway A. (2) gateway A encrypts sender’s
IP packet and routes it to the next router in the Internet. (3) The IP packet from
Gateway A is delivered to gateway B. (4) Gateway B removes its header, decrypts
the encrypted IP packet of the sender, and forwards it to the receiver.
Denial of Service Attacks
To block legitimate users from getting
services they can normally get from
servers
DoS – launched from a single computer
DDoS – launched from a group of
computers
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 DoS
SYN flooding is a typical and effective technique used
by DoS attacks. The smurf attack is another typical
type of DoS attacks
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Attacker sends an excessive number of crafted ping requests to a large number of
computers within a short period of time, where the source IP address in the crafted
ping request is replaced with the victim’s IP address. Therefore, each computer that
receives the crafted ping request will respond to the victim’s computer with a pong
message.
 DDoS
A typical DDoS attack proceeds as follows:
1. Compromise as many networked computers as possible
2. Install special software in the compromised computers to
carry out a DoS attack at a certain time later; these
computers are called zombies
3. Issue an attack command to every zombie computer to
launch a DoS attack on the same target at the same time
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Spam Mail
Spam mails are uninvited email messages, which may be
commercial messages or phishing messages
While not intended to bring the user’s computer out of service,
spam mails do consume computing resources
Spamming also occurs in Web search engines, Instant
Messaging, blogs, mobile phone messaging, and other network
applications
Defense method – spam fillers are software solutions to detect
and block spam mails from reaching the user’s mailbox
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Figure 1-12 The Nigerian National
Petroleum Company
Sli
de
57
Slide 57
Malicious Software
Software intended to harm computers is
malicious software. Malicious software is also
referred to as malware
Virus
Worms
Trojan horses
Logic bombs
Backdoors
Spyware
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 Viruses and Worms
• A computer virus is a piece of code that can reproduce itself
• It is not a standalone program, and so it must attach itself to a
host program or file
• A host program or file that contains a virus is called an infected
host
• A computer worm is also a piece of code that can reproduce itself.
Unlike a virus, a worm is a stand alone program
Defense method –
 Do not download software from untrusted Web sites or other sources
 Do not open any executable file created by someone you do not know
 Make sure software patches are installed and up to date
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 Trojan Horse
Trojan horses are software programs that appear to
do one thing, but secretly also do other things
Trojan horses often disguise themselves as desirable
and harmless software applications to lure people to
download them
Defense method – The same measures of combating
viruses and worms can also be used to combat Trojan
horses. Virus scans can also detect, quarantine, and
delete Trojan horses
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 Logic Bombs
Logic bombs are subroutines or instructions embedded in a
program. Their execution are triggered by conditional
statements
Defense method –
 Employers should take good care of their employees, so that none
would be tempted to place a logic bomb
 Project managers should hire an outside company or form a special
team of reviewers from a different group of people other than the
developer to review the source code
 Relevant laws should be established so that employees who
planted logic bombs will face criminal charges
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 Backdoors
