SlideShare a Scribd company logo
What is
Security ?
Part I
Meletis A. Belsis
2003, Athens, Greece
Mediterranean College
Computer Crime
Setting the Scene
• Security is one of the oldest problem that governments
,commercial organizations and almost every person
has to face
• The need of security exists since information became a
valuable resource
• Introduction of computer systems to business has
escalated the security problem even more
• The advances in networking and specially in
distributed systems made the need for security even
greater
• The Computer Security Institute report, notes that in
year 2003 computer crime costs where increased to
more than 450 million dollars in the USA alone.
Profiling Adversaries
• Adversaries that target corporate system are
numerous:
• These can be general classified in the
following categories:
– Hackers
– Employees (both malicious and unintentional)
– Terrorists groups
– Governments
– Opposing Industries
Security
• So now we know that we need security.
BUT what is security anyway ?
• Many people fail to understand the meaning of
the word.
• Many corporations install an antivirus software,
and/or a firewall and believe they are protected.
Are they ?

Recommended for you

Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos

The document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It defines DoS and DDoS attacks, describes different types of DoS attacks like SYN flooding and Smurf attacks. It also explains how botnets and tools are used to launch DDoS attacks, and discusses some common DDoS countermeasures like detection, mitigation and traceback.

Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking

The document discusses various topics related to computer security and hacking. It covers types of computer crimes over the years from the 1980s to 2000s involving viruses, financial theft, and denial of service attacks. It also summarizes different hacking techniques such as spoofing, session hijacking, denial of service attacks, buffer overflows, password attacks, and ways to improve security including password hashing and network security.

Ethical Hacking : Why Do Hackers Attack And How ?
Ethical Hacking : Why Do Hackers Attack And How ?Ethical Hacking : Why Do Hackers Attack And How ?
Ethical Hacking : Why Do Hackers Attack And How ?

Hackers attack websites and networks for various reasons such as financial gain, espionage, activism, or terrorism. Common attack methods include denial of service attacks to crash systems, spoofing identities to gain unauthorized access, hijacking sessions, exploiting software vulnerabilities like buffer overflows, and cracking passwords. To prevent attacks, network administrators must secure systems from intrusion, monitor for suspicious activity, and keep software updated by patching known vulnerabilities.

hackingethical hacking course in chennaiethical hacking
Security through obscurity
• Consider some cases :
– An internal employee wants to revenge the company
and so publishes private corporate information on the
NET.
– The terrorist attack on the twin towers (in USA) had as
a result many corporations to close. Why ?
– An employee forgets his laptop into a café. This laptop
contains all corporate private information.
HOW CAN A FIREWALL PROTECT FROM THE
PREVIOUS ?
Security: easy to understand, difficult to implement
“In the real world, security involves processes. It involves
preventive technologies, but also detection and reaction
processes, and an entire forensics system to hunt down
and prosecute the guilty. Security is not a product; it
itself is a process. …. ”
Bruce Schneier
(Secrets and Lies, Wiley and Sons Inc.)
Security: easy to understand, difficult to implement
• Security contains a number of
tools , processes and
techniques.
• These in general cover three
main requirements:
– Confidentiality
– Integrity
– Availability
• Depending on the security
requirements a system has, one
can concentrate only on one of
the previous or all of them.
• A new requirement enforced
by the operation of e-markets
is non-repudiation.
Security: easy to understand, difficult to implement
• Computer Security is difficult to implement due to
the following:
– The cost of implementing a security system should not
exceed the value of the data to be secured.
– Industries pay huge amount of money for industrial
espionage.
– Users feel that security is going to take their freedom away
and so often they sabotage the security measures.
– Computer prices have fallen dramatically and the number
of hackers have been multiplied.
– Security managers work under strict money and time
schedule. Criminals do not have any time schedule and
they do not need any specialised software.
– Hackers are often cooperate with known criminals.
That is why, total security is almost infeasible.

Recommended for you

Hacking
HackingHacking
Hacking

This document summarizes information about computer security and hacking. It discusses how the internet has grown rapidly while security has lagged behind, allowing legions of hackers to emerge. It covers various types of computer crimes throughout history from the 1980s to 2000. It also describes different modes of hacker attacks like spoofing, denial of service attacks, buffer overflows, password attacks, and others. The goal of the document is to provide an overview of the key issues around computer security and how hackers have threatened systems over time.

computercyber crimeethical hacking
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack

This Presentation is useful to study about Denial of Service Attack or DoS Attack. This Presentation is also useful to make PPT on this topic.

designdeengineering
Denial of service
Denial of serviceDenial of service
Denial of service

This document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It defines DoS attacks as attempts to render a system unusable or slow it down for legitimate users by overloading its resources. DDoS attacks multiply the effectiveness of DoS by using multiple compromised computers to launch attacks simultaneously. Common DoS attack types like SYN floods, Smurf attacks, and ping of death are described. The rise of botnets, which are networks of compromised computers controlled remotely, enabled more powerful DDoS attacks. Mitigation strategies include load balancing, throttling traffic, and using honeypots to gather attacker information.

The Art of
Hacking
Part II
Attacking Corporate Systems
Information Gathering
• The first step to hacking is to gather as much
information as possible for the target.
• This information is later used to draw a map of
the corporate network.
• This map is used to define and design an attack
methodology as well as identify the needed
attack tools.
• The extreme case of information gathering is
called dumpster diving
Information Gathering : Searching the
Corporate Web site
• Searching the corporate web site for
information:
– Statements like : “This site is best viewed with
Internet Explorer” could uncover that the
company uses Microsoft Web Server.
– Email Addresses. These are used to identify user
names. i.e. username@thecompany.com
– Office Locations: Companies with office locations
in different countries would probably use a VPN to
interconnect.
– Company News
Information Gathering : Searching the Internet
• Searching the WEB can provide valuable information
– Using the link directive. i.e. link: www.somecompany.com
provides information on the sites that link to the corporate web
site.
– Searching the greater WEB using the company’s name
• Searching public WHOIS databases :Provide information
about the domain name of the company.
• Searching the ARIN Whois Database: Provide a
database with all register IP addresses.
• Searching technical forums using either the name of the
administrator or the name of the company.

