SlideShare a Scribd company logo
1 of 40
Overview
 What is security?
 Why do we need security?
 Who is vulnerable?
 Common security attacks and
countermeasures
 Firewalls & Intrusion Detection Systems
 Denial of Service Attacks
 TCP Attacks
 Packet Sniffing
 Social Problems
What is “Security”
 Dictionary.com says:
 1. Freedom from risk or danger; safety.
 2. Freedom from doubt, anxiety, or fear;
confidence.
 3. Something that gives or assures safety, as:
 1. A group or department of private guards: Call
building security if a visitor acts suspicious.
 2. Measures adopted by a government to prevent
espionage, sabotage, or attack.
 3. Measures adopted, as by a business or
homeowner, to prevent a crime such as burglary or
assault: Security was lax at the firm's smaller plant.
…etc.
What is “Security”
 Dictionary.com says:
 1. Freedom from risk or danger; safety.
 2. Freedom from doubt, anxiety, or fear;
confidence.
 3. Something that gives or assures safety, as:
 1. A group or department of private guards: Call
building security if a visitor acts suspicious.
 2. Measures adopted by a government to prevent
espionage, sabotage, or attack.
 3. Measures adopted, as by a business or
homeowner, to prevent a crime such as burglary or
assault: Security was lax at the firm's smaller plant.
…etc.
What is “Security”
 Dictionary.com says:
 1. Freedom from risk or danger; safety.
 2. Freedom from doubt, anxiety, or fear;
confidence.
 3. Something that gives or assures safety, as:
 1. A group or department of private guards: Call
building security if a visitor acts suspicious.
 2. Measures adopted by a government to prevent
espionage, sabotage, or attack.
 3. Measures adopted, as by a business or
homeowner, to prevent a crime such as burglary or
assault: Security was lax at the firm's smaller plant.
…etc.
Why do we need security?
 Protect vital information while still allowing access
to those who need it
 Trade secrets, medical records, etc.
 Provide authentication and access control for
resources
 Ex: AFS
 Guarantee availability of resources
 Ex: 5 9’s (99.999% reliability)
What is “Security”
 Dictionary.com says:
 1. Freedom from risk or danger; safety.
 2. Freedom from doubt, anxiety, or fear;
confidence.
 3. Something that gives or assures safety, as:
 1. A group or department of private guards: Call
building security if a visitor acts suspicious.
 2. Measures adopted by a government to prevent
espionage, sabotage, or attack.
 3. Measures adopted, as by a business or
homeowner, to prevent a crime such as burglary or
assault: Security was lax at the firm's smaller plant.
…etc.
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Contractors to various government agencies
 Multinational corporations
 ANYONE ON THE NETWORK
Common security attacks
and their
countermeasures Finding a way into the network
 Firewalls
 Exploiting software bugs, buffer overflows
 Intrusion Detection Systems
 Denial of Service
 Ingress filtering, IDS
 TCP hijacking
 IPSec
 Packet sniffing
 Encryption (SSH, SSL, HTTPS)
 Social problems
 Education
Firewalls
 Basic problem – many network applications and
protocols have security problems that are fixed
over time
 Difficult for users to keep up with changes and keep
host secure
 Solution
 Administrators limit access to end hosts by using a
firewall
 Firewall is kept up-to-date by administrators
Firewalls
 A firewall is like a castle with a drawbridge
 Only one point of access into the network
 This can be good or bad
 Can be hardware or software
 Ex. Some routers come with firewall functionality
 ipfw, ipchains, pf on Unix systems, Windows XP and
Mac OS X have built in firewalls
Firewalls
 Used to filter packets based on a
combination of features
 These are called packet filtering firewalls
 There are other types too, but they will not be
discussed
 Ex. Drop packets with destination port of
23 (Telnet)
 Can use any combination of IP/UDP/TCP
header information
 man ipfw on unix47 for much more detail
 But why don’t we just turn Telnet off?
Dictionary Attack
 We can run a dictionary attack on the
passwords
 The passwords in /etc/passwd are encrypted
with the crypt(3) function (one-way hash)
 Can take a dictionary of words, crypt() them
all, and compare with the hashed passwords
 This is why your passwords should be
meaningless random junk!
 For example, “sdfo839f” is a good password
 That is not my andrew password
 Please don’t try it either
Denial of Service
I n t e r n e t
P e r p e t r a t o r V ic t im
I C M P e c h o ( s p o o f e d s o u r c e a d d r e s s o f v ic t im )
S e n t t o I P b r o a d c a s t a d d r e s s
I C M P e c h o r e p ly
Denial of Service
 Purpose: Make a network service unusable,
usually by overloading the server or network
 Many different kinds of DoS attacks
 SYN flooding
 SMURF
 Distributed attacks
 Mini Case Study: Code-Red
Denial of Service
Denial of Service
 SMURF
 Source IP address of a broadcast ping is forged
 Large number of machines respond back to victim,
overloading it
TCP Attacks
 TCP connections have associated state
 Starting sequence numbers, port numbers
 Problem – what if an attacker learns these
values?
 Port numbers are sometimes well known to begin
with (ex. HTTP uses port 80)
 Sequence numbers are sometimes chosen in very
predictable ways
TCP Attacks
 If an attacker learns the associated TCP state for
the connection, then the connection can be
hijacked!
