SlideShare una empresa de Scribd logo
1 de 62
Network Security &
System Admin
Presented By :
Md Sahabuddin
1
2
NETWORK SECURITY
• Information & Network penetration do occur
- from outsiders & insiders
in spite of having various security measures
such as Anti-virus, Firewalls, Routers
• There are two ways to attack computers
- Gain physical access to machines & conduct
physical attack
- Attack by use of malicious software; Malware
Organization
 What is Security all about?
 What is at Risk?
 Why Risks Exist?
 General Threat Perceptions
 Security
 Data (local, Remote)
 Communications
 Secure Backup
 Network Perimeter Security
 General Policy
 Min. Security Enforcement
 Intrusion Detection System
 Cryptographic Security
 VPN: A Roadmap
 Points for Action
 Emergency Response Team
3
Who is vulnerable?
4
5
Security Goals
Confidentiality
Integrity
Avalaibility
What is Security all about?
 Confidentiality:
 Protecting sensitive information from unauthorized
disclosure or intelligible interception; Only seen by
entities to whom it is addressed
 Integrity:
 Not modified/destroyed in a unauthorized way;
safeguarding the accuracy & completeness of information
& software
 Access Control:
 Access (computation, data, service) follows the prescribed
policy
 Authentication:
 Verifying the identity claimed
6
Contd.
 Availability:
 System accessible/usable on demand
 Nonrepudiation:
 Protection against false denial of comm.
 Audit Trail:
 Chronological record of system activities to enable
reconstruction/examination of environments/activities
leading to an operation from inception to final results.
 Privacy:
 Breach of confidentiality is also invasion of privacy.
 Collecting a dossier based upon his activities - inferring
habits, movements, expenditures  Security Risk
7
Active and Passive Threats
8
Common security attacks
and their countermeasures
 Finding a way into the network
 Firewalls
 Exploiting software bugs, buffer overflows
 Intrusion Detection Systems
 Denial of Service
 Ingress filtering, IDS
 TCP hijacking
 IPSec
 Packet sniffing
 Encryption (SSH, SSL, HTTPS)
 Social problems
 Education
9
General Threat Perceptions
 Network threatened by external running
malicious scripts (Malware)
 Adversaries attempting access protected
services, break into machines, snoop
communications, collect statistics of
transactions …
 Insiders and outsiders
 Disasters (natural and man-made)
10
Secure Storing of Data
(Local Storage)
 Physical Security
 Protect machine
 Limit network access
 Most secure (without
external access)
 Suppose it falls into
an adversary
 All the data can be
obtained in the clear
 Cryptographic Secure.
 Protects even if the m/c
falls to adversary
 Of course person having
access can delete --
Hence, BACKUP
 Data Integrity
 Cryptography: Fragile
 System issues, user
interfaces , Crypto-file
servers …
11
Eternal Blue Attack
 EternalBlue exploits a vulnerability in Microsoft's
implementation of the Server Message Block (SMB)
protocol. This vulnerability is denoted by entry CVE-
2017-0144 .
 Execution of Attack.
12
13
14
15
16
17
18
Network Scanning
19
20
Closing Open Ports
21
22
23
24
Firewalls
 A firewall is like a castle with a drawbridge
 Only one point of access into the network
 This can be good or bad
 Can be hardware or software
 Ex. Some routers come with firewall
functionality
 ipfw, ipchains, pf on Unix systems, Windows
XP and Mac OS X have built in firewalls
25
Firewall
 Used to filter packets based on a combination
of features
 These are called packet filtering firewalls
