SlideShare una empresa de Scribd logo
1 de 11
Lecture 19
Hacking
WHAT IS NETWORK SECURITY?
• Security is much larger than just packets, firewalls,
and hackers. Security includes:
– Policies and procedures
– Liabilities and laws
– Human behavior patterns
– Corporate security programs and implementation
– Technical aspects- firewalls, intrusion detection systems,
proxies, encryption, antivirus software, hacks, cracks, and
attacks
• Understanding hacking tools and how attacks are
carried out is only one piece of the puzzle.
2
ATTACKS
 THERE ARE MANY TYPES OF ATTACKS
• SPOOFING ATTACK
• TELNET BASED ATTACK
• DOS (Daniel of service) ATTACK
• PING OF DEATH
• DISTRIBUTED DOS ATTACK
• MAILBOMBS
NEED FOR SECURITY
 SOME EXELLENT SOFTWARE CAN PROVIDE
YOU BEST SECURITY
 LIKE
• TROJAN
• FIREWALL
TROJAN
 WINDOWS TROJANS ARE SMALL ASPECT OF
WINDOWS SECURUTY
 TROJAN IS UNOTHORIZED PROGRAM
CONTAINED WITHIN A LEGIMATE PROGRAM
 THIS PROGRAM PERFORMS FUNCTION
UNKNOWN BY USER
FIREWALL
 FIREWALL IS ANY DEVICE USED TO PREVENT
OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
 TYPES OF FIREWALLS
• PACKET FILTER
• APPLICATION PROXY
• PACKET INSPECTION
Common Steps for Attackers
Reconnaissance
– Intelligent work of obtaining information either
actively or passively
– Examples:
• Passively: Sniffing Traffic, eavesdropping
• Actively: Obtaining data from American Registry for
Internet Numbers (ARIN), whois databases, web sites,
social engineering
7
Common Steps for Attackers
• Scanning
– Identifying systems that are running and services
that are active on them
– Examples: Ping sweeps and port scans
8
Common Steps for Attackers
• Gaining Access
– Exploiting identified vulnerabilities to gain
unauthorized access
– Examples: Exploiting a buffer overflow or brute
forcing a password and logging onto a system
9
Common Steps for Attackers
• Maintaining Access
– Uploading malicious software to ensure re-entry is
possible
– Example: Installing a backdoor on a system
10
Common Steps for Attackers
• Covering Tracks
– Carrying out activities to hide one’s malicious
activities
– Example: Deleting or modifying data in a system
and its application logs
11

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Hacking
HackingHacking
Hacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Hacking
HackingHacking
Hacking
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Destacado

Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Kashif Sohail
 
Dessler hrm12e ppt_03
Dessler hrm12e ppt_03Dessler hrm12e ppt_03
Dessler hrm12e ppt_03obeden
 
Job Analysis ( chapter 4 )
Job Analysis ( chapter 4 )Job Analysis ( chapter 4 )
Job Analysis ( chapter 4 )Qamar Farooq
 
Fall2012 ppt ch03 dessler
Fall2012 ppt ch03 desslerFall2012 ppt ch03 dessler
Fall2012 ppt ch03 desslerobeden
 
Using Habit for Good - Nir Eyal, 2016 Habit Summit
Using Habit for Good - Nir Eyal, 2016 Habit SummitUsing Habit for Good - Nir Eyal, 2016 Habit Summit
Using Habit for Good - Nir Eyal, 2016 Habit SummitHabit Summit
 
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...Habit Summit
 
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...Habit Summit
 
Persuasive Web Design - How to Get People to Take Action (Without Using Words...
Persuasive Web Design - How to Get People to Take Action (Without Using Words...Persuasive Web Design - How to Get People to Take Action (Without Using Words...
Persuasive Web Design - How to Get People to Take Action (Without Using Words...Habit Summit
 
Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012obeden
 

Destacado (20)

Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
 
Dessler 01
Dessler 01Dessler 01
Dessler 01
 
Dessler hrm12e ppt_03
Dessler hrm12e ppt_03Dessler hrm12e ppt_03
Dessler hrm12e ppt_03
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
Gary Dessler 10e.. ppt 01
Gary Dessler 10e.. ppt 01Gary Dessler 10e.. ppt 01
Gary Dessler 10e.. ppt 01
 
