chapter 6 - basic security

37
CHAPTER 6 CHAPTER 6 BASIC BASIC SECURITY SECURITY POLITEKNIK SEBERANG PERAI JABATAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI

Upload: sofqa92

Post on 27-Oct-2014

102 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 6 - Basic Security

CHAPTER 6 CHAPTER 6 BASIC BASIC SECURITYSECURITY

POLITEKNIK SEBERANG PERAI

JABATAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI

Page 2: Chapter 6 - Basic Security

NETWORKING THREATSNETWORKING THREATSRisk of Network Intrusion

◦Intruders can gain access to a network through software vulnerabilities, hardware attacks or even through less high-tech methods Guessing someone's username and

password.

◦Intruders who gain access by modifying software or exploiting software vulnerabilities are often called hackers.

Page 3: Chapter 6 - Basic Security

NETWORKING THREATSNETWORKING THREATSRisk of Network Intrusion

◦Once the hacker gains access to the network, four types of threat may arise: Information theft Identity theft Data loss / manipulation Disruption of service

Page 4: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS - ACTIVITY- ACTIVITYRisk of Network Intrusion

Page 5: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Sources of Network Intrusion

◦External Threats External threats arise from individuals

working outside of an organization. They do not have authorized access to

the computer systems or network. External attackers work their way into a

network mainly from the Internet, wireless links or dialup access servers.

Page 6: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Sources of Network Intrusion

◦Internal Threats Occur when someone has authorized access

to the network through a user account or have physical access to the network equipment.

The internal attacker knows the internal politics and people, what information is both valuable and vulnerable and how to get to it.

Most companies spend considerable resources defending against external attacks however most threats are from internal sources.

Page 7: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Sources of Network Intrusion

Page 8: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Social Engineering

◦Refers to the ability of something or someone to influence the behavior of a group of people.

◦Refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.

◦With these techniques, the attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords.

Page 9: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Social Engineering1) Pretexting

◦A form of social engineering where an invented scenario (the pretext) is used on a victim in order to get the victim to release information or perform an action.

◦The target is typically contacted over the telephone.

◦For pretexting to be effective, the attacker must be able to establish legitimacy with the intended target, or victim.

Page 10: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Social Engineering2) Phishing

◦A form of social engineering where the phisher pretends to represent a legitimate outside organization.

◦They typically contact the target individual (the phishee) via email.

◦The phisher might ask for verification of information, such as passwords or usernames in order prevent some terrible consequence from occurring.

Page 11: Chapter 6 - Basic Security

NETWORKING THREATS NETWORKING THREATS Social Engineering3) Vishing/Phone Phishing

◦A new form of social engineering that uses Voice over IP (VoIP) is known as vishing.

◦With vishing, an unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service.

◦The call is then intercepted by a thief. ◦Bank account numbers or passwords

entered over the phone for verification are then stolen.

Page 12: Chapter 6 - Basic Security

METHODS OF ATTACKSMETHODS OF ATTACKSViruses

◦ A program that runs and spreads by modifying other programs or files.

◦ It cannot start by itself; it needs to be activated. Once activated, a virus may do nothing more than replicate itself and spread.

◦ Though simple, even this type of virus is dangerous as it can quickly use all available memory and bring a system to a halt.

◦ A more serious virus may be programmed to delete or corrupt specific files before spreading.

◦ Viruses can be transmitted via email attachments, downloaded files, instant messages or via diskette, CD or USB devices.

Page 13: Chapter 6 - Basic Security

Worms◦ Similar to a virus, but unlike a virus does not

need to attach itself to an existing program. ◦ A worm uses the network to send copies of

itself to any connected hosts. ◦ Worms can run independently and spread

quickly. ◦ They do not necessarily require activation or

human intervention. ◦ Self-spreading network worms can have a

much greater impact than a single virus and can infect large parts of the Internet quickly.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 14: Chapter 6 - Basic Security

Trojan Horses◦Is a non-self replicating program that is

written to appear like a legitimate program, when in fact it is an attack tool.

◦It relies upon its legitimate appearance to deceive the victim into initiating the program.

◦It may be relatively harmless or can contain code that can damage the contents of the computer's hard drive.