 There are other types too, but they will not be discussed
 Ex. Drop packets with destination port of 23
(Telnet)
 Can use any combination of IP/UDP/TCP header
information
 man ipfw on unix47 for much more detail
 But why don’t we just turn Telnet off?
26
Firewall
27
Intranet
DMZInternet
Firewall
Firewall
Web server, email
server, web proxy,
etc
Firewall
 Here is what a computer with a default
Windows 7 install looks like:
 135/tcp open loc-srv
 139/tcp open netbios-ssn
 445/tcp open microsoft-ds
 1025/tcp open NFS-or-IIS
 3389/tcp open ms-term-serv
 5000/tcp open UPnP
 Might need some of these services, or might
not be able to control all the machines on the
network
28
Configuring Windows Firewall
29
30
31
32
33
34
DoS (Denial of Service)
 Purpose: Make a network service
unusable, usually by overloading the
server or network
 Many different kinds of DoS attacks
 SYN flooding
 SMURF
 Distributed attacks
 Mini Case Study: Code-Red
35
Denial of Service
 SYN flooding attack
 Send SYN packets with bogus source address
 Why?
 Server responds with SYN ACK and keeps state
about TCP half-open connection
 Eventually, server memory is exhausted with this state
 Solution: use “SYN cookies”
 In response to a SYN, create a special “cookie” for the
connection, and forget everything else
 Then, can recreate the forgotten information when the
ACK comes in from a legitimate connection
36
Denial of Service
37
Internet
Perpetrator Victim
ICMP echo (spoofed source address of victim)
Sent to IP broadcast address
ICMP echo reply
Smurf Attack
38
Intrusion Detection Systems
 Attack detection, with automated response
 Damage prevention and containment
 Tracing and isolation of attack origin points
 Used to monitor for “suspicious activity” on a
network
 Can protect against known software exploits, like buffer
overflows
 Open Source IDS: Snort, www.snort.org
39
Intrusion Detection
 Uses “intrusion signatures”
 Well known patterns of behavior
 Ping sweeps, port scanning, web server indexing, OS
fingerprinting, DoS attempts, etc.
 However, IDS is only useful if contingency
plans are in place to curb attacks as they are
occurring
40
Snort Configuration
41
42
Black & White List
43
44
45
WPA 2 (Wi-Fi Protected Access 2 )
46
Wi-Fi Protected Access 2 is a network
security technology commonly used on Wi-Fiwireless
networks. It's an upgrade from the
original WPA technology, which was designed as a
replacement for the older and much less secure WEP.
WPA2 is used on all certified Wi-Fi hardware since 2006 and is
based on the IEEE 802.11i technology standard for data
encryption.
Cracking WPA 2 Network :
47
48
49
50
51
52
DDoS (Distributed Denial of Service)
 DDoS is a type of DOS attack where multiple
compromised systems, which are often infected with
a Trojan, are used to target a single system causing
aDenial of Service (DoS) attack.
 Victims of a DDoS attack consist of both the end targeted
system and all systems maliciously used and controlled
by the hacker in the distributed attack.
 The DDoS attack uses multiple computers and Internet
connections to flood the targeted resource. DDoS attacks
are often global attacks, distributed via botnets.
53
Execution of DDoS Attack
54
55
56
57
58
59
60
61
Security related URLs
 http://www.robertgraham.com/pubs/netwo
rk-intrusion-detection.html
 http://online.securityfocus.com/infocus/152
7
 http://www.snort.org/
 http://www.cert.org/
 http://www.nmap.org/
 http://grc.com/dos/grcdos.htm
 http://lcamtuf.coredump.cx/newtcp/
THANK YOU
62

