SlideShare a Scribd company logo
Internet & Web Security
Prepared by:
Jean Michael Castor
Introduction
• As of 1996, the Internet connected an
estimated 13 million computers in 195
countries on every continent, even
Antarctica . The Internet is not a single
network, but a worldwide collection of loosely
connected networks that are accessible by
individual computer hosts in a variety of ways,
including gateways, routers, dial-up
connections, and Internet service providers.
Introduction
• The Internet is easily accessible to anyone
with a computer and a network connection.
Individuals and organizations worldwide can
reach any point on the network without
regard to national or geographic boundaries
or time of day.
Introduction
• However, along with the convenience and
easy access to information come new risks.
Among them are the risks that valuable
information will be lost, stolen, corrupted, or
misused and that the computer systems will
be corrupted. If information is recorded
electronically and is available on networked
computers, it is more vulnerable than if the
same information is printed on paper and
locked in a file cabinet.
Introduction
• Intruders do not need to enter an office or
home, and may not even be in the same
country. They can steal or tamper with
information without touching a piece of paper
or a photocopier. They can create new
electronic files, run their own programs, and
hide evidence of their unauthorized activity.
Basic Security Concepts
• Three basic security concepts important to
information on the Internet are
confidentiality, integrity, and availability.
Concepts relating to the people who use that
information are authentication, authorization,
and nonrepudiation.
Basic Security Concepts
• Confidentiality - restricting access to
information to authorized users.
• Integrity - ensuring that stored data and data
in transit are not modified unintentionally or
maliciously.
• Availability - ensuring that network services
are not interrupted unintentionally or
maliciously.
Internet Security Today
• What are the main security-related problems on
the Internet Today?
– Hijacked web servers
– Denial-of-Service Attacks
– Unsolicited Commercial E-Mail
– Operator Error, Natural Disasters
– Microsoft...
– Probe
– Scan
– Packet Sniffer
– Malicious Code
Internet Security Today
• What are not the major security-related
problems?
– Eavesdropped electronic mail.
• (Misdirected email is a problem.)
• (Email swiped from backup tapes is a problem.)
– Sniffed credit card numbers.
• (Credit card numbers stolen from databases is a
problem.)
– Hostile Java & ActiveX applets.
Hijacked Web Servers
Hijacked Web Servers
• FBI
– August 17, 1996 - Attacks on the Communications
Decency Act.
• CIA
– September 18, 1996 - “Central Stupidity Agency”
• NetGuide Live
– “CMP Sucks.”
Hijacked Web Servers
• Attacker gains access and changes contents of
web server.
• Usually stunts.
• Can be very bad:
– Attacker can plant hostile applets.
– Attacker can plant data sniffers
– Attacker can use compromised machine to take
over internal system.
Hijacked Web Servers
• Usually outsiders.
• (Could be insiders masquerading as outsiders.)
• Nearly impossible to trace.
How do they do it?
• Administrative passwords captured by a
password sniffer.
• Utilize known vulnerability:
– sendmail bug.
– Buffer overflow.
• Use web server CGI script to steal /etc/passwd
file, then crack passwords.
• Mount the web server’s filesystem.
How do you defend against it?
• Patch known bugs.
• Don’t run unnecessary services on the web
server.
How do you defend?
• Practice good host security.
• Monitor system for unauthorized changes.
– Tripwire
• Monitor system for signs of penetration
– Intrusion detection systems
How do you defend?
• Make frequent backups.
• Have a hot spare ready.
• Monitor your system frequently.
Denial-of-Service
Attacks
Denial-of-Service
• Publicity is almost as good as changing
somebody’s web server.
– Attack on PANIX
– Attack on CyberPromotions
• Costs real money
– Lost Sales
– Damage to reputation
Kinds of Denial-of-Service Attacks
• Direct attack: attack the machine itself.
• Indirect attack: attack something that points
to the machine.
• Reputation attack: attack has nothing to do
with the machine, but references it in some
way.