Recommended for you

Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks

Denial of Service attacks – Definitions, related surveys Traceback of DDoS Attacks – Proposed method, advantages, future work Detection methods with Shannon and Renyi cross entropy – Previous works, proposed method, dataset and results The added value of entropy detection methods References

dossattacksdenial of service
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks

DoS Basics DDos Attack Description DDos Attack Taxonomy Well known DDoS attacks Defense Mechanisms Modern Techniques in Defending

Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9

This document provides an overview of hacking, including definitions, a brief history, famous hackers, the hacker attitude, basic hacking skills, and common hacking methods and attacks. It defines hacking as intruding on someone else's information space for malicious purposes. It discusses port scanning and ICMP scanning techniques used to gather target system information. Common attacks mentioned include denial-of-service attacks, threats from sniffers and key loggers, trojan attacks, and IP spoofing. The document provides details on specific attacks like ping of death and smurf attacks. It also discusses tools used and countermeasures to protect against hacking.

Information Gathering :Being Polite…..
• When the initial search has finished, it is now time to
ASK the network itself. Believe it or not most networks
are quite polite.
– DNS Interrogation. It can be performed by simple
using the nslookup program.
– Using the PING command (ICMP Echo ). Can unveil
hosts that are connected and are not protected by a
firewall.
– Using the TraceRoute command we can identify
which is the IP of the router that connects the
corporate network to the Internet.
NeoTrace: Windows Based TraceRT
Information Gathering :Identify Running
Services
• Having a map of the internet hosts that are accessible from the
internet, we must now identify the services that they offer and the
operating system that is installed on each host.
• Special programs like nmap and superscanner are used to
interrogate each port in a host.
• Detecting Services
– The Scanner tries to open a connection to each port of the target host (By
sending Syn messages) .
– The open ports that respond show the services that are running.
• Detecting the OS
– The Scanner sends specific erroneous message to the ports. OS response with
different messages.
SuperScan: Windows Based Port Scanner

Recommended for you

Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack

The document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks, as well as man-in-the-middle attacks. It defines DoS and DDoS, noting that a DDoS involves multiple hosts attacking at once. Common DoS attack types like penetration, eavesdropping, man-in-the-middle, and flooding are described. Symptoms of attacks and preventative measures are outlined. The document then explains how man-in-the-middle attacks work using techniques like ARP poisoning to intercept communications. Defenses against man-in-the-middle attacks through encryption and detection methods are also presented.

information securityddos & dosdos
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV

There are several categories of attackers, including hackers, crackers, script kiddies, spies, employees, and cyberterrorists. Common attacks include password guessing, which attempts to learn a user's password through various means, and denial of service attacks, which flood a server or device with requests to make it unavailable. Malicious software, or malware, consists of computer programs intentionally created to harm systems and includes viruses, worms, logic bombs, Trojan horses, and back doors.

network securityeric vanderburgcybersecurity
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi

DOS / DDOS introduction How Easy it is to get information Real Life Examples MyDoom , GitHub , Dyn , Windows Server and Windows 10 servers running Internet Information Services (IIS) are vulnerable to denial of service (DOS) attacks Base of Attacks Types of DOS / DDOS Attack Tools , LOIC, XOIC, Stacheldracht DOS/DDOS Weaknesses Category of OS/ DDOS What to defend? Botnets and Botnets mitigations Michael Calce, a.k.a. MafiaBoy Point of entrance / OSI Model ( If time permit)

a.k.a. mafiaboy point of entrance / osi model ( ifcyber attacksdos / ddos introduction how easy it is to get info
Information Gathering :Scanning undetected
• Many firewalls can detect these scanning attempts.
So scanners use some alternate techniques:
– Slow Scanning
– Distributed Scanning
– Half Open Connection
– Fragmented packets
– XMAS
– FIN
– FTP Bounce
Password Cracking
• Adversaries use two methods to attack
passwords.
– Brute force: Try all key combination in the
password space.
– Dictionary: Use a dictionary of known words and
try each word along with their combinations.
• These attacks can be performed either locally or
remotely
L0phtCrack: Windows Password Cracking
VIRUSES
• Computer Viruses are
categorised in:
– Normal viruses
– Trojan Horses
– WORMS
• Today there are more than 2,500
virus ready to be downloaded.
• A user can get infected by:
– Running a program
– Opening an email
– Visiting a web site (evil Trojan)
– Opening a .doc file
• Today virus creation and
mutation centres can be freely
downloaded from the Internet

Recommended for you

Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)

This is a presentation i made about Denial of Service or a Distributed Denial of Service (DoS / DDoS) and the latest methods used to crash anything online and the future of such attacks which can disrupt the whole internet . Such attacks which are in TB's and can be launched from just single computer. And, there is not much that can be done to prevent them.

ddoswebsitewebsite crash
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community

Honeypots - Tracking the Blackhat Community From Jae Chung, Matt Hartling, Zach Lawson, Frank Posluszny

Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers. The term is generally used with regards to computer networks, but is not limited to this field, for example, it is also used in reference to CPU resource management. There are two general forms of Dos attacks: those that crash services and those that flood services. One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

ddosattackcyber attack
SubSeven: Visual Interface to Control Infected PC
Denial of Service Attack (DoS)
• The idea behind these attacks is to make the
target system unavailable to its authorised users.
• Typical attacks include but not limited to :
– Ping O’ Death (sending packets of size greater that
65,535)
– SYN Flooding Attack (Starting Many half-open
connections)
– Smurf Attack (sending requests to broadcast address
with a spoofed IP address)
– Domain Name Server DoS (Requesting DNS quires
from multiple DNS Servers with a Spoofed IP
SynFlood Attack
Smurf Attack

Recommended for you

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security

This presentation is intended to increase awareness of Extension Agents to the threats of scams and malware on the Internet. In addition it covers some ways to stay protected from such threats.

CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview

Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610. Instructor: Sam Bowne Class website: https://samsclass.info/123/123_S17.shtml

securityccsfhacking
Art.unefa.transdigital sybil caballerounefa
Art.unefa.transdigital sybil caballerounefaArt.unefa.transdigital sybil caballerounefa
Art.unefa.transdigital sybil caballerounefa

Este artículo surge en el marco de la investigación “Tránsito digital en el ámbito educativo”, que se lleva a cabo dentro del Centro de Investigaciones Educativas TEBAS-UCV. A la luz de esta línea se desarrolló un informe en el cual se plantean problemas que van de los epistémico a lo interpretativo a través de la investigación y la producción de conocimiento y su constatación en la realidad con el apoyo de entrevistas y encuestas que han acompañado esta investigación. Este artículo toma uno de sus capítulos, el cual es de carácter inédito. Dicha línea de investigación y sus aportes al conocimiento han servido de base al desarrollo de los Programas docentes que a lo largo de estos dos últimos años vengo adelantando en el post-grado de la UNEFA Núcleo Los Teques. A partir del cual se han elaborados contenidos digitales y se han dotado herramientas teóricas y prácticas que redundan en sendos beneficios a la práctica docente en Venezuela a través del uso de las Tics.

docentesvenezuelatics
Domain Name System DoS
Distributed Denial of Service (DDoS)
• Hackers have used the
distributed power
internet offers.
• Tools are now perform
DoS attack from
multiple hosts at the
same time.
• Examples are:
– Tribal Flood Network
– TFN2K
– Stacheldraft
Sniffing
• Ethernet provides the ability to run a network card
in Promiscuous mode. This allows the card to
read any packet travelling on the network.
• Sniffing software are using this to read all data
transmitted in the local net.
• Sniffers can be programmed to steal information
associated only with specific protocols or
programs. i.e. read all information from http
packets only.
• Some sniffers can be even programmed to
transmit sniffed passwords back to the attacker.
• The first and most used sniffer is the TCPDump .
SnifferPro: A windows based Sniffer

Recommended for you

Acerca de groupVision 2014
Acerca de groupVision 2014Acerca de groupVision 2014
Acerca de groupVision 2014

La compañía cree en la colaboración en grupo para el éxito de la sociedad. Logra su misión de colaboración a través de la práctica interna, asociaciones con clientes y proveedores, y servicios de consultoría y facilitación de grupos. La compañía ofrece servicios de distribución, facilitación de grupos y consultoría en diseño de eventos.

groupvisionfacilitación grupaltecnologías para la colaboración
Para que sirve el dropbox
Para que sirve el dropboxPara que sirve el dropbox
Para que sirve el dropbox

Dropbox es una herramienta de almacenamiento en la nube que permite sincronizar y compartir archivos entre dispositivos a través de una carpeta especial en el sistema. Los archivos guardados en esta carpeta se almacenan automáticamente en los servidores de Dropbox para proveer copias de seguridad y acceso desde cualquier lugar a través de Internet.

RTM (Remember The Milk)
RTM (Remember The Milk)RTM (Remember The Milk)
RTM (Remember The Milk)

Herramienta de web, Aplicacion, permita administrar tareas.

tareasgestionaraplicaciones
System Flaws and Exploits
• Most systems today contain bugs. These are coming either
from the system designers, implementers or the ones that
manage the system.
• Hackers can use these bugs to gain access to systems.
• Examples of such are :
– Default accounts
– Poor User Accounts
– Allowing outside anonymous Telnet connections to the Web
Server
– Allowing trusted connections
– Buffer Overflows
– Allowing Banners in services
– Allowing NetBios over TCP/IP when not needed.
• The Internet has a vast amount of software that test a given
server for a number of such exploits.
Simpsons’: A CGI vulnerability scanner
Social Engineering
• One of the oldest and easiest form of hacking.
<Hacker is calling the administrator >
 Hallo I am <<name of an employee>>. My user name <<user name as seen
on email address>>. I am new to the company but I forgot my system
password <<be very unhappy>> but my manager ask to find him
some files. If I tell him that I forgot my password , I am afraid that
he is going to fire me. Please help <<be persuasive>>>>
<Administrator wants to help a fellow employee>
Ok. Do not cry now. That is why we are here for. I am going to
reset your password to newpassoword. Just do not forget it again.
<Hacker thanks the polite employee>
 Oh thank you so much. I am going to buy the coffee when we
meet. You are a lifesaver….
(The scenario works even better is the hacker is a female and the administrator is a
male.)
IP Spoofing
• Hackers usually change the IP address in their datagrams.
• This happens for two reasons:
– To avoid getting caught.
– To bypass security tools, and systems that allow trusted connections.
• Changing just the IP is called a blind attack, because the
hacker never sees the response from the target.
• In order to see the response the hacker has a number of ways:
– Install a sniffer to the target network.
– Use Source Routing
– Use ICMP redirect
– If both hacker and target are located on the same network use ARP
spoofing.
– DNS cache Poisoning.
• Software programs like A4 proxy allows hackers to use a
number of anonymous servers before they attack. Thus their
real IP is almost untraceable.

Recommended for you

Mass tourism in historic cities, the role of civil organizations in the case ...
Mass tourism in historic cities, the role of civil organizations in the case ...Mass tourism in historic cities, the role of civil organizations in the case ...
Mass tourism in historic cities, the role of civil organizations in the case ...

Malaga is the administrative capital of the Costa del Sol, however, it has remained out of the mass tourism until the last decade. Coinciding with the obsolescence of the port facilities, the city has found an opportunity in cruise tourism, becoming the second largest Spanish destination in this sector. The main attractive of Malaga is being the birthplace of one of the most revolutionary painters, Pablo Picasso; developing a large program for museums and hotels openings, cultural events and urban projects over the last few years in order to create an atmosphere suitable for all visitors’ tastes. On the other hand, this process is also creating monofunctional sectors, gentrification and theming of the principal Historic Site areas. This implies to focus on restoration plans and on projecting an image according to the one that tourists expect to see. In this context, several civil organizations have been formed to denounce heritage losses, social marginality and identity simplification through collaborative works that join web 2.0, participative cartography and academic research. We present a selection of these works.

heritagetourismparticipation
Dossier Curso BIOCIDAS 01-12/13
Dossier Curso BIOCIDAS 01-12/13Dossier Curso BIOCIDAS 01-12/13
Dossier Curso BIOCIDAS 01-12/13

Este documento presenta dos cursos sobre el uso de plaguicidas de uso ganadero ofrecidos por el Centro de Formación Santa Marta. Incluye información sobre los objetivos, contenido, programación y precios de los cursos de nivel básico y cualificado. También proporciona datos sobre la empresa como su dirección, NIF y epígrafe de actividad, así como indicaciones generales sobre los cursos.

Muerte en el desvan 2012 13
Muerte   en  el  desvan   2012   13Muerte   en  el  desvan   2012   13
Muerte en el desvan 2012 13

Este poema explora temas como la muerte, la soledad y la búsqueda de la verdad interior. A través de 14 poemas cortos, el autor describe escenas de dolor, pérdida y anhelo, así como reflexiones sobre la fragilidad de la vida y lo efímero de la existencia humana. Los poemas utilizan imágenes de flores, vientos, labios y miradas para evocar sensaciones y sentimientos. Un mensaje principal es la dificultad de conocer el alma propia y la de los demás.