 Attacker can insert malicious data into the TCP
stream, and the recipient will believe it came
from the original source
 Ex. Instead of downloading and running new
program, you download a virus and execute it
TCP Attacks
 Say hello to Alice, Bob and Mr. Big Ears
TCP Attacks
 Alice and Bob have an established TCP
connection
TCP Attacks
 Mr. Big Ears lies on the path between Alice and
Bob on the network
 He can intercept all of their packets
TCP Attacks
 First, Mr. Big Ears must drop all of Alice’s packets
since they must not be delivered to Bob (why?)
Packets
The Void
TCP Attacks
 Then, Mr. Big Ears sends his malicious packet with
the next ISN (sniffed from the network)
ISN, SRC=Alice
TCP Attacks
 What if Mr. Big Ears is unable to sniff the packets
between Alice and Bob?
 Can just DoS Alice instead of dropping her packets
 Can just send guesses of what the ISN is until it is
accepted
 How do you know when the ISN is accepted?
 Mitnick: payload is “add self to .rhosts”
 Or, “xterm -display MrBigEars:0”
TCP Attacks
 How do we prevent this?
 IPSec
 Provides source authentication, so Mr. Big Ears
cannot pretend to be Alice
 Encrypts data before transport, so Mr. Big Ears
cannot talk to Bob without knowing what the
session key is
TCP Attacks
 Why are these types of TCP attacks so
dangerous?
Web server
Malicious user
Trusting web client
Packet Sniffing
 What kinds of data can we get?
 Asked another way, what kind of information
would be most useful to a malicious user?
 Answer: Anything in plain text
 Passwords are the most popular
Packet Sniffing
 This works for wireless too!
 In fact, it works for any broadcast-based medium
Packet Sniffing
 How can we protect ourselves?
 SSH, not Telnet
 Many people at CMU still use Telnet and send their password in the
clear (use PuTTY instead!)
 Now that I have told you this, please do not exploit this information
 Packet sniffing is, by the way, prohibited by Computing Services
 HTTP over SSL
 Especially when making purchases with credit cards!
 SFTP, not FTP
 Unless you really don’t care about the password or data
 Can also use KerbFTP (download from MyAndrew)
 IPSec
 Provides network-layer confidentiality
1. Use encryption on your wireless access points (AP). Many site
surveys have found half or more of all wireless networks are wide open,
ripe for anyone to gather all the traffic and perhaps record your sensitive
information by sitting in a nearby parked car. Some people mess around
with locking down MAC addresses, but that gets unwieldy and a better
solution would be to use WPA2 encryption. WPA2 is far better than
other encryption methods that are more easily broken into.
2.Make sure all of your PCs use antivirus software and if you're using
Windows, add antispyware protection. This seems obvious, but it bears
restatiing. And while you are at it, check to make sure that all of your
antivirus subscriptions are current. Anything out of date isn't doing you
any good. In my support travels, I've found that this is a very common
lapse among my neighbors.
3.If you are running a Web server on your LAN, put it on a DMZ. If
your router doesn't have a DMZ, get a new router. Better yet, move to
a collocation facility where someone who knows what he is doing can
manage it. Having your own local Web server sounds like a good idea,
but is a real security sinkhole, and many cable networks have made it
harder to host your own from your home network anyway. So why
worry?2..
Disable file/print sharing on everything other than your file server. You
don't need it on each desktop, and that just causes more vulnerabilities.
This is particularly important for laptop users: You don't want to be
broadcasting your entire file system to everyone around you at the
airport or hotel, which is something that I often see when I travel and
check for open network shares.
9. Use whole disk encryption on all laptops that will ever leave home.
You never know when someone will steal your data or break into your
car or hotel room and lift the laptop. I like PGP Disk, but there are others
that cost next to nothing and provide plenty of protection. If you are in
the habit of carrying around USB thumb drives with your data, then use
one of the more modern U3 drives that work with Windows and are at
least password-protected to keep your data away from others.
10. Start doing regular off-site backups now. At least start with making
copies of your key customer and business data, and then make sure you
cover your personal files,
Social Problems
 People can be just as dangerous as unprotected
computer systems
 People can be lied to, manipulated, bribed,
threatened, harmed, tortured, etc. to give up
valuable information
 Most humans will breakdown once they are at the
“harmed” stage, unless they have been specially
trained
 Think government here…
Conclusions
 The Internet works only because we implicitly trust
one another
 It is very easy to exploit this trust
 The same holds true for software
 It is important to stay on top of the latest CERT
security advisories to know how to patch any
security holes
Security related URLs
 http://www.robertgraham.com/pubs/network-
intrusion-detection.html
 http://online.securityfocus.com/infocus/1527
 http://www.snort.org/
 http://www.cert.org/
 http://www.nmap.org/
 http://grc.com/dos/grcdos.htm
 http://lcamtuf.coredump.cx/newtcp/
Network Security R U Secure???
Network Security R U Secure???