Direct Denial-Of-Service Attack
• Send a lot of requests
(HTTP, finger, SMTP)
– Easy to trace.
– Relatively easy to defend against with TCP/IP
blocking at router.
Direct Denial-Of-Service Attack 2
• SYN Flooding
– Subverts the TCP/IP 3-way handshake
• SYN / ACK / ACK
– Hard to trace
• Each SYN has a different return address.
– Defenses now well understood
• Ignore SYNs from impossible addresses.
• Large buffer pools (10 → 1024)
• Random drop, Oldest drop.
Indirect Denial-Of-Service Attack
• Attack Routing
• Attack routers (hard)
• Inject bogus routes on BGP4 peering sessions
(easy)
– Accidents have been widely reported.
– Expect to see an actual BGP4 attack sometime this
year.
Reputation-based Denial-Of-Service Attack
• Spoofed e-mail
To: everybody@AOL.COM
From: astrology@mail.vineyard.net
Subject: Call Now!
Hello. My name is Jean Dixon …
• We got 3.9MB of angry responses.
Unsolicited
Commercial E-Mail
Unsolicited Commercial E-Mail
• Pits freedom-of-speech against right of
privacy.
• Consumes vast amounts of management time.
• Drain on system resources.
Who are the bulk-mailers?
• Advertising for Internet neophytes.
• Advertising for sexually-oriented services.
• Advertising get-rich-quick schemes.
• Advertising bulk-mail service.
How do they send out messages?
• Send directly from their site.
• Send through an innocent third party.
• Coming soon:
– Sent with a computer virus or ActiveX applet
How did they get my e-mail addresses?
• Usenet & Mailing list archives.
• Collected from online address book.
– AOL registry.
– University directory.
• Guessed
– Sequential CompuServe addresses.
• Break into machine & steal usernames.
Operator Error &
Natural Disasters
Operator Error & Natural Disasters
• Still a major source of data loss.
• Hard to get management to take seriously.
– Not sexy.
– Preparation is expensive.
– If nothing happens, money seems misspent.
Operator Error
• Accidentally delete a file.
• Accidentally install a bad service.
• Accidentally break a CGI script.
• Psychotic break.
Natural Disaster
• Fire
• Flood
• Earthquake
Solutions
• Frequent Backups
– Backup to high-speed tape.
– Real-time backup to spare machines.
– Make sure some backups are off-site.
• Recovery plans.
• Recovery center.
• Test your backups & plans!
Microsoft
Microsoft
• Danger of homogeneous environment.
• No demonstrated commitment to computer
security.
– Windows 95 is not secure.
– Word Macro Viruses.
– ActiveX
– SMB
• Windows NT …?
Probe
• A probe is characterized by unusual attempts
to gain access to a system or to discover
information about the system. One example is
an attempt to log in to an unused account.
Probing is the electronic equivalent of testing
doorknobs to find an unlocked door for easy
entry. Probes are sometimes followed by a
more serious security event, but they are
often the result of curiosity or confusion.
Scan
• A scan is simply a large number of probes
done using an automated tool. Scans can
sometimes be the result of a misconfiguration
or other error, but they are often a prelude to
a more directed attack on systems that the
intruder has found to be vulnerable.
Packet Sniffer
• A packet sniffer is a program that captures
data from information packets as they travel
over the network. That data may include user
names, passwords, and proprietary
information that travels over the network in
clear text. With perhaps hundreds or
thousands of passwords captured by the
sniffer, intruders can launch widespread
attacks on systems.
Malicious Code
• Malicious code is a general term for programs
that, when executed, would cause undesired
results on a system. Users of the system usually
are not aware of the program until they discover
the damage. Malicious code includes Trojan
horses, viruses, and worms. Trojan horses and
viruses are usually hidden in legitimate programs
or files that attackers have altered to do more
than what is expected. Worms are self-replicating
programs that spread with no human
intervention after they are started.
Malicious Code
• Viruses are also self-replicating programs, but
usually require some action on the part of the
user to spread inadvertently to other
programs or systems. These sorts of programs
can lead to serious data loss, downtime,
denial of service, and other types of security
incidents.