Job Analysis ( chapter 4 )
Job Analysis ( chapter 4 )Job Analysis ( chapter 4 )
Job Analysis ( chapter 4 )
 
Hrm10e ch04
Hrm10e ch04Hrm10e ch04
Hrm10e ch04
 
Powerpoint slides
Powerpoint slides Powerpoint slides
Powerpoint slides
 
Lecture 3 Dl.ppt
Lecture 3 Dl.pptLecture 3 Dl.ppt
Lecture 3 Dl.ppt
 
Strategic planning
Strategic planning Strategic planning
Strategic planning
 
Fall2012 ppt ch03 dessler
Fall2012 ppt ch03 desslerFall2012 ppt ch03 dessler
Fall2012 ppt ch03 dessler
 
Dessler hrm12e ppt_01
Dessler hrm12e ppt_01Dessler hrm12e ppt_01
Dessler hrm12e ppt_01
 
Using Habit for Good - Nir Eyal, 2016 Habit Summit
Using Habit for Good - Nir Eyal, 2016 Habit SummitUsing Habit for Good - Nir Eyal, 2016 Habit Summit
Using Habit for Good - Nir Eyal, 2016 Habit Summit
 
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
Why Engagement Matters to Investors - Sarah Tavel, Partner, Greylock Partners...
 
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
Designing for a Future Self - Yingzhao Liu, Director of User Experience Inter...
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Persuasive Web Design - How to Get People to Take Action (Without Using Words...
Persuasive Web Design - How to Get People to Take Action (Without Using Words...Persuasive Web Design - How to Get People to Take Action (Without Using Words...
Persuasive Web Design - How to Get People to Take Action (Without Using Words...
 
Mondy hrm13 inppt04.ppt
Mondy hrm13 inppt04.pptMondy hrm13 inppt04.ppt
Mondy hrm13 inppt04.ppt
 
Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012Hrm chapter 1 spring 2012
Hrm chapter 1 spring 2012
 

Similar a PPIT Lecture 19

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdfssuserfb92ae
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar26
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 

Similar a PPIT Lecture 19 (20)

Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx22-NTU-BA-1784.pptx
22-NTU-BA-1784.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
2016 to 2021
2016 to 20212016 to 2021
2016 to 2021
 

Más de Kashif Sohail

Más de Kashif Sohail (7)

PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 

Último

What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 

Último (20)

What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 

PPIT Lecture 19

  • 2. WHAT IS NETWORK SECURITY? • Security is much larger than just packets, firewalls, and hackers. Security includes: – Policies and procedures – Liabilities and laws – Human behavior patterns – Corporate security programs and implementation – Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks • Understanding hacking tools and how attacks are carried out is only one piece of the puzzle. 2
  • 3. ATTACKS  THERE ARE MANY TYPES OF ATTACKS • SPOOFING ATTACK • TELNET BASED ATTACK • DOS (Daniel of service) ATTACK • PING OF DEATH • DISTRIBUTED DOS ATTACK • MAILBOMBS
  • 4. NEED FOR SECURITY  SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY  LIKE • TROJAN • FIREWALL
  • 5. TROJAN  WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY  TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM  THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER
  • 6. FIREWALL  FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK  TYPES OF FIREWALLS • PACKET FILTER • APPLICATION PROXY • PACKET INSPECTION
  • 7. Common Steps for Attackers Reconnaissance – Intelligent work of obtaining information either actively or passively – Examples: • Passively: Sniffing Traffic, eavesdropping • Actively: Obtaining data from American Registry for Internet Numbers (ARIN), whois databases, web sites, social engineering 7
  • 8. Common Steps for Attackers • Scanning – Identifying systems that are running and services that are active on them – Examples: Ping sweeps and port scans 8
  • 9. Common Steps for Attackers • Gaining Access – Exploiting identified vulnerabilities to gain unauthorized access – Examples: Exploiting a buffer overflow or brute forcing a password and logging onto a system 9
  • 10. Common Steps for Attackers • Maintaining Access – Uploading malicious software to ensure re-entry is possible – Example: Installing a backdoor on a system 10
  • 11. Common Steps for Attackers • Covering Tracks – Carrying out activities to hide one’s malicious activities – Example: Deleting or modifying data in a system and its application logs 11