Track - Web Security - Unit 2
Track - Web Security - Unit 2
Terminology (1)
1
Terminology (2)
2
Threats (1)
3
Threats (2)
• 2004 Computer Security Institute (CSI) / Federal Bureau of Investigation (FBI) survey
found:
4
Table 2.1: Threats to Info. Security
• Causes include:
– Inexperience
– Improper training
– Incorrect assumptions
7
Acts of Human Error or Failure (2)
8
Questions
9
Deliberate Acts of Espionage/Trespass
10
Deliberate Acts of Theft
11
Source: Pixabay/OpenClipArt
Deliberate Software Attacks
12
Forces of Nature
13
Deviations in Quality of Service
15
Attacks (1)
16
Attacks (2)
• Malicious code: launching viruses, worms, Trojan horses, and active Web
scripts aiming to steal or destroy info.
• Backdoor: accessing system or network using known or previously
unknown mechanism
• Password crack: attempting to reverse calculate
a password
• Brute force: trying every possible combination of options of a password
• Dictionary: selects specific accounts to attack and uses commonly used
passwords (i.e., the
dictionary) to guide guesses
17
Attacks (3)
18
Attacks (4)
19
Attacks (5)
• Mail bombing: also a DoS; attacker routes large quantities of e-mail to
target
• Sniffers: program or device that monitors data traveling over network; can be
used both for legitimate purposes and for stealing information from a network
20
Attacks (6)
• Buffer overflow: application error where more data sent to a buffer than can be
handled
21
Table 2.2: Attack Replication Vectors
23
Source: Wikipedia
Denial-of-Service Attack
Man-in-the-Middle Attack
Source: Wikipedia 24
LAWS, Ethics Introduction
• Standards, guidelines, best practices: define what must be done to comply with
policy, how to do so
• Jurisdiction: a court’s right to hear a case if a wrong was committed in its
territory or against its citizens
• Long-arm jurisdiction: court’s ability to “reach far” and apply law (another
state, country)
• Case law: documentation about application of law in
various cases
• Liability: legal obligation beyond what’s required by law, increased if you fail to
take due care
• Due care: has been taken when employees know what is/isn’t acceptable,
what the consequences are
• Due diligence: sustained efforts to protect others
Types of Law
• Security policies are least expensive controls to execute but most difficult to
implement
• Policies • Standards
– Responsible Use of – University Computer
University Computing & Security Standards:
Network Resources
• Min. Computer Security
– Archives & Retention
• Critical Server Security
– Merchant Services & Use of
Credit Cards • Web Server Security
– Deployment, Use of Wireless • DB Server Security
Data Networks – Local Administrative
– Public Records Privilege Standard
– Data Policy • See http://ocio.osu.edu for more
– Personal Info Disclosure details
Policy Management
• Defense in depth
– Implementation of security in layers
– Requires that organization establish sufficient security controls and safeguards
so that an intruder faces multiple layers of controls
• Security perimeter
– Point at which an organization’s security protection ends and
outside world begins
– Does not apply to internal attacks from employee threats or on-site physical
threats
Security Technology Components