Backdoors are secret entrance points to a
program
They may be inserted by software developers
to provide a short cut to enter a password-
protected program when attempting to modify
or debug code
Defense method – Check source code by an
independent team
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
• Spyware
Spyware is a type of software that installs itself on the
user’s computer
Spyware is often used to monitor what users do and
harass them with popup commercial messages
 Browser Hijacking – a technique that changes the settings
of the user’s browsers
 Zombieware – software that takes over the user’s
computer and turns it into a zombie for launching DDoS
attacks or into a relay which carries out harmful activities
such as sending spam email or spreading viruses.
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Spyward can also do a list of other things,
including
 Monitoring – monitor and report to a web server or to
the attacker’s machine a user’s surfing habits and
patterns
 Password sniffing – sniff user passwords by logging
users’ keystrokes using a keystroke logger
 Adware – software that automatically displays
advertising materials on the user’s computer screen
Defense method – use anti-spyware software to
detect and block spyware
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Hackers
 Hackers
Computer hackers are people with special knowledge of computer
systems. They are interested in subtle details of software,
algorithms, and system configurations
Black-Hat Hackers – hack computing systems for their own benefit
White-Hat Hackers – hack computing systems for the purpose of
searching for security loopholes and developing solutions
Grey-Hat Hackers – wear a white hat most of the time, but may also
wear a black hat once in a while
When discovering security vulnerabilities in a software
product, white-hat hackers and grey-hat hackers would
often work directly with the vendors of products to help fix
the problems
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Script Kiddies
Script kiddies are people who use scripts
and programs developed by black-hat
hackers to attack other people’s
computers
Even though they do not know how to
write hacking tools or understand how an
existing hacking tool works, script kiddies
could inflict a lot of damage
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Cyber Spies
Collecting intelligence through intercepted
network communications is the job of cyber
spies
Countries have intelligence agencies
Military organizations have intelligence units
They intercept network communications and
decipher encrypted messages
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Vicious Employees, Cyber Terrorists
and Hypothetical Attackers
 Vicious Employees
Vicious employees are people who intentionally breach security to harm their
employers
 Cyber Terrorists
Cyber terrorists are terrorists who use computer and network technologies to carry
out their attacks and produce public fear
 Hypothetical Attackers
 black-hat hackers
 script kiddies
 greedy cyber spies who are willing to betray their countries or
organizations for monetary benefits
 vicious employees
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Basic Security Model
The basic security model consists of four
components: cryptosystems, firewalls, anti-
malicious-software systems (AMS software),
and intrusion detection system (IDS)
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
 Network model of cryptosystem
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Example Security Resources
 CERT
www.cert.org
 SANS Institute
www.scans.org
 Microsoft Security
www.microsoft.com/security/default.ms
px
 NTBugtraq
www.ntbugtraq.com
J. Wang. Computer Network Security Theory and Practice. Springer, 2009
Assignment 1
 Write a short report that explains how buffer overflow
attacks are performed. Use examples to illustrate your
answer.
 Explain how Rainbow Tables are constructed and how do
they work