More Related Content

What's hot

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentalsTariq kanher
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
Threats to network
Threats to networkThreats to network
Threats to networkQ4Points.com
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connectionsNitin kumar Gupta
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
On-Analyzing-a-Layered-Defense-System
On-Analyzing-a-Layered-Defense-SystemOn-Analyzing-a-Layered-Defense-System
On-Analyzing-a-Layered-Defense-SystemSarah Rudd
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)Wail Hassan
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentals
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Hvordan stopper du CryptoLocker?
Hvordan stopper du CryptoLocker?Hvordan stopper du CryptoLocker?
Hvordan stopper du CryptoLocker?
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Threats to network
Threats to networkThreats to network
Threats to network
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
On-Analyzing-a-Layered-Defense-System
On-Analyzing-a-Layered-Defense-SystemOn-Analyzing-a-Layered-Defense-System
On-Analyzing-a-Layered-Defense-System
 
V3I6-0108
V3I6-0108V3I6-0108
V3I6-0108
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 

Viewers also liked

Windows File Pseudonyms
Windows File PseudonymsWindows File Pseudonyms
Windows File PseudonymsBaronZor
 
Intro to Facebook Commerce (F-Commerce or Social Shopping)
Intro to Facebook Commerce (F-Commerce or Social Shopping)Intro to Facebook Commerce (F-Commerce or Social Shopping)
Intro to Facebook Commerce (F-Commerce or Social Shopping)Kiki 'Khadija' Rizki
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with HadoopPhilippe Julio
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (8)

Windows File Pseudonyms
Windows File PseudonymsWindows File Pseudonyms
Windows File Pseudonyms
 
Intro to Facebook Commerce (F-Commerce or Social Shopping)
Intro to Facebook Commerce (F-Commerce or Social Shopping)Intro to Facebook Commerce (F-Commerce or Social Shopping)
Intro to Facebook Commerce (F-Commerce or Social Shopping)
 
E-COMMERECE
E-COMMERECEE-COMMERECE
E-COMMERECE
 
Windows file system
Windows file systemWindows file system
Windows file system
 
Network security
Network securityNetwork security
Network security
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with Hadoop
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Network Security R U Secure???