A4 Proxy : Using multiple anonymous proxies to
hide the IP address
The Next Step
• So now I am in what am I doing next ?.
1. If you do not already have, try to gain root
access.
2. Find and clear Log Files.
3. Install a Root Kit to ensure that you will have
access in the future
Protecting
Corporate
Systems
PART III
Information Security Measures
Is it possible ?
• Total security is not feasible.
• Systems must be secured depending on their value.
• Security measures are applied according to the threat
level a system has.
• The first step is to understand the threats, to your
corporate systems. This can be done by a risk analysis
process.
• In this stage remember that security is a business
requirement

Recommended for you

Mailing List Matters
Mailing List MattersMailing List Matters
Mailing List Matters

A good mailing list is key to the success of a direct marketing campaign. This is the slides from Click2Mail's USPS webinar.

salescustomersbusiness generation
How you can become an Accessibility Superhero
How you can become an Accessibility SuperheroHow you can become an Accessibility Superhero
How you can become an Accessibility Superhero

Steps you can take to make sure your web page is accessible. This talk was given at the Plone Conference 2015 in Bucharest, Romania

accessibilityploneconf2015ploneconf
Celebración 20º Aniversario Euriux Abogados
Celebración 20º Aniversario Euriux AbogadosCelebración 20º Aniversario Euriux Abogados
Celebración 20º Aniversario Euriux Abogados

Este documento es el programa de una cena conmemorativa del 20 aniversario de una organización. Agradece a los presidentes, consejeros, servicios centrales y anfitriones de las asambleas de diferentes ciudades por su trabajo. Celebra 20 años de lealtad al estilo y sentido de cohesión de la organización. Señala que el comienzo no fue fácil pero que fue necesario explorar diferentes vías de negocio, viajar, desarrollar relaciones e implementar una buena estrategia de marketing para lograr la cobertura nacional. Agradece

abogadosaniversarioagrupacion
Creating a DMZ zone
• The first security measure is
to seal the internal network
from the outside world.
• This is performed by
developing a network called
Demilitarized Zone (DMZ).
• The DMZ contains all the
servers that must be
accessible from the outside
world
• NOTE that we must always
assume that servers in the
DMZ are going to be hacked
at some point.
Firewalls
• Firewalls exist into types:
– Packet filters: Are operating on the protocol level. They use
a firewalling policy to allow the packet to pass or to drop the
packet.
– Proxy Servers: They operate at the application level. They
are always located between the user requests and the servers
response. Thus allowing us to enforce policies on which
users can access the internet and on which port.
• Packet Filters are usually located on the router, while
Proxies are installed on computers
• A network may use any number of the previous
depending its size and architecture.
• Known Firewalls are Checkpoint’s Firewall-1, Cisco
PIX, Microsoft’s ISA.
Intrusion Detection Systems (IDS)
• Intrusion detection systems are
used to detect attacks to the
network and inform the
administrator.
• IDS are organised into two
categories :
– Signature based : They hold a
database of known attacks and
they test packets against the data
stored in the database.
– Anomaly based: They test the
traffic against anomalies. I.e.
why does the network has so
heavy traffic at 2 in the
morning ?
• When the IDS detects an attack it
inform the administrator with a
number of ways : email, sms,
pager
Honey Pots
• These are the sacrificed lamps of a network.
• Honey pots are software programs that when installed on a
computer they can simulate a number of systems i.e.:
• Windows NT Server.
• Unix Server.
• Apache Server
• Microsoft Exchange Server
• These simulated systems look unprotected from the outside
world (i.e. open ports, default accounts, known exploits.
• Hackers scanning for victims detect the simulated systems and
try to hack them. The honey pots allow hackers to enter but
record all their moves and inform the administrator.
• Honey pots can be installed either in the DMZ or in the local
network.

Recommended for you

Speaking of success
Speaking of successSpeaking of success
Speaking of success

This document summarizes an interview between David Wright and Bill Todd, an expert in sales, marketing, and motivation. Todd discusses five foundations for business and personal success: 1) having a positive attitude, 2) being professionally persistent, 3) injecting fun into work, 4) catching coworkers doing things right, and 5) having excellent customer service. He emphasizes the importance of having a positive attitude and embracing failure. The interview also discusses how incorporating fun into the workplace can boost productivity and success, using Southwest Airlines as an example of a company that does this well.

Mario Rosales Descentralización
Mario Rosales DescentralizaciónMario Rosales Descentralización
Mario Rosales Descentralización

Este documento describe la descentralización y el buen gobierno local en América Latina desde 1980 hasta la actualidad. Se ha avanzado en la descentralización política, administrativa y fiscal, con más municipios eligiendo autoridades de manera democrática y mayor gasto local. Sin embargo, los gobiernos locales siguen subordinados a los niveles centrales y enfrentan limitaciones como capacidad financiera limitada. El buen gobierno local se caracteriza por ser más participativo, horizontal y enfocado en alianzas, en contraste con las administraciones municipales tradicional

descentralizacióndesarrollo territorialcapacidades locales
14 Iker Casillas
14  Iker Casillas14  Iker Casillas
14 Iker Casillas

Iker Casillas es un arquero español que actualmente juega para el Real Madrid. Es considerado uno de los mejores arqueros de la historia, habiendo desarrollado toda su carrera en el Real Madrid, donde ganó numerosos títulos nacionales e internacionales. También jugó para la selección española, con la que ganó la Copa del Mundo en 2010.