More Related Content

What's hot

System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
Emmanuel Gbenga Dada (BSc, MSc, PhD)
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
HCL Technologies
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
Dedi Dwianto
 
Website security
Website securityWebsite security
Website security
RIPPER95
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
Education
 
External Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsExternal Attacks Against Pivileged Accounts
External Attacks Against Pivileged Accounts
Lindsay Marsh
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
BeyondTrust
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
Marc Vael
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 

What's hot (20)

System Security
System SecuritySystem Security
System Security
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
 
Website security
Website securityWebsite security
Website security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
External Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsExternal Attacks Against Pivileged Accounts
External Attacks Against Pivileged Accounts
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Computer security
Computer securityComputer security
Computer security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 

Similar to Security in network computing

Insecurity vssut
Insecurity vssutInsecurity vssut
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
newbie2019
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
Priyamvada Singh
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
PiBits
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
deepakbharathi16
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
ronak56
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
shahadd2021
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
desalewminale
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
Sitamarhi Institute of Technology
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
ShreyaChavan28
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
bagotjesusa
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
vkarthi314
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
MahalakshmiShetty3
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
Haley Johnson
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 

Similar to Security in network computing (20)

Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Security in network computing

  • 2. What is Security?  Protecting and Preserving the confidentiality, integrity, availability of information stored on computers or in transit on a network.  + Protecting the critical elements of a computer or network system (the hardware, the software, communication system …etc.)  Ensure non-repudiation  This requires the implementation of policy, awareness training, education and technology
  • 3. Another Definition  Information security can be thought of as the protection of the information system and its resources against accidental or intentional disclosure of confidential data, unlawful modification of data or programs, the destruction of data, software or hardware, and ensuring non-repudiation.
  • 4. Other Concerns  Information security also includes the prevention of use of one’s computer facilities for criminal activities including computer related fraud and blackmail.  Information security also involves the elimination of weaknesses or vulnerabilities that might be exploited to cause loss or harm.
  • 5. The Main Pillars of Security  The CIA Triangle:  Confidentiality ensures that computer-related assets are accessed only by authorized parties. That is, only those who should have access to something will actually get that access. By "access," we mean not only reading but also viewing, printing, or simply knowing that a particular asset exists. Confidentiality is sometimes called secrecy or privacy.  Integrity means that assets can be modified only by authorized parties or only in authorized ways. In this context, modification includes writing, changing, changing status, deleting, and creating.  Availability means that assets are accessible to authorized parties at appropriate times. In other words, if some person or system has legitimate access to a particular set of objects, that access should not be prevented. For this reason, availability is sometimes known by its opposite, denial of service.
  • 7. Some People Add Other Properties  Accuracy means information is free from error and has the value the end user expects  Authenticity is quality or state of being genuine or original, rather than reproduced or fabricated; information is authentic when it is what was originally created, placed, stored, or transferred  Utility of information is quality or state of having value for some end purpose; information must be in a format meaningful to end user  Non-Repudiation: means that the sender or generator of information cannot deny that he did send or generate the information
  • 8. Vulnerabilities, Threats, Attacks and Controls  An interesting definition of security is: “Prevent threats from exploiting vulnerabilities to perform attacks”  So, what do these terms mean?
  • 9. Vulnerability  A vulnerability is a weakness in the security system, for example, in procedures, design, or implementation, that might be exploited to cause loss or harm.  For instance, a particular system may be vulnerable to unauthorized data manipulation because the system does not verify a user's identity before allowing data access.
  • 10. Threat A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
  • 11. Control  A control is an action, device, procedure, or technique that removes or reduces a vulnerability.  A threat is blocked by control of a vulnerability.