◦Trojans can also create a back door into a system allowing hackers to gain access.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 15: Chapter 6 - Basic Security

METHODS OF ATTACKSMETHODS OF ATTACKS- ACTIVITY- ACTIVITY

Page 16: Chapter 6 - Basic Security

Denial of Service (DoS)◦ DoS attacks are aggressive attacks on an

individual computer or groups of computers with the intent to deny services to intended users.

◦ DoS attacks can target end user systems, servers, routers, and network links.

◦ In general, DoS attacks seek to: Flood a system or network with traffic to

prevent legitimate network traffic from flowing Disrupt connections between a client and

server to prevent access to a service

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 17: Chapter 6 - Basic Security

Denial of Service (DoS)◦ Two common DoS attacks are:

SYN (synchronous) Flooding A flood of packets are sent to a server requesting

a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to

these fake requests and therefore cannot respond to legitimate ones.

Ping of death A packet that is greater in size than the maximum

allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 18: Chapter 6 - Basic Security

Distributed Denial of Service (DDoS)◦ Is a more sophisticated and potentially damaging

form of the DoS attack. ◦ It is designed to saturate and overwhelm network

links with useless data. ◦ DDoS operates on a much larger scale than DoS

attacks. ◦ Typically hundreds or thousands of attack points

attempt to overwhelm a target simultaneously. ◦ The attack points may be unsuspecting computers

that have been previously infected by the DDoS code.

◦ The systems that are infected with the DDoS code attack the target site when invoked.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 19: Chapter 6 - Basic Security

Brute Force◦ It is another type of attack that may result in

denial of services. ◦With brute force attacks, a fast computer is

used to try to guess passwords or to decipher an encryption code.

◦The attacker tries a large number of possibilities in rapid succession to gain access or crack the code.

◦Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 20: Chapter 6 - Basic Security

Spyware◦ Spyware is any program that gathers personal

information from computer without permission or knowledge.

◦ This information is sent to advertisers or others on the Internet and can include passwords and account numbers.

◦ Spyware is usually installed unknowingly when downloading a file, installing another program or clicking a popup.

◦ It can slow down a computer and make changes to internal settings creating more vulnerabilities for other threats.

◦ It can be very difficult to remove.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 21: Chapter 6 - Basic Security

Tracking Cookies◦Cookies are a form of spyware but are not

always bad. ◦They are used to record information

about an Internet user when they visit websites.

◦Cookies may be useful or desirable by allowing personalization and other time saving techniques.

◦Many web sites require that cookies be enabled in order to allow the user to connect.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 22: Chapter 6 - Basic Security

Adware◦ A form of spyware used to collect information about a

user based on websites the user visits. ◦ That information is then used for targeted advertising. ◦ Adware is commonly installed by a user in exchange

for a "free" product. ◦ When a user opens a browser window, Adware can

start new browser instances which attempt to advertize products or services based on a user's surfing practices.

◦ The unwanted browser windows can open repeatedly, and can make surfing the Internet very difficult, especially with slow Internet connections.

◦ Adware can be very difficult to uninstall.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 23: Chapter 6 - Basic Security

Pop-ups and pop-unders◦Pop-ups and pop-unders are additional

advertising windows that display when visiting a web site.

◦Unlike Adware, pop-ups and pop-unders are not intended to collect information about the user and are typically associated only with the web-site being visited.

◦Pop-ups: open in front of the current browser window.

◦Pop-unders: open behind the current browser window.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 24: Chapter 6 - Basic Security

Spam◦ Unwanted bulk email. ◦ Merchant want to send their email

advertising to as many end users as possible hoping that someone is interested in their product or service.

◦ Spam is a serious network threat that can overload ISPs, email servers and individual end-user systems.

◦ A person or organization responsible for sending spam is called a spammer.

◦ Spammers often make use of unsecured email servers to forward email.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 25: Chapter 6 - Basic Security

Spam◦ Spammers can use hacking techniques,

such as viruses, worms and Trojan horses to take control of home computers.

◦ These computers are then used to send spam without the owner's knowledge.

◦ Spam can be sent via email or more recently via Instant messaging software.

◦ Spam consumes large amounts of Internet bandwidth and is a serious enough problem that many countries now have laws governing spam use.