Similar to Network Security R U Secure??? (20)

NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
lec security
lec securitylec security
lec security
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Network Security
Network SecurityNetwork Security
Network Security
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network security
Network securityNetwork security
Network security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 

More from trendy updates

How Different Cisco Routing Protocal Work
How Different Cisco  Routing Protocal WorkHow Different Cisco  Routing Protocal Work
How Different Cisco Routing Protocal Worktrendy updates
 
How to solve bootmgr is missing problem in window
How to solve bootmgr is missing problem in window How to solve bootmgr is missing problem in window
How to solve bootmgr is missing problem in window trendy updates
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure ! trendy updates
 
How To Earn From Affiliate Marketing
How To Earn From Affiliate Marketing  How To Earn From Affiliate Marketing
How To Earn From Affiliate Marketing trendy updates
 

More from trendy updates (8)

How Different Cisco Routing Protocal Work
How Different Cisco  Routing Protocal WorkHow Different Cisco  Routing Protocal Work
How Different Cisco Routing Protocal Work
 
How to solve bootmgr is missing problem in window
How to solve bootmgr is missing problem in window How to solve bootmgr is missing problem in window
How to solve bootmgr is missing problem in window
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
How To Earn From Affiliate Marketing
How To Earn From Affiliate Marketing  How To Earn From Affiliate Marketing
How To Earn From Affiliate Marketing
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
How Internet Work
How Internet WorkHow Internet Work
How Internet Work
 
Catia5v
Catia5vCatia5v
Catia5v
 
The basis of internet
The basis of internetThe basis of internet
The basis of internet
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Network Security R U Secure???