Anti sniffing
• The general idea is to make the sniffing host reply to
a message that he should not be able to listen.
– For example creating a packet with a fake MAC address
but with the IP address of the sniffing host. If the host
acknowledges the packet the it is in promiscuous mode.
• Another way is to transmit unencrypted login details
for a fake (honey pot) server to the network. If
someone tries to use this account then someone is
sniffing the network.
• NOTE that using switches instead of hubs will make
a sniffers life much more difficult.
L0pht Antisniff : A windows based program to
detect sniffers
Antivirus
• Antivirus programs are known to most users.
• Such programs can be applied either as
– Standalone : Each copy of the program is
responsible of protecting the specific host on
which it is installed.
– Network based : Each copy of the program is
responsible of protecting the specific host, but they
are all managed by a Antivirus Server.
• Note that using an antivirus program without
updating its virus database does not provide
protection
Security Awareness
• No matter what security tools are going to
be used, if users do not know about security,
hacks are going to be common.
• There are many ways to educate users on the
issues of security:
– Use of seminars
– Use of posters
– Use of e-mail messages
– Enforce penalties

Recommended for you

Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"

Shortening the path to conversion has been an increasingly common trend within large media channels. Social media has been the most notable, with ‘Buy Now’ buttons cutting out the middle ground for social shoppers. This form of streamlining can be great for the advertiser and great for the consumer, but NMP’s head of strategy Damien Bennett will delve into the pros and cons advertisers should be aware of when approaching these methods of acquisition. Join Bennett for a session on the next wave of e-commerce and find out how it can keep a brand relevant while generating results

#pmildn
StrategicMaintenance7-28-07
StrategicMaintenance7-28-07StrategicMaintenance7-28-07
StrategicMaintenance7-28-07

The document provides an overview of new products, services, and enhancements from Rockwell Automation related to maintenance. Some highlights include: - New Ethernet Diagnostic Module and XM vibration modules to monitor equipment health. - Enhancements to intelligent motor control solutions to simplify maintenance. - RSMACC change management software adding verification for Rockwell Automation drives. - Acquisition of GEPA to expand connectivity to third-party devices. - New training courses and workstations on topics like RSLogix 5000 motion and EtherNet/IP.

Claves de la argumentacion
Claves de la argumentacionClaves de la argumentacion
Claves de la argumentacion

Este documento resume las claves de la argumentación según Anthony Weston. Weston sostiene que los estudiantes deben aprender por sí mismos, formar sus propias ideas y opiniones, e indagar, explicar y defender sus propias conclusiones en sus ensayos basados en argumentos. Según Weston, existen diferentes tipos de argumentos como los argumentos por analogía, de autoridad y deductivos. Estos se componen de premisas, que son afirmaciones sustentadas mediante razones o ejemplos.

Security Awareness
Penetration Testing and Security analyzers
• Security systems must be regularly tested for
flaws.
• These flaws are usually created from bugs in the
software programs, or from bad management (i.e.
bad passwords)
• The process of testing a system is called
penetration testing.
• The process uses a number of hacking / security
programs that test a system for a number of known
flaws and provide advice on securing these flaws
Microsoft Baseline Security Analyzer: Tests the systems
for known bugs
Additional Security Measures
• Encryption/ Decryption
• Digital Signatures / PKI
• AAA
• Security Protocols
• Physical Security
– The Jaguar Paradigm
– The polite Employees paradigm
• Security Policy

Recommended for you

1 distena 1 d alberto lopez
1 distena 1 d alberto lopez1 distena 1 d alberto lopez
1 distena 1 d alberto lopez

Este documento describe la cianita, un mineral silicato de aluminio con fórmula química Al2SiO5. La cianita se presenta en varios colores como blanco, azul o negro y tiene una dureza de 6.5 a lo largo del prisma y 4.5 perpendicular. Se utiliza principalmente en cerámica, como piedra ornamental y como aislante eléctrico.

Arte pop tr
Arte pop trArte pop tr
Arte pop tr

La pintura Still life #35 del artista Tom Wesselmann representa los productos y estilos de vida populares de la década de 1960, como bebidas gaseosas y aviones. La obra critica el consumismo y la publicidad excesiva que definieron la era. Muestra objetos cotidianos de una manera llamativa y de cómic para representar la cultura pop estadounidense de la época.

our products 8.9
our products   8.9our products   8.9
our products 8.9

This document summarizes Herbalife products and nutrition programs. It discusses Herbalife's growth and compliance with regulations. It notes that Australian/NZ diets are typically low in nutrients compared to Herbalife products. The document lists Herbalife shakes, supplements, and outer nutrition products like skin and hair care. It concludes with contact information for Eirene Hofstetter to learn more.

Questions ?
In Accordance
Meletis A. Belsis

More Related Content

What's hot

Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
kalyan kumar
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Computer Security
Computer SecurityComputer Security
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
leminhvuong
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
Erdo Deshiant Garnaby
 
Ethical Hacking : Why Do Hackers Attack And How ?
Ethical Hacking : Why Do Hackers Attack And How ?Ethical Hacking : Why Do Hackers Attack And How ?
Ethical Hacking : Why Do Hackers Attack And How ?
HBServices7
 
Hacking
HackingHacking
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
Dhrumil Panchal
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
chris zlatis
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
marada0033
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Professor Lili Saghafi
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
amiable_indian
 
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Suhail Khan
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
Sam Bowne
 

What's hot (20)

Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Ethical Hacking : Why Do Hackers Attack And How ?
Ethical Hacking : Why Do Hackers Attack And How ?Ethical Hacking : Why Do Hackers Attack And How ?
Ethical Hacking : Why Do Hackers Attack And How ?
 
Hacking
HackingHacking
Hacking
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 

Viewers also liked

Art.unefa.transdigital sybil caballerounefa
Art.unefa.transdigital sybil caballerounefaArt.unefa.transdigital sybil caballerounefa
Art.unefa.transdigital sybil caballerounefa
Sybil Caballero
 
Acerca de groupVision 2014
Acerca de groupVision 2014Acerca de groupVision 2014
Para que sirve el dropbox
Para que sirve el dropboxPara que sirve el dropbox
Para que sirve el dropbox
luzexita10
 
RTM (Remember The Milk)
RTM (Remember The Milk)RTM (Remember The Milk)
RTM (Remember The Milk)
倩如 周
 
Mass tourism in historic cities, the role of civil organizations in the case ...
Mass tourism in historic cities, the role of civil organizations in the case ...Mass tourism in historic cities, the role of civil organizations in the case ...
Mass tourism in historic cities, the role of civil organizations in the case ...
Bunt Arquitectura
 
Dossier Curso BIOCIDAS 01-12/13
Dossier Curso BIOCIDAS 01-12/13Dossier Curso BIOCIDAS 01-12/13
Dossier Curso BIOCIDAS 01-12/13
Jaime Sanabria Cansado
 
Muerte en el desvan 2012 13
Muerte   en  el  desvan   2012   13Muerte   en  el  desvan   2012   13
Muerte en el desvan 2012 13
ILLONOYS
 