  • 12. Types of Threats  To devise controls, we must know as much about threats as possible. We can view any threat as being one of four kinds:  interception,  interruption,  modification,  fabrication
  • 13. Interception  Information disclosure/information leakage  An unauthorized party gains access to an asset.  This is an attack on confidentiality.  The unauthorized party could be a person, a program, or a computer.  Examples include:  wiretapping to capture data in a network  the illicit copying of files or programs
  • 15. Interruption  An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on the availability.  Examples include destruction of a piece of hardware, such as a hard disk, the cutting of a communication link, or the disabling of the file management system.  DOS - Denial of Service Attacks have become very well known.
  • 17. Modification  Modification is integrity violation.  An unauthorized party not only gains access to but tampers with an asset.  This is an attack on the integrity.  Examples include changing values in a data file, altering a program so that it performs differently, and modifying the content of a message being transmitted in a network.
  • 19. Fabrication  An unauthorized party inserts counterfeit objects into the system. This is an attack on the authenticity.  Examples include the insertion of spurious messages in a network or the addition of records to a file.
  • 22. Actions to Protect Against a Harm  Harm occurs when a threat is realized against a vulnerability. To protect against harm, then, we can neutralize the threat, close the vulnerability, or both. The possibility for harm to occur is called risk. We can deal with harm in several ways. We can seek to  prevent it, by blocking the attack or closing the vulnerability  deter it, by making the attack harder but not impossible  deflect it, by making another target more attractive (or this one less so)  detect it, either as it happens or some time after the fact  recover from its effects
  • 23. Attacks  A human who exploits a vulnerability perpetrates an attack on the system.  An attack can also be launched by another system, as when one system sends an overwhelming set of messages to another, virtually shutting down the second system's ability to function.
  • 24. Attacks: Another Definition  An attack is a deliberate act that exploits vulnerability  Accomplished by threat agent to damage or steal organization’s information or physical asset  Exploit is a technique to compromise a system  Vulnerability is an identified weakness of a controlled system whose controls are not present or are no longer effective  Attack is the use of an exploit to achieve the compromise of a controlled system Sli de 24 Slide 24
  • 25. Eavesdropping Common packet sniffers: TCPdump, Wireshark Solution - Encrypt Data J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 26. Cryptanalysis J. Wang. Computer Network Security Theory and Practice. Springer, 2009 Cryptanalysis Find useful information from ciphertext data e.g. analyze statistical structure Defense method Use longer keys and stronger encryption algorithm
  • 27. Password Pilfering Password Pilfering Password protection is often the first defense line probably the only defense available in the system Methods to pilfer user password: Guessing Social engineering Dictionary attacks Password sniffing J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 28. Guessing Easiest, particularly on short or default passwords 10 most commonly-used passwords (ref. PC Magazine):  password  123456  qwerty (which are keys below 123456 on standard keyboard  abc123  letmein  monkey  myspace1  Password1  Blink182  The user’s own first name J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 29. • Social Engineering Methods of using social skills to pilfer secret information  Physical Impersonation The attacker pretends to be another person to delude the victim (See example on page 6 from textbook)  Phishing The most common form of mass social engineering attacks in recent years Disguised email messages or masquerade web sites  See the next slide for a real phishing example verbatim (note the typos in the phishing email), where the link in the email is a trap J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 30. Date: Fri, 5 Oct 2007 16:11:46 -0700 From: US Bank SCD-Verify@usbank.com Subject: US Bank – Internet Online Access is Locked – October 5, 2007 at 12:23:05 PM Dear US Bank Customer, We’re sorry, but you reached the maximum number of attempts allowed to login into your US Bank account. For your protection, we have locked your account. Consequently, we placed a temporary restriction on your account. We did this to protect your account from any fraudulent activity. Please click below and complete the steps to Remove Limitations. This allows us to confirm your identity and unlock your US Bank online account http://www4-usbank.com/ If we do no receive the appropriate account verification within 48 hours, then we will assume this US Bank account is fraudulent and will be suspented. US Bank, Member FDIC. @2007 US Bank Corporation. All Rights Reserved. J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 31. In general, any phishing email would contain a link to a bogus Web site, called a phishing site Other forms  Collect recycled papers from recycling bins  Web browser pop up a window asking for user login Defense Method – Anti-phishing extensions of web browsers are emerging technology for detecting and blocking phishing sites J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 32. • Dictionary Attacks Only encrypted passwords should be stored in a computer system in UNIX/Linux: passwords are stored in a file named shadows under directory /etc in Windows XP: passwords are stored in a file named SAM, which is stored in the system’s registry J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 33. A typical dictionary