  • 1.
  • 2. Overview  What is security?  Why do we need security?  Who is vulnerable?  Common security attacks and countermeasures  Firewalls & Intrusion Detection Systems  Denial of Service Attacks  TCP Attacks  Packet Sniffing  Social Problems
  • 3. What is “Security”  Dictionary.com says:  1. Freedom from risk or danger; safety.  2. Freedom from doubt, anxiety, or fear; confidence.  3. Something that gives or assures safety, as:  1. A group or department of private guards: Call building security if a visitor acts suspicious.  2. Measures adopted by a government to prevent espionage, sabotage, or attack.  3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 4. What is “Security”  Dictionary.com says:  1. Freedom from risk or danger; safety.  2. Freedom from doubt, anxiety, or fear; confidence.  3. Something that gives or assures safety, as:  1. A group or department of private guards: Call building security if a visitor acts suspicious.  2. Measures adopted by a government to prevent espionage, sabotage, or attack.  3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 5. What is “Security”  Dictionary.com says:  1. Freedom from risk or danger; safety.  2. Freedom from doubt, anxiety, or fear; confidence.  3. Something that gives or assures safety, as:  1. A group or department of private guards: Call building security if a visitor acts suspicious.  2. Measures adopted by a government to prevent espionage, sabotage, or attack.  3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 6. Why do we need security?  Protect vital information while still allowing access to those who need it  Trade secrets, medical records, etc.  Provide authentication and access control for resources  Ex: AFS  Guarantee availability of resources  Ex: 5 9’s (99.999% reliability)
  • 7. What is “Security”  Dictionary.com says:  1. Freedom from risk or danger; safety.  2. Freedom from doubt, anxiety, or fear; confidence.  3. Something that gives or assures safety, as:  1. A group or department of private guards: Call building security if a visitor acts suspicious.  2. Measures adopted by a government to prevent espionage, sabotage, or attack.  3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant. …etc.
  • 8. Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Contractors to various government agencies  Multinational corporations  ANYONE ON THE NETWORK
  • 9. Common security attacks and their countermeasures Finding a way into the network  Firewalls  Exploiting software bugs, buffer overflows  Intrusion Detection Systems  Denial of Service  Ingress filtering, IDS  TCP hijacking  IPSec  Packet sniffing  Encryption (SSH, SSL, HTTPS)  Social problems  Education
  • 10. Firewalls  Basic problem – many network applications and protocols have security problems that are fixed over time  Difficult for users to keep up with changes and keep host secure  Solution  Administrators limit access to end hosts by using a firewall  Firewall is kept up-to-date by administrators
  • 11. Firewalls  A firewall is like a castle with a drawbridge  Only one point of access into the network  This can be good or bad  Can be hardware or software  Ex. Some routers come with firewall functionality  ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls
  • 12. Firewalls  Used to filter packets based on a combination of features  These are called packet filtering firewalls  There are other types too, but they will not be discussed  Ex. Drop packets with destination port of 23 (Telnet)  Can use any combination of IP/UDP/TCP header information  man ipfw on unix47 for much more detail  But why don’t we just turn Telnet off?
  • 13. Dictionary Attack  We can run a dictionary attack on the passwords  The passwords in /etc/passwd are encrypted with the crypt(3) function (one-way hash)  Can take a dictionary of words, crypt() them all, and compare with the hashed passwords  This is why your passwords should be meaningless random junk!  For example, “sdfo839f” is a good password  That is not my andrew password  Please don’t try it either
  • 14. Denial of Service I n t e r n e t P e r p e t r a t o r V ic t im I C M P e c h o ( s p o o f e d s o u r c e a d d r e s s o f v ic t im ) S e n t t o I P b r o a d c a s t a d d r e s s I C M P e c h o r e p ly
  • 15. Denial of Service  Purpose: Make a network service unusable, usually by overloading the server or network  Many different kinds of DoS attacks  SYN flooding  SMURF  Distributed attacks  Mini Case Study: Code-Red
  • 17. Denial of Service  SMURF  Source IP address of a broadcast ping is forged  Large number of machines respond back to victim, overloading it
  • 18. TCP Attacks  TCP connections have associated state  Starting sequence numbers, port numbers  Problem – what if an attacker learns these values?  Port numbers are sometimes well known to begin with (ex. HTTP uses port 80)  Sequence numbers are sometimes chosen in very predictable ways
  • 19. TCP Attacks  If an attacker learns the associated TCP state for the connection, then the connection can be hijacked!  Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source  Ex. Instead of downloading and running new program, you download a virus and execute it
  • 20.
  • 21. TCP Attacks  Say hello to Alice, Bob and Mr. Big Ears
  • 22. TCP Attacks  Alice and Bob have an established TCP connection
  • 23. TCP Attacks  Mr. Big Ears lies on the path between Alice and Bob on the network  He can intercept all of their packets
  • 24. TCP Attacks  First, Mr. Big Ears must drop all of Alice’s packets since they must not be delivered to Bob (why?) Packets The Void