More Related Content

What's hot

Network security basics
Network security basicsNetwork security basics
Network security basics
Skillspire LLC
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
Prakash Raval
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Hacking
Hacking Hacking
Hacking
thajmohammed
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
SultanaShaikh7
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
codefortomorrow
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
Thangaraj Murugananthan
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 

What's hot (20)

Network security basics
Network security basicsNetwork security basics
Network security basics
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Hacking
Hacking Hacking
Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
System failure
System  failureSystem  failure
System failure
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 

Viewers also liked

Web application security
Web application securityWeb application security
Web application securityJin Castor
 
Web Based Security
Web Based SecurityWeb Based Security
Web Based Security
John Wiley
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
msaksida
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 

Viewers also liked (9)

Cos 432 web_security
Cos 432 web_securityCos 432 web_security
Cos 432 web_security
 
Web application security
Web application securityWeb application security
Web application security
 
Web Based Security
Web Based SecurityWeb Based Security
Web Based Security
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Web security

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Complete notes security
Complete notes securityComplete notes security
Complete notes securityKitkat Emoo
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
MotherGuardians
 
Computer Security
Computer SecurityComputer Security
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Orientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptxOrientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptx
230405
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
ibrahimzubairu2003
 

Similar to Web security (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
Hackers
HackersHackers
Hackers
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Orientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptxOrientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptx
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 

More from Jin Castor

Information security
 Information security Information security
Information security
Jin Castor
 
Introduction to E-commerce
Introduction to E-commerceIntroduction to E-commerce
Introduction to E-commerce
Jin Castor
 
Introduction to Infographics Designing
Introduction to Infographics DesigningIntroduction to Infographics Designing
Introduction to Infographics Designing
Jin Castor
 
Creative designing using Adobe Products
Creative designing using Adobe ProductsCreative designing using Adobe Products
Creative designing using Adobe Products
Jin Castor
 
Introduction to Adobe Illustrator
Introduction to Adobe IllustratorIntroduction to Adobe Illustrator
Introduction to Adobe Illustrator
Jin Castor
 
SEO Advanced and scalable link building
SEO  Advanced and scalable link building SEO  Advanced and scalable link building
SEO Advanced and scalable link building
Jin Castor
 
Introduction to Web Designing
Introduction to Web DesigningIntroduction to Web Designing
Introduction to Web Designing
Jin Castor
 
Introduction to search engine optimization
Introduction to search engine optimizationIntroduction to search engine optimization
Introduction to search engine optimizationJin Castor
 
Web services protocols
Web services protocolsWeb services protocols
Web services protocolsJin Castor
 
Introduction to xampp
Introduction to xamppIntroduction to xampp
Introduction to xamppJin Castor
 
Drupal introduction
Drupal introductionDrupal introduction
Drupal introductionJin Castor
 
Control statements in Java
Control statements  in JavaControl statements  in Java
Control statements in JavaJin Castor
 
Switch statements in Java
Switch statements  in JavaSwitch statements  in Java
Switch statements in JavaJin Castor
 
Looping statements in Java
Looping statements in JavaLooping statements in Java
Looping statements in JavaJin Castor
 

More from Jin Castor (16)

Information security
 Information security Information security
Information security
 
Introduction to E-commerce
Introduction to E-commerceIntroduction to E-commerce
Introduction to E-commerce
 
Introduction to Infographics Designing
Introduction to Infographics DesigningIntroduction to Infographics Designing
Introduction to Infographics Designing
 
Creative designing using Adobe Products
Creative designing using Adobe ProductsCreative designing using Adobe Products
Creative designing using Adobe Products
 
Introduction to Adobe Illustrator
Introduction to Adobe IllustratorIntroduction to Adobe Illustrator
Introduction to Adobe Illustrator
 
SEO Advanced and scalable link building
SEO  Advanced and scalable link building SEO  Advanced and scalable link building
SEO Advanced and scalable link building
 
Introduction to Web Designing
Introduction to Web DesigningIntroduction to Web Designing
Introduction to Web Designing
 