attack proceeds as follows:  Obtain information of user names and the corresponding encrypted passwords  Run the encryption routine used by the underlying system on all dictionary words, names, and dates  Compare each output obtained from step 2 with the encrypted passwords obtained from step 1. If a match presents, a user password is found Constructing a Rainbow table helps to reduce the table size and make the computation manageable J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 34. Rainbow Table Password Hash value w11 w21 … wk1 h(w1 n1) h(w2 n2) … h(wk nk) J. Wang. Computer Network Security Theory and Practice. Springer, 2009  r is a reduction function  h is a cryptographic hash function  w11 is a given password. Apply h and r alternatively to obtain a chain of passwords that are different pairwise: where, w1i = r(h(w1,i-1 ), i = 2,3,…,n1 and store (w11, h(w1n1))  Select wj1 not occurred in previous chains Repeat this procedure k times generating k rows in the rainbow table
  • 35. Let f: A→B and g: B→A be two functions. Let y∈ B and i ≥ 0. Define: Let Q0 be an encrypted value of a password w. That is, Q0 = h(w). If for some i ≥ 0 and some j with 1 ≤ j ≤ k and i ≤ j, then w is possible to appear in the jth chain of wj1,…wj,nj . J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 36.  Algorithm to find w in a rainbow table: 1. Set Q1 ← Q0 and t ← 0. Let n = max{n1,…,nk} 2. Check if there is a 1 ≤ j ≤ k such that Q1 = h(wj,nj) and t ≤ n. If yes, goto step 3; otherwise, goto step 4 3. Apply r and h alternatively on wj1 for 0 ≤ i ≤ j times until wj,ni = (r ○ h)i(wj1) is generated such that h(wj,ni ) = Q0 . If such a wj,ni is found, return w = wj,ni ; otherwise, goto step 4 4. Set Q1 ← h(r(Q1)) and t ← t + 1. If t ≤ n then goto step 2. Otherwise, return “password not found.” (the rainbow table doesn’t contain the password whose hash value equals Q0 ) J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 37. • Password Sniffing Password sniffers are software programs, used to capture remote login information such as user names and user passwords Defense Method – encrypt all message, include login information, using, e.g., SSH and HTTPS Cain & Abel, a password recovery tool, can capture and crack encrypted password for the Microsoft Operating System J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 38. Password Protection Rules to help protect passwords from pilfering: 1. Use long passwords, with a combination of letters, capital letters, digits, and other characters such as $,#,@. Do not use dictionary words, common names and dates. 2. Do not reveal your passwords to anyone you do not know. Do not submit to anyone who acts as if he has authority. If you have to give out your password, do so face to face. 3. Change passwords periodically and do not reuse old passwords. 4. Do not use the same password for different accounts. 5. Do not use remote login software that does not encrypt user passwords and other important personal information. 6. Shred all discarded papers using a good paper shredder. 7. Avoid entering any information in any popup window, and avoid clicking on links in suspicious emails. J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 39. • Other User-Authentication Methods  Use biometrics of unique biological features – connect biometric devices to a computer, such as fingerprint readers and retina scanners  Use authenticating items – electronic passes authenticated by the issuer. Authentication using user passwords is by far the easiest method J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 40. Identity Spoofing Identity spoofing attacks allow attackers to impersonate a victim without using the victim’s passwords  Man-in-the-middle attacks.  Message replays  Network spoofing attacks  Software exploitation attacks J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 41. • Man-in-the-middle Attacks Compromise a network device (or installs one of his own) between two or users. Using this device to intercept, modify, or fabricate data transmitted between users. Defense measures – encrypting and authenticating IP packets J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 42. • Message Replays The attacker first intercepts a legitimate message, keeps it intact, and then retransmits it at a later time to the original receiver For example, an attacker may intercept an authentication pass of a legitimate user, and use it to impersonate this user to get the services from the system Defense Mechanisms – Attach a random number to the message. This number is referred to as nonce Attach a time stamp to the message The best method is to use a nonce and a time stamp together J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 43.  IP spoofing is one of the major network spoofing techniques  SYN flooding  The attacker fills the target computer’s TCP buffer with a large number of crafted SYN packets  Purpose: Make the target computer unable to establish connection (i.e., to mute the computer)  ARP spoofing, which is also known as ARP poisoning J. Wang. Computer Network Security Theory and Practice. Springer, 2009 Network Spoofing