METHODS OF ATTACKSMETHODS OF ATTACKS

Page 26: Chapter 6 - Basic Security

1) Identification & Authentication Policies• Specifies authorized persons that can

have access to network resources and verification procedures.

• This include physical access to wiring closet and critical network resources such as servers, switches, routers and access points.

2) Password Policies• Ensure password meets minimum

requirements and are changed regularly.

SECURITY POLICYSECURITY POLICY

Page 27: Chapter 6 - Basic Security

3) Acceptable Policies◦ Identifies network applications and usages

that are acceptable. 4) Remote Access Policies

◦ Identify how remote users can access a network and what is accessible via remote connectivity.

5) Network Maintenance Procedures◦ Specifies network device OS and end user

application update procedures.6) Incident Handling Procedures

◦ Describe how security incidents will be handled.

SECURITY POLICYSECURITY POLICY

Page 28: Chapter 6 - Basic Security

Some of the security tools and applications used in securing a network include:◦Software patches and updates◦Virus protection◦Spyware protection◦Spam blockers◦Pop-up blockers◦Firewalls

SECURITY POLICYSECURITY POLICY

Page 29: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYPatches and Updates

◦One of the most common methods that a hacker uses to gain access to hosts and/or networks is through software vulnerabilities.

◦ It is important to keep software applications up-to-date with the latest security patches and updates to help deter threats.

◦A patch is a small piece of code that fixes a specific problem.

◦An update, on the other hand, may include additional functionality to the software package as well as patches for specific issues.

Page 30: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYPatches and Updates

◦ OS (operating system, such as Linux, Windows, etc.) and application vendors continuously provide updates and security patches that can correct known vulnerabilities in the software.

◦ In addition, vendors often release collections of patches and updates called service packs.

◦ Fortunately, many operating systems offer an automatic update feature that allows OS and applications updates to be automatically downloaded and installed on a host.

Page 31: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYAntivirus Software(Detecting a virus)

◦Some of the signs that a virus, worm or Trojan horse may be present include: Computer starts acting abnormally Program does not respond to mouse and keystrokes Programs starting or shutting down on their own Email program begins sending out large quantities of

email CPU usage is very high There are unidentifiable, or a large number of

processes running Computer slows down significantly or crashes

Page 32: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYAnti-virus Software

◦Can be used as both a preventative tool and as a reactive tool.

◦It prevents infection and detects, and removes, viruses, worms and Trojan horses.

◦Anti-virus software should be installed on all computers connected to the network.

Page 33: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYAnti-virus Software

◦Some of the features that can be included in Anti-virus programs are: Email checking - Scans incoming and outgoing

emails, and identifies suspicious attachments. Resident dynamic scanning - Checks executable

files and documents when they are accessed. Scheduled scans - Virus scans can be scheduled

to run at regular intervals and check specific drives or the entire computer.

Automatic Updates - Checks for, and downloads, known virus characteristics and patterns. Can be scheduled to check for updates on a regular basis.

Page 34: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYAnti-Spam

Apply OS and application updates when available. Run an Antivirus program regularly and keep it up

to date. Do not forward suspect emails. Do not open email attachments, especially from

people you do not know. Set up rules in your email to delete spam that by-

pass the anti-spam software. Identify sources of spam and report it to a

network administrator so it can be blocked. Report incidents to the governmental agency that

deals with abuse by spam.

Page 35: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYAnti-Spyware and Adware

◦Spyware and adware can also cause virus-like symptoms.

◦In addition to collecting unauthorized information, they can use important computer resources and affect performance.

◦It detects and deletes spyware applications, as well as prevents future installations from occurring.

◦Include detection and deletion of cookies and adware.

Page 36: Chapter 6 - Basic Security

SECURITY POLICYSECURITY POLICYPop-up Blockers

◦Pop-up stopper software can be installed to prevent pop-ups and pop-unders.

◦Many web browsers include a pop-up blocker feature by default.

◦Note that some programs and web pages create necessary and desirable pop-ups.

◦Most pop-up blockers offer an override feature for this purpose.

Page 37: Chapter 6 - Basic Security

SECURITY POLICY SECURITY POLICY - ACTIVITY- ACTIVITY