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
Network security
 Network security Network security
Network security
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
FireWall
FireWallFireWall
FireWall
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 

Similar a Network security and System Admin

firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxApdiazizHussein
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
System and web security
System and web securitySystem and web security
System and web securitychirag patil
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 

Similar a Network security and System Admin (20)

Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Day4
Day4Day4
Day4
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
System and web security
System and web securitySystem and web security
System and web security
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 

Último

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Network security and System Admin

  • 1. Network Security & System Admin Presented By : Md Sahabuddin 1
  • 2. 2 NETWORK SECURITY • Information & Network penetration do occur - from outsiders & insiders in spite of having various security measures such as Anti-virus, Firewalls, Routers • There are two ways to attack computers - Gain physical access to machines & conduct physical attack - Attack by use of malicious software; Malware
  • 3. Organization  What is Security all about?  What is at Risk?  Why Risks Exist?  General Threat Perceptions  Security  Data (local, Remote)  Communications  Secure Backup  Network Perimeter Security  General Policy  Min. Security Enforcement  Intrusion Detection System  Cryptographic Security  VPN: A Roadmap  Points for Action  Emergency Response Team 3
  • 6. What is Security all about?  Confidentiality:  Protecting sensitive information from unauthorized disclosure or intelligible interception; Only seen by entities to whom it is addressed  Integrity:  Not modified/destroyed in a unauthorized way; safeguarding the accuracy & completeness of information & software  Access Control:  Access (computation, data, service) follows the prescribed policy  Authentication:  Verifying the identity claimed 6
  • 7. Contd.  Availability:  System accessible/usable on demand  Nonrepudiation:  Protection against false denial of comm.  Audit Trail:  Chronological record of system activities to enable reconstruction/examination of environments/activities leading to an operation from inception to final results.  Privacy:  Breach of confidentiality is also invasion of privacy.  Collecting a dossier based upon his activities - inferring habits, movements, expenditures  Security Risk 7
  • 8. Active and Passive Threats 8
  • 9. Common security attacks and their countermeasures  Finding a way into the network  Firewalls  Exploiting software bugs, buffer overflows  Intrusion Detection Systems  Denial of Service  Ingress filtering, IDS  TCP hijacking  IPSec  Packet sniffing  Encryption (SSH, SSL, HTTPS)  Social problems  Education 9
  • 10. General Threat Perceptions  Network threatened by external running malicious scripts (Malware)  Adversaries attempting access protected services, break into machines, snoop communications, collect statistics of transactions …  Insiders and outsiders  Disasters (natural and man-made) 10
  • 11. Secure Storing of Data (Local Storage)  Physical Security  Protect machine  Limit network access  Most secure (without external access)  Suppose it falls into an adversary  All the data can be obtained in the clear  Cryptographic Secure.  Protects even if the m/c falls to adversary  Of course person having access can delete -- Hence, BACKUP  Data Integrity  Cryptography: Fragile  System issues, user interfaces , Crypto-file servers … 11
  • 12. Eternal Blue Attack  EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE- 2017-0144 .  Execution of Attack. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 20. 20
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. Firewalls  A firewall is like a castle with a drawbridge  Only one point of access into the network  This can be good or bad  Can be hardware or software  Ex. Some routers come with firewall functionality  ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls 25
  • 26. Firewall  Used to filter packets based on a combination of features  These are called packet filtering firewalls  There are other types too, but they will not be discussed  Ex. Drop packets with destination port of 23 (Telnet)  Can use any combination of IP/UDP/TCP header information  man ipfw on unix47 for much more detail  But why don’t we just turn Telnet off? 26
  • 28. Firewall  Here is what a computer with a default Windows 7 install looks like:  135/tcp open loc-srv  139/tcp open netbios-ssn  445/tcp open microsoft-ds  1025/tcp open NFS-or-IIS  3389/tcp open ms-term-serv  5000/tcp open UPnP  Might need some of these services, or might not be able to control all the machines on the network 28
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. DoS (Denial of Service)  Purpose: Make a network service unusable, usually by overloading the server or network  Many different kinds of DoS attacks  SYN flooding  SMURF  Distributed attacks  Mini Case Study: Code-Red 35
  • 36. Denial of Service  SYN flooding attack  Send SYN packets with bogus source address  Why?  Server responds with SYN ACK and keeps state about TCP half-open connection  Eventually, server memory is exhausted with this state  Solution: use “SYN cookies”  In response to a SYN, create a special “cookie” for the connection, and forget everything else  Then, can recreate the forgotten information when the ACK comes in from a legitimate connection 36
  • 37. Denial of Service 37 Internet Perpetrator Victim ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply
  • 39. Intrusion Detection Systems  Attack detection, with automated response  Damage prevention and containment  Tracing and isolation of attack origin points  Used to monitor for “suspicious activity” on a network  Can protect against known software exploits, like buffer overflows  Open Source IDS: Snort, www.snort.org 39
  • 40. Intrusion Detection  Uses “intrusion signatures”  Well known patterns of behavior  Ping sweeps, port scanning, web server indexing, OS fingerprinting, DoS attempts, etc.  However, IDS is only useful if contingency plans are in place to curb attacks as they are occurring 40
  • 42. 42
  • 43. Black & White List 43
  • 44. 44
  • 45. 45
  • 46. WPA 2 (Wi-Fi Protected Access 2 ) 46 Wi-Fi Protected Access 2 is a network security technology commonly used on Wi-Fiwireless networks. It's an upgrade from the original WPA technology, which was designed as a replacement for the older and much less secure WEP. WPA2 is used on all certified Wi-Fi hardware since 2006 and is based on the IEEE 802.11i technology standard for data encryption. Cracking WPA 2 Network :
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 52
  • 53. DDoS (Distributed Denial of Service)  DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing aDenial of Service (DoS) attack.  Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.  The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets. 53
  • 54. Execution of DDoS Attack 54
  • 55. 55
  • 56. 56
  • 57. 57
  • 58. 58
  • 59. 59
  • 60. 60
  • 61. 61 Security related URLs  http://www.robertgraham.com/pubs/netwo rk-intrusion-detection.html  http://online.securityfocus.com/infocus/152 7  http://www.snort.org/  http://www.cert.org/  http://www.nmap.org/  http://grc.com/dos/grcdos.htm  http://lcamtuf.coredump.cx/newtcp/