  • 44. • SYN flooding Attacker fills the target computer’s TCP buffer with a large volume of crafted SYN packets, making the target computer unable to establish connections with other computers 1. Attacker sends to the target computer a large number of crafted SYN packets 2. The victim’s computer is obliged to send an ACK packet to the crafted source IP address contained in the SYN packet 3. Because the crafted source IP address is unreachable, the victim’s computer will never receive the ACK packet it is waiting for, making the crafted SYN packet remain in the TCP buffer 4. The TCP buffer is completely occupied by the crafted SYN packets J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 45. • TCP Hijacking V is a company computer Alice, an employee of the company, is going to remote logon to V Her TCP connection with V may be hijacked as follows: 1. Alice sends a SYN packet to V for remote login 2. The attacker hijacts this packet, and uses SYN flooding to mute V so that V can’t complete the three-way handshake 3. The attacker predicts the correct TCP sequence number for the ACK supposed to be sent from V to Alice. The attacker then crafts an ACK packet with the sequence number and V’s IP address and sends it to Alice 4. Alice verifies the ACK packet and sends an ACK packet to the attacker to complete this handshake 5. The TCP connection is now established between Alice and the attacker, instead of between Alice and V J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 46. • ARP Spoofing The attacker changes the legitimate MAC address of a networked computer to a different MAC address chosen by the attacker Defense method – Check MAC address and domain names J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 47. Buffer-Overflow Exploitation  Buffer-Overflow Exploitation Buffer overflow, a.k.a. buffer overrun, is a common software flaw. Buffer overflow occurs if the process writes more data into a buffer area than it is supposed to hold J. Wang. Computer Network Security Theory and Practice. Springer, 2009 It is possible to exploit buffer overflows to redirect the victim’s program to execute attackers’ own code located in a different location. Such attacks often exploit function calls in standard memory layout, where the buffer is placed in a heap and the return address of the function call is placed in a stack
  • 48.  General steps of buffer-overflow attack: 1. Find a program that is prone to buffer overflows (e.g. programs using functions that do not check bounds are good candidates) 2. Figure out the address of the attacker’s code 3. Determine the number of bytes long enough to overwrite the return address 4. Overflow the buffer that rewrites the original return address of the function call with the address of the attacker’s code Defense method – Always add statements to check bounds when dealing with buffers in a program J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 49. Repudiation In some situations the owner of the data may want to deny ownership of the data to evade legal consequences  He may argue that he has never sent or received the data in question Defense method – Use stronger encryption and authentication algorithms J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 50. Intrusion  An unauthorized user gains access to someone else’s computer systems. Configuration loopholes, protocol flaws, and software side effects may all be exploited by intruders  Intrusion detection is a technology for detecting intrusion incidents. Closing TCP and UDP ports that may be exploited by intruders can also help reduce intrusions  IP scans and Port scans are common hacking tools. However, it can also help users to identify in their own systems which ports are open and which ports may be vulnerable. J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 51. Traffic Analysis The purpose is to determine who is talking to whom by analyzing IP packets. Even if the payload of the IP packet is encrypted, the attacker may still obtain useful information from analyzing IP headers Defense method – Encrypt IP headers. But an IP packet with an encrypted IP header cannot be routed to destination. Thus, network gateways are needed  Network gateway also protects internal network topology J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 52. J. Wang. Computer Network Security Theory and Practice. Springer, 2009 (1) Sender forwards an IP packet to gateway A. (2) gateway A encrypts sender’s IP packet and routes it to the next router in the Internet. (3) The IP packet from Gateway A is delivered to gateway B. (4) Gateway B removes its header, decrypts the encrypted IP packet of the sender, and forwards it to the receiver.
  • 53. Denial of Service Attacks To block legitimate users from getting services they can normally get from servers DoS – launched from a single computer DDoS – launched from a group of computers J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 54.  DoS SYN flooding is a typical and effective technique used by DoS attacks. The smurf attack is another typical type of DoS attacks J. Wang. Computer Network Security Theory and Practice. Springer, 2009 Attacker sends an excessive number of crafted ping requests to a large number of computers within a short period of time, where the source IP address in the crafted ping request is replaced with the victim’s IP address. Therefore, each computer that receives the crafted ping request will respond to the victim’s computer with a pong message.
  • 55.  DDoS A typical DDoS attack proceeds as follows: 1. Compromise as many networked computers as possible 2. Install special software in the compromised computers to carry out a DoS attack at a certain time later; these computers are called zombies 3. Issue an attack command to every zombie computer to launch a DoS attack on the same target at the same time J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 56. Spam Mail Spam mails are uninvited email messages, which may be commercial messages or phishing messages While not intended to bring the user’s computer out of service, spam mails do consume computing resources Spamming also occurs in Web search engines, Instant Messaging, blogs, mobile phone messaging, and other network applications Defense method – spam fillers are software solutions to detect and block spam mails from reaching the user’s mailbox J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 57. Figure 1-12 The Nigerian National Petroleum Company Sli de 57 Slide 57