Mailing List Matters
Mailing List MattersMailing List Matters
Mailing List Matters
click2mail
 
How you can become an Accessibility Superhero
How you can become an Accessibility SuperheroHow you can become an Accessibility Superhero
How you can become an Accessibility Superhero
robzonenet
 
Celebración 20º Aniversario Euriux Abogados
Celebración 20º Aniversario Euriux AbogadosCelebración 20º Aniversario Euriux Abogados
Celebración 20º Aniversario Euriux Abogados
Roberto Cerero Franco
 
Speaking of success
Speaking of successSpeaking of success
Speaking of success
Hasasenah Osama
 
Mario Rosales Descentralización
Mario Rosales DescentralizaciónMario Rosales Descentralización
Mario Rosales Descentralización
Nora Lis Cavuoto
 
14 Iker Casillas
14  Iker Casillas14  Iker Casillas
14 Iker Casillas
ELPABLITOHH
 
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
PerformanceIN
 
StrategicMaintenance7-28-07
StrategicMaintenance7-28-07StrategicMaintenance7-28-07
StrategicMaintenance7-28-07
Kevin Oswald
 
Claves de la argumentacion
Claves de la argumentacionClaves de la argumentacion
Claves de la argumentacion
Miguel Mosquera
 
1 distena 1 d alberto lopez
1 distena 1 d alberto lopez1 distena 1 d alberto lopez
1 distena 1 d alberto lopez
museocienciaiespedroespinosa
 
Arte pop tr
Arte pop trArte pop tr
Arte pop tr
carolita405
 
our products 8.9
our products   8.9our products   8.9
our products 8.9
Kon Hofstetter
 
Molecular hydrogen biomed-applications-888
Molecular hydrogen biomed-applications-888Molecular hydrogen biomed-applications-888
Molecular hydrogen biomed-applications-888
Morris Johnson
 

Viewers also liked (20)

Art.unefa.transdigital sybil caballerounefa
Art.unefa.transdigital sybil caballerounefaArt.unefa.transdigital sybil caballerounefa
Art.unefa.transdigital sybil caballerounefa
 
Acerca de groupVision 2014
Acerca de groupVision 2014Acerca de groupVision 2014
Acerca de groupVision 2014
 
Para que sirve el dropbox
Para que sirve el dropboxPara que sirve el dropbox
Para que sirve el dropbox
 
RTM (Remember The Milk)
RTM (Remember The Milk)RTM (Remember The Milk)
RTM (Remember The Milk)
 
Mass tourism in historic cities, the role of civil organizations in the case ...
Mass tourism in historic cities, the role of civil organizations in the case ...Mass tourism in historic cities, the role of civil organizations in the case ...
Mass tourism in historic cities, the role of civil organizations in the case ...
 
Dossier Curso BIOCIDAS 01-12/13
Dossier Curso BIOCIDAS 01-12/13Dossier Curso BIOCIDAS 01-12/13
Dossier Curso BIOCIDAS 01-12/13
 
Muerte en el desvan 2012 13
Muerte   en  el  desvan   2012   13Muerte   en  el  desvan   2012   13
Muerte en el desvan 2012 13
 
Mailing List Matters
Mailing List MattersMailing List Matters
Mailing List Matters
 
How you can become an Accessibility Superhero
How you can become an Accessibility SuperheroHow you can become an Accessibility Superhero
How you can become an Accessibility Superhero
 
Celebración 20º Aniversario Euriux Abogados
Celebración 20º Aniversario Euriux AbogadosCelebración 20º Aniversario Euriux Abogados
Celebración 20º Aniversario Euriux Abogados
 
Speaking of success
Speaking of successSpeaking of success
Speaking of success
 
Mario Rosales Descentralización
Mario Rosales DescentralizaciónMario Rosales Descentralización
Mario Rosales Descentralización
 
14 Iker Casillas
14  Iker Casillas14  Iker Casillas
14 Iker Casillas
 
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
Create - Day 1 - 17:00 - "Buy Buttons: Shortening the Path to Conversion"
 
StrategicMaintenance7-28-07
StrategicMaintenance7-28-07StrategicMaintenance7-28-07
StrategicMaintenance7-28-07
 
Claves de la argumentacion
Claves de la argumentacionClaves de la argumentacion
Claves de la argumentacion
 
1 distena 1 d alberto lopez
1 distena 1 d alberto lopez1 distena 1 d alberto lopez
1 distena 1 d alberto lopez
 
Arte pop tr
Arte pop trArte pop tr
Arte pop tr
 
our products 8.9
our products   8.9our products   8.9
our products 8.9
 
Molecular hydrogen biomed-applications-888
Molecular hydrogen biomed-applications-888Molecular hydrogen biomed-applications-888
Molecular hydrogen biomed-applications-888
 

Similar to Meletis Belsis - Introduction to information security

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
Jasleen Kaur
 
hacking lecture 3c.ppt
hacking lecture 3c.ppthacking lecture 3c.ppt
hacking lecture 3c.ppt
peter722626
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Computer Security
Computer SecurityComputer Security
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
RushikeshChikane2
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Nune SrinivasRao
 
Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
Ch14 security
Ch14   securityCh14   security
Ch14 security
Welly Dian Astika
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Network Security
Network SecurityNetwork Security
Network Security
Mohammed Adam
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 

Similar to Meletis Belsis - Introduction to information security (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
hacking lecture 3c.ppt
hacking lecture 3c.ppthacking lecture 3c.ppt
hacking lecture 3c.ppt
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Ch14 security
Ch14   securityCh14   security
Ch14 security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 

More from Meletis Belsis MPhil/MRes/BSc

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management ModelMeletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
Meletis Belsis MPhil/MRes/BSc
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
Meletis Belsis MPhil/MRes/BSc
 

More from Meletis Belsis MPhil/MRes/BSc (7)

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management ModelMeletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management Model
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
 

Recently uploaded

202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
ffg01100
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
Serva AppLabs
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Thiên Đường Tình Yêu
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
ubufe
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
taqyea
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99
 
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
taqyea
 
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
taqyea
 
Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
sivaraman163206
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
Bestdesign2hub
 
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptxSlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
NandakumarP24
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
taqyea
 
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
taqyea
 
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
taqyea
 
Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)
Kashyap J
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
exgf28
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
jom pom
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
byubyu7
 
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
taqyea
 
Common Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdfCommon Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdf
Serva AppLabs
 

Recently uploaded (20)