  • 25. TCP Attacks  Then, Mr. Big Ears sends his malicious packet with the next ISN (sniffed from the network) ISN, SRC=Alice
  • 26. TCP Attacks  What if Mr. Big Ears is unable to sniff the packets between Alice and Bob?  Can just DoS Alice instead of dropping her packets  Can just send guesses of what the ISN is until it is accepted  How do you know when the ISN is accepted?  Mitnick: payload is “add self to .rhosts”  Or, “xterm -display MrBigEars:0”
  • 27. TCP Attacks  How do we prevent this?  IPSec  Provides source authentication, so Mr. Big Ears cannot pretend to be Alice  Encrypts data before transport, so Mr. Big Ears cannot talk to Bob without knowing what the session key is
  • 28. TCP Attacks  Why are these types of TCP attacks so dangerous? Web server Malicious user Trusting web client
  • 29. Packet Sniffing  What kinds of data can we get?  Asked another way, what kind of information would be most useful to a malicious user?  Answer: Anything in plain text  Passwords are the most popular
  • 30. Packet Sniffing  This works for wireless too!  In fact, it works for any broadcast-based medium
  • 31. Packet Sniffing  How can we protect ourselves?  SSH, not Telnet  Many people at CMU still use Telnet and send their password in the clear (use PuTTY instead!)  Now that I have told you this, please do not exploit this information  Packet sniffing is, by the way, prohibited by Computing Services  HTTP over SSL  Especially when making purchases with credit cards!  SFTP, not FTP  Unless you really don’t care about the password or data  Can also use KerbFTP (download from MyAndrew)  IPSec  Provides network-layer confidentiality
  • 32.
  • 33. 1. Use encryption on your wireless access points (AP). Many site surveys have found half or more of all wireless networks are wide open, ripe for anyone to gather all the traffic and perhaps record your sensitive information by sitting in a nearby parked car. Some people mess around with locking down MAC addresses, but that gets unwieldy and a better solution would be to use WPA2 encryption. WPA2 is far better than other encryption methods that are more easily broken into.
  • 34. 2.Make sure all of your PCs use antivirus software and if you're using Windows, add antispyware protection. This seems obvious, but it bears restatiing. And while you are at it, check to make sure that all of your antivirus subscriptions are current. Anything out of date isn't doing you any good. In my support travels, I've found that this is a very common lapse among my neighbors. 3.If you are running a Web server on your LAN, put it on a DMZ. If your router doesn't have a DMZ, get a new router. Better yet, move to a collocation facility where someone who knows what he is doing can manage it. Having your own local Web server sounds like a good idea, but is a real security sinkhole, and many cable networks have made it harder to host your own from your home network anyway. So why worry?2..
  • 35. Disable file/print sharing on everything other than your file server. You don't need it on each desktop, and that just causes more vulnerabilities. This is particularly important for laptop users: You don't want to be broadcasting your entire file system to everyone around you at the airport or hotel, which is something that I often see when I travel and check for open network shares. 9. Use whole disk encryption on all laptops that will ever leave home. You never know when someone will steal your data or break into your car or hotel room and lift the laptop. I like PGP Disk, but there are others that cost next to nothing and provide plenty of protection. If you are in the habit of carrying around USB thumb drives with your data, then use one of the more modern U3 drives that work with Windows and are at least password-protected to keep your data away from others. 10. Start doing regular off-site backups now. At least start with making copies of your key customer and business data, and then make sure you cover your personal files,
  • 36. Social Problems  People can be just as dangerous as unprotected computer systems  People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information  Most humans will breakdown once they are at the “harmed” stage, unless they have been specially trained  Think government here…
  • 37. Conclusions  The Internet works only because we implicitly trust one another  It is very easy to exploit this trust  The same holds true for software  It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
  • 38. Security related URLs  http://www.robertgraham.com/pubs/network- intrusion-detection.html  http://online.securityfocus.com/infocus/1527  http://www.snort.org/  http://www.cert.org/  http://www.nmap.org/  http://grc.com/dos/grcdos.htm  http://lcamtuf.coredump.cx/newtcp/

Editor's Notes

  1. In other words, having systems in place beforehand which prevent attacks before they begin.
  2. Related to the first definition, having peace of mind knowing that your systems are safe and protected.
  3. This includes contingency plans for what to do when attackers strike, keeping up with the latest CERT advisories, hiring network security consultants to find insecurities in your network, etc.
  4. Why good? Because it lets you filter what comes in and what goes out. Why bad? If that point goes down, you are cut off from everyone else. Also, may have lots of congestion at that one point.
  5. Alice can send a RESET
  6. Malicious user can send a virus to the trusting web client, instead of the program they thought they were downloading.