Introduction to search engine optimization
Introduction to search engine optimizationIntroduction to search engine optimization
Introduction to search engine optimization
 
Web services protocols
Web services protocolsWeb services protocols
Web services protocols
 
Introduction to xampp
Introduction to xamppIntroduction to xampp
Introduction to xampp
 
Drupal introduction
Drupal introductionDrupal introduction
Drupal introduction
 
Control statements in Java
Control statements  in JavaControl statements  in Java
Control statements in Java
 
Switch statements in Java
Switch statements  in JavaSwitch statements  in Java
Switch statements in Java
 
Looping statements in Java
Looping statements in JavaLooping statements in Java
Looping statements in Java
 
Java input
Java inputJava input
Java input
 
Java arrays
Java arraysJava arrays
Java arrays
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Web security

  • 1. Internet & Web Security Prepared by: Jean Michael Castor
  • 2. Introduction • As of 1996, the Internet connected an estimated 13 million computers in 195 countries on every continent, even Antarctica . The Internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts in a variety of ways, including gateways, routers, dial-up connections, and Internet service providers.
  • 3. Introduction • The Internet is easily accessible to anyone with a computer and a network connection. Individuals and organizations worldwide can reach any point on the network without regard to national or geographic boundaries or time of day.
  • 4. Introduction • However, along with the convenience and easy access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet.
  • 5. Introduction • Intruders do not need to enter an office or home, and may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can create new electronic files, run their own programs, and hide evidence of their unauthorized activity.
  • 6. Basic Security Concepts • Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.
  • 7. Basic Security Concepts • Confidentiality - restricting access to information to authorized users. • Integrity - ensuring that stored data and data in transit are not modified unintentionally or maliciously. • Availability - ensuring that network services are not interrupted unintentionally or maliciously.
  • 8. Internet Security Today • What are the main security-related problems on the Internet Today? – Hijacked web servers – Denial-of-Service Attacks – Unsolicited Commercial E-Mail – Operator Error, Natural Disasters – Microsoft... – Probe – Scan – Packet Sniffer – Malicious Code
  • 9. Internet Security Today • What are not the major security-related problems? – Eavesdropped electronic mail. • (Misdirected email is a problem.) • (Email swiped from backup tapes is a problem.) – Sniffed credit card numbers. • (Credit card numbers stolen from databases is a problem.) – Hostile Java & ActiveX applets.
  • 11. Hijacked Web Servers • FBI – August 17, 1996 - Attacks on the Communications Decency Act. • CIA – September 18, 1996 - “Central Stupidity Agency” • NetGuide Live – “CMP Sucks.”
  • 12. Hijacked Web Servers • Attacker gains access and changes contents of web server. • Usually stunts. • Can be very bad: – Attacker can plant hostile applets. – Attacker can plant data sniffers – Attacker can use compromised machine to take over internal system.
  • 13. Hijacked Web Servers • Usually outsiders. • (Could be insiders masquerading as outsiders.) • Nearly impossible to trace.
  • 14. How do they do it? • Administrative passwords captured by a password sniffer. • Utilize known vulnerability: – sendmail bug. – Buffer overflow. • Use web server CGI script to steal /etc/passwd file, then crack passwords. • Mount the web server’s filesystem.
  • 15. How do you defend against it? • Patch known bugs. • Don’t run unnecessary services on the web server.
  • 16. How do you defend? • Practice good host security. • Monitor system for unauthorized changes. – Tripwire • Monitor system for signs of penetration – Intrusion detection systems
  • 17. How do you defend? • Make frequent backups. • Have a hot spare ready. • Monitor your system frequently.
  • 19. Denial-of-Service • Publicity is almost as good as changing somebody’s web server. – Attack on PANIX – Attack on CyberPromotions • Costs real money – Lost Sales – Damage to reputation