202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
 
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
 
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
一比一原版(bristol毕业证书)英国布里斯托大学毕业证如何办理
 
Steps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a companySteps involved in the implementation of EDI in a company
Steps involved in the implementation of EDI in a company
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
 
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptxSlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
 
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
 
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
 
Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
 
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
 
Common Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdfCommon Challenges in UI UX Design and How Services Can Help.pdf
Common Challenges in UI UX Design and How Services Can Help.pdf
 

Meletis Belsis - Introduction to information security

  • 1. What is Security ? Part I Meletis A. Belsis 2003, Athens, Greece Mediterranean College Computer Crime
  • 2. Setting the Scene • Security is one of the oldest problem that governments ,commercial organizations and almost every person has to face • The need of security exists since information became a valuable resource • Introduction of computer systems to business has escalated the security problem even more • The advances in networking and specially in distributed systems made the need for security even greater • The Computer Security Institute report, notes that in year 2003 computer crime costs where increased to more than 450 million dollars in the USA alone.
  • 3. Profiling Adversaries • Adversaries that target corporate system are numerous: • These can be general classified in the following categories: – Hackers – Employees (both malicious and unintentional) – Terrorists groups – Governments – Opposing Industries
  • 4. Security • So now we know that we need security. BUT what is security anyway ? • Many people fail to understand the meaning of the word. • Many corporations install an antivirus software, and/or a firewall and believe they are protected. Are they ?
  • 5. Security through obscurity • Consider some cases : – An internal employee wants to revenge the company and so publishes private corporate information on the NET. – The terrorist attack on the twin towers (in USA) had as a result many corporations to close. Why ? – An employee forgets his laptop into a café. This laptop contains all corporate private information. HOW CAN A FIREWALL PROTECT FROM THE PREVIOUS ?
  • 6. Security: easy to understand, difficult to implement “In the real world, security involves processes. It involves preventive technologies, but also detection and reaction processes, and an entire forensics system to hunt down and prosecute the guilty. Security is not a product; it itself is a process. …. ” Bruce Schneier (Secrets and Lies, Wiley and Sons Inc.)
  • 7. Security: easy to understand, difficult to implement • Security contains a number of tools , processes and techniques. • These in general cover three main requirements: – Confidentiality – Integrity – Availability • Depending on the security requirements a system has, one can concentrate only on one of the previous or all of them. • A new requirement enforced by the operation of e-markets is non-repudiation.
  • 8. Security: easy to understand, difficult to implement • Computer Security is difficult to implement due to the following: – The cost of implementing a security system should not exceed the value of the data to be secured. – Industries pay huge amount of money for industrial espionage. – Users feel that security is going to take their freedom away and so often they sabotage the security measures. – Computer prices have fallen dramatically and the number of hackers have been multiplied. – Security managers work under strict money and time schedule. Criminals do not have any time schedule and they do not need any specialised software. – Hackers are often cooperate with known criminals. That is why, total security is almost infeasible.
  • 9. The Art of Hacking Part II Attacking Corporate Systems
  • 10. Information Gathering • The first step to hacking is to gather as much information as possible for the target. • This information is later used to draw a map of the corporate network. • This map is used to define and design an attack methodology as well as identify the needed attack tools. • The extreme case of information gathering is called dumpster diving
  • 11. Information Gathering : Searching the Corporate Web site • Searching the corporate web site for information: – Statements like : “This site is best viewed with Internet Explorer” could uncover that the company uses Microsoft Web Server. – Email Addresses. These are used to identify user names. i.e. username@thecompany.com – Office Locations: Companies with office locations in different countries would probably use a VPN to interconnect. – Company News
  • 12. Information Gathering : Searching the Internet • Searching the WEB can provide valuable information – Using the link directive. i.e. link: www.somecompany.com provides information on the sites that link to the corporate web site. – Searching the greater WEB using the company’s name • Searching public WHOIS databases :Provide information about the domain name of the company. • Searching the ARIN Whois Database: Provide a database with all register IP addresses. • Searching technical forums using either the name of the administrator or the name of the company.
  • 13. Information Gathering :Being Polite….. • When the initial search has finished, it is now time to ASK the network itself. Believe it or not most networks are quite polite. – DNS Interrogation. It can be performed by simple using the nslookup program. – Using the PING command (ICMP Echo ). Can unveil hosts that are connected and are not protected by a firewall. – Using the TraceRoute command we can identify which is the IP of the router that connects the corporate network to the Internet.
  • 15. Information Gathering :Identify Running Services • Having a map of the internet hosts that are accessible from the internet, we must now identify the services that they offer and the operating system that is installed on each host. • Special programs like nmap and superscanner are used to interrogate each port in a host. • Detecting Services – The Scanner tries to open a connection to each port of the target host (By sending Syn messages) . – The open ports that respond show the services that are running. • Detecting the OS – The Scanner sends specific erroneous message to the ports. OS response with different messages.
  • 16. SuperScan: Windows Based Port Scanner
  • 17. Information Gathering :Scanning undetected • Many firewalls can detect these scanning attempts. So scanners use some alternate techniques: – Slow Scanning – Distributed Scanning – Half Open Connection – Fragmented packets – XMAS – FIN – FTP Bounce
  • 18. Password Cracking • Adversaries use two methods to attack passwords. – Brute force: Try all key combination in the password space. – Dictionary: Use a dictionary of known words and try each word along with their combinations. • These attacks can be performed either locally or remotely
  • 20. VIRUSES • Computer Viruses are categorised in: – Normal viruses – Trojan Horses – WORMS • Today there are more than 2,500 virus ready to be downloaded. • A user can get infected by: – Running a program – Opening an email – Visiting a web site (evil Trojan) – Opening a .doc file • Today virus creation and mutation centres can be freely downloaded from the Internet
  • 21. SubSeven: Visual Interface to Control Infected PC
  • 22. Denial of Service Attack (DoS) • The idea behind these attacks is to make the target system unavailable to its authorised users. • Typical attacks include but not limited to : – Ping O’ Death (sending packets of size greater that 65,535) – SYN Flooding Attack (Starting Many half-open connections) – Smurf Attack (sending requests to broadcast address with a spoofed IP address) – Domain Name Server DoS (Requesting DNS quires from multiple DNS Servers with a Spoofed IP