  • 58. Malicious Software Software intended to harm computers is malicious software. Malicious software is also referred to as malware Virus Worms Trojan horses Logic bombs Backdoors Spyware J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 59.  Viruses and Worms • A computer virus is a piece of code that can reproduce itself • It is not a standalone program, and so it must attach itself to a host program or file • A host program or file that contains a virus is called an infected host • A computer worm is also a piece of code that can reproduce itself. Unlike a virus, a worm is a stand alone program Defense method –  Do not download software from untrusted Web sites or other sources  Do not open any executable file created by someone you do not know  Make sure software patches are installed and up to date J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 60.  Trojan Horse Trojan horses are software programs that appear to do one thing, but secretly also do other things Trojan horses often disguise themselves as desirable and harmless software applications to lure people to download them Defense method – The same measures of combating viruses and worms can also be used to combat Trojan horses. Virus scans can also detect, quarantine, and delete Trojan horses J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 61.  Logic Bombs Logic bombs are subroutines or instructions embedded in a program. Their execution are triggered by conditional statements Defense method –  Employers should take good care of their employees, so that none would be tempted to place a logic bomb  Project managers should hire an outside company or form a special team of reviewers from a different group of people other than the developer to review the source code  Relevant laws should be established so that employees who planted logic bombs will face criminal charges J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 62.  Backdoors Backdoors are secret entrance points to a program They may be inserted by software developers to provide a short cut to enter a password- protected program when attempting to modify or debug code Defense method – Check source code by an independent team J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 63. • Spyware Spyware is a type of software that installs itself on the user’s computer Spyware is often used to monitor what users do and harass them with popup commercial messages  Browser Hijacking – a technique that changes the settings of the user’s browsers  Zombieware – software that takes over the user’s computer and turns it into a zombie for launching DDoS attacks or into a relay which carries out harmful activities such as sending spam email or spreading viruses. J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 64. Spyward can also do a list of other things, including  Monitoring – monitor and report to a web server or to the attacker’s machine a user’s surfing habits and patterns  Password sniffing – sniff user passwords by logging users’ keystrokes using a keystroke logger  Adware – software that automatically displays advertising materials on the user’s computer screen Defense method – use anti-spyware software to detect and block spyware J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 65. Hackers  Hackers Computer hackers are people with special knowledge of computer systems. They are interested in subtle details of software, algorithms, and system configurations Black-Hat Hackers – hack computing systems for their own benefit White-Hat Hackers – hack computing systems for the purpose of searching for security loopholes and developing solutions Grey-Hat Hackers – wear a white hat most of the time, but may also wear a black hat once in a while When discovering security vulnerabilities in a software product, white-hat hackers and grey-hat hackers would often work directly with the vendors of products to help fix the problems J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 66. Script Kiddies Script kiddies are people who use scripts and programs developed by black-hat hackers to attack other people’s computers Even though they do not know how to write hacking tools or understand how an existing hacking tool works, script kiddies could inflict a lot of damage J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 67. Cyber Spies Collecting intelligence through intercepted network communications is the job of cyber spies Countries have intelligence agencies Military organizations have intelligence units They intercept network communications and decipher encrypted messages J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 68. Vicious Employees, Cyber Terrorists and Hypothetical Attackers  Vicious Employees Vicious employees are people who intentionally breach security to harm their employers  Cyber Terrorists Cyber terrorists are terrorists who use computer and network technologies to carry out their attacks and produce public fear  Hypothetical Attackers  black-hat hackers  script kiddies  greedy cyber spies who are willing to betray their countries or organizations for monetary benefits  vicious employees J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 69. Basic Security Model The basic security model consists of four components: cryptosystems, firewalls, anti- malicious-software systems (AMS software), and intrusion detection system (IDS) J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 70.  Network model of cryptosystem J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 71. Example Security Resources  CERT www.cert.org  SANS Institute www.scans.org  Microsoft Security www.microsoft.com/security/default.ms px  NTBugtraq www.ntbugtraq.com J. Wang. Computer Network Security Theory and Practice. Springer, 2009
  • 72. Assignment 1  Write a short report that explains how buffer overflow attacks are performed. Use examples to illustrate your answer.  Explain how Rainbow Tables are constructed and how do they work