  • 20. Kinds of Denial-of-Service Attacks • Direct attack: attack the machine itself. • Indirect attack: attack something that points to the machine. • Reputation attack: attack has nothing to do with the machine, but references it in some way.
  • 21. Direct Denial-Of-Service Attack • Send a lot of requests (HTTP, finger, SMTP) – Easy to trace. – Relatively easy to defend against with TCP/IP blocking at router.
  • 22. Direct Denial-Of-Service Attack 2 • SYN Flooding – Subverts the TCP/IP 3-way handshake • SYN / ACK / ACK – Hard to trace • Each SYN has a different return address. – Defenses now well understood • Ignore SYNs from impossible addresses. • Large buffer pools (10 → 1024) • Random drop, Oldest drop.
  • 23. Indirect Denial-Of-Service Attack • Attack Routing • Attack routers (hard) • Inject bogus routes on BGP4 peering sessions (easy) – Accidents have been widely reported. – Expect to see an actual BGP4 attack sometime this year.
  • 24. Reputation-based Denial-Of-Service Attack • Spoofed e-mail To: everybody@AOL.COM From: astrology@mail.vineyard.net Subject: Call Now! Hello. My name is Jean Dixon … • We got 3.9MB of angry responses.
  • 26. Unsolicited Commercial E-Mail • Pits freedom-of-speech against right of privacy. • Consumes vast amounts of management time. • Drain on system resources.
  • 27. Who are the bulk-mailers? • Advertising for Internet neophytes. • Advertising for sexually-oriented services. • Advertising get-rich-quick schemes. • Advertising bulk-mail service.
  • 28. How do they send out messages? • Send directly from their site. • Send through an innocent third party. • Coming soon: – Sent with a computer virus or ActiveX applet
  • 29. How did they get my e-mail addresses? • Usenet & Mailing list archives. • Collected from online address book. – AOL registry. – University directory. • Guessed – Sequential CompuServe addresses. • Break into machine & steal usernames.
  • 31. Operator Error & Natural Disasters • Still a major source of data loss. • Hard to get management to take seriously. – Not sexy. – Preparation is expensive. – If nothing happens, money seems misspent.
  • 32. Operator Error • Accidentally delete a file. • Accidentally install a bad service. • Accidentally break a CGI script. • Psychotic break.
  • 33. Natural Disaster • Fire • Flood • Earthquake
  • 34. Solutions • Frequent Backups – Backup to high-speed tape. – Real-time backup to spare machines. – Make sure some backups are off-site. • Recovery plans. • Recovery center. • Test your backups & plans!
  • 36. Microsoft • Danger of homogeneous environment. • No demonstrated commitment to computer security. – Windows 95 is not secure. – Word Macro Viruses. – ActiveX – SMB • Windows NT …?
  • 37. Probe • A probe is characterized by unusual attempts to gain access to a system or to discover information about the system. One example is an attempt to log in to an unused account. Probing is the electronic equivalent of testing doorknobs to find an unlocked door for easy entry. Probes are sometimes followed by a more serious security event, but they are often the result of curiosity or confusion.
  • 38. Scan • A scan is simply a large number of probes done using an automated tool. Scans can sometimes be the result of a misconfiguration or other error, but they are often a prelude to a more directed attack on systems that the intruder has found to be vulnerable.
  • 39. Packet Sniffer • A packet sniffer is a program that captures data from information packets as they travel over the network. That data may include user names, passwords, and proprietary information that travels over the network in clear text. With perhaps hundreds or thousands of passwords captured by the sniffer, intruders can launch widespread attacks on systems.
  • 40. Malicious Code • Malicious code is a general term for programs that, when executed, would cause undesired results on a system. Users of the system usually are not aware of the program until they discover the damage. Malicious code includes Trojan horses, viruses, and worms. Trojan horses and viruses are usually hidden in legitimate programs or files that attackers have altered to do more than what is expected. Worms are self-replicating programs that spread with no human intervention after they are started.
  • 41. Malicious Code • Viruses are also self-replicating programs, but usually require some action on the part of the user to spread inadvertently to other programs or systems. These sorts of programs can lead to serious data loss, downtime, denial of service, and other types of security incidents.