  • 26. Distributed Denial of Service (DDoS) • Hackers have used the distributed power internet offers. • Tools are now perform DoS attack from multiple hosts at the same time. • Examples are: – Tribal Flood Network – TFN2K – Stacheldraft
  • 27. Sniffing • Ethernet provides the ability to run a network card in Promiscuous mode. This allows the card to read any packet travelling on the network. • Sniffing software are using this to read all data transmitted in the local net. • Sniffers can be programmed to steal information associated only with specific protocols or programs. i.e. read all information from http packets only. • Some sniffers can be even programmed to transmit sniffed passwords back to the attacker. • The first and most used sniffer is the TCPDump .
  • 28. SnifferPro: A windows based Sniffer
  • 29. System Flaws and Exploits • Most systems today contain bugs. These are coming either from the system designers, implementers or the ones that manage the system. • Hackers can use these bugs to gain access to systems. • Examples of such are : – Default accounts – Poor User Accounts – Allowing outside anonymous Telnet connections to the Web Server – Allowing trusted connections – Buffer Overflows – Allowing Banners in services – Allowing NetBios over TCP/IP when not needed. • The Internet has a vast amount of software that test a given server for a number of such exploits.
  • 30. Simpsons’: A CGI vulnerability scanner
  • 31. Social Engineering • One of the oldest and easiest form of hacking. <Hacker is calling the administrator >  Hallo I am <<name of an employee>>. My user name <<user name as seen on email address>>. I am new to the company but I forgot my system password <<be very unhappy>> but my manager ask to find him some files. If I tell him that I forgot my password , I am afraid that he is going to fire me. Please help <<be persuasive>>>> <Administrator wants to help a fellow employee> Ok. Do not cry now. That is why we are here for. I am going to reset your password to newpassoword. Just do not forget it again. <Hacker thanks the polite employee>  Oh thank you so much. I am going to buy the coffee when we meet. You are a lifesaver…. (The scenario works even better is the hacker is a female and the administrator is a male.)
  • 32. IP Spoofing • Hackers usually change the IP address in their datagrams. • This happens for two reasons: – To avoid getting caught. – To bypass security tools, and systems that allow trusted connections. • Changing just the IP is called a blind attack, because the hacker never sees the response from the target. • In order to see the response the hacker has a number of ways: – Install a sniffer to the target network. – Use Source Routing – Use ICMP redirect – If both hacker and target are located on the same network use ARP spoofing. – DNS cache Poisoning. • Software programs like A4 proxy allows hackers to use a number of anonymous servers before they attack. Thus their real IP is almost untraceable.
  • 33. A4 Proxy : Using multiple anonymous proxies to hide the IP address
  • 34. The Next Step • So now I am in what am I doing next ?. 1. If you do not already have, try to gain root access. 2. Find and clear Log Files. 3. Install a Root Kit to ensure that you will have access in the future
  • 36. Is it possible ? • Total security is not feasible. • Systems must be secured depending on their value. • Security measures are applied according to the threat level a system has. • The first step is to understand the threats, to your corporate systems. This can be done by a risk analysis process. • In this stage remember that security is a business requirement
  • 37. Creating a DMZ zone • The first security measure is to seal the internal network from the outside world. • This is performed by developing a network called Demilitarized Zone (DMZ). • The DMZ contains all the servers that must be accessible from the outside world • NOTE that we must always assume that servers in the DMZ are going to be hacked at some point.
  • 38. Firewalls • Firewalls exist into types: – Packet filters: Are operating on the protocol level. They use a firewalling policy to allow the packet to pass or to drop the packet. – Proxy Servers: They operate at the application level. They are always located between the user requests and the servers response. Thus allowing us to enforce policies on which users can access the internet and on which port. • Packet Filters are usually located on the router, while Proxies are installed on computers • A network may use any number of the previous depending its size and architecture. • Known Firewalls are Checkpoint’s Firewall-1, Cisco PIX, Microsoft’s ISA.
  • 39. Intrusion Detection Systems (IDS) • Intrusion detection systems are used to detect attacks to the network and inform the administrator. • IDS are organised into two categories : – Signature based : They hold a database of known attacks and they test packets against the data stored in the database. – Anomaly based: They test the traffic against anomalies. I.e. why does the network has so heavy traffic at 2 in the morning ? • When the IDS detects an attack it inform the administrator with a number of ways : email, sms, pager
  • 40. Honey Pots • These are the sacrificed lamps of a network. • Honey pots are software programs that when installed on a computer they can simulate a number of systems i.e.: • Windows NT Server. • Unix Server. • Apache Server • Microsoft Exchange Server • These simulated systems look unprotected from the outside world (i.e. open ports, default accounts, known exploits. • Hackers scanning for victims detect the simulated systems and try to hack them. The honey pots allow hackers to enter but record all their moves and inform the administrator. • Honey pots can be installed either in the DMZ or in the local network.
  • 41. Anti sniffing • The general idea is to make the sniffing host reply to a message that he should not be able to listen. – For example creating a packet with a fake MAC address but with the IP address of the sniffing host. If the host acknowledges the packet the it is in promiscuous mode. • Another way is to transmit unencrypted login details for a fake (honey pot) server to the network. If someone tries to use this account then someone is sniffing the network. • NOTE that using switches instead of hubs will make a sniffers life much more difficult.
  • 42. L0pht Antisniff : A windows based program to detect sniffers
  • 43. Antivirus • Antivirus programs are known to most users. • Such programs can be applied either as – Standalone : Each copy of the program is responsible of protecting the specific host on which it is installed. – Network based : Each copy of the program is responsible of protecting the specific host, but they are all managed by a Antivirus Server. • Note that using an antivirus program without updating its virus database does not provide protection
  • 44. Security Awareness • No matter what security tools are going to be used, if users do not know about security, hacks are going to be common. • There are many ways to educate users on the issues of security: – Use of seminars – Use of posters – Use of e-mail messages – Enforce penalties
  • 46. Penetration Testing and Security analyzers • Security systems must be regularly tested for flaws. • These flaws are usually created from bugs in the software programs, or from bad management (i.e. bad passwords) • The process of testing a system is called penetration testing. • The process uses a number of hacking / security programs that test a system for a number of known flaws and provide advice on securing these flaws
  • 47. Microsoft Baseline Security Analyzer: Tests the systems for known bugs
  • 48. Additional Security Measures • Encryption/ Decryption • Digital Signatures / PKI • AAA • Security Protocols • Physical Security – The Jaguar Paradigm – The polite Employees paradigm • Security Policy