Chapter 7. Network Security
Chapter 7. Network Security
NETWORK SECURITY
Security
Security is about the well-being (integrity) of
computer systems and data
Network security is the protection of data,
networks and computing power.
Network security refers to techniques for
ensuring that data stored in a computer
cannot be read or compromised by any
individuals without authorization.
2
Why Computer Security?
Computer security is required because most organizations
can be damaged by software (malicious software) or
intruders (hackers and crackers).
The damages include:
Damage to computer systems (hardware and software)
Damage of internal data/information
Loss of sensitive information to hostile parties.
Use of sensitive information to steal items of monetary
value.
Use of sensitive information against the organization's
customers
Damage to the reputation of an organization.
3 Losing the ability to use the system
Who is vulnerable?
Financial institutions and banks
Internet service providers (ISP)
Government and defense agencies
Social medias
Contractors to various government agencies
Multinational corporations
ANYONE ON THE NETWORK/INTERNET
4
Who is the most secured?
Availability Integrity
Availability
6
Confidentiality
The requirement that information maintained
by a computer system be accessible only by
authorized individuals.
Is the cover-up of information or resources.
The need for keeping information secret
arises from the use of computers in sensitive
fields such as government and financial
companies.
7
Integrity
Refers to the trustworthiness of data or resources
Integrity is preventing from unauthorized change.
Guarding against information modifications or
destruction.
Modification occurs when an unauthorized
users not only gains access to but changes a
resource such as data or the execution of a
running process.
8
Availability
Availability refers to the ability to use the
computer system and information resources at
desired times by authorized parties (24/7)
Availability is an important aspect of reliability
Unavailable system is at least as bad as no system
at all.
Interruption occurs when an unauthorized party
reduces the availability of or to a resource.
9
Security Threats
A computer security threat is any person,
act, or object that poses a danger to
computer security
A threat is a potential violation of security.
The effects of threats can be an affect on the
Confidentiality of data
Integrity of data
Availability of a system.
10
Causes of Security Threats
Physical threats:
weather, natural disaster, bombs, power failures,
terrorism, etc.
Human threats:
stealing, fraud, bribery, spying, sabotage,
accidents.
Software threats:
viruses, worms, Trojan horses, denial of service.
11
Types of Security Threats/Attacks
12
Fraud and Theft
An illegal taking of another’s physical,
electronic, or intellectual property
Insiders or outsiders can commit computer
fraud and theft.
Insiders (authorized users of a system) are
responsible for the majority of fraud.
13
Loss of Physical and Infrastructure Support
Power failures
Outages
a period when a power supply is not available
Spikes
contain very high voltages
Brownouts
reduction in the availability of electrical power
Disasters (natural and man-made)
14
Intruders
Intruders are usually trying to gain access to a
system, or to increased privileges to which they are
not entitled, often by obtaining the password for a
legitimate account.
Hacking: is any attempt to intrude or gain
unauthorized access to your system.
It can be via some operating system flaw or other
means.
It may or may not be for malicious purposes.
Cracking: is hacking conducted for malicious
purposes
15
Malicious Software
The most sophisticated threats to computer systems are
through malicious software, sometimes called malware.
Malware attempts to cause damage to, or consume the
resources of a target system.
Malicious code can attack personal computers and other
platforms.
Malicious Software refers to
Virus
Trojan Horse
Worm
Logic bomb
Trap door
Zombie
16
Virus
A small program that replicates and hides itself
inside other programs usually without your
knowledge
A virus is a program that can ”infect” other
programs by modification, as well as causing local
damage. Such modification includes a copy of the
virus, which can then spread further to other
programs.
The new copy of the virus is executed when a user
executes the new host program.
Similar to biological virus: Replicates and Spreads
17
Worm
Worm is an independent program that
spreads via network connections, typically
using either email, remote execution etc.
Worm reproduces by copying itself from one
computer to another and causes it to execute;
no user intervention is required
It can do as much harm as a virus
It often creates denial of service (DoS)
18
Trojan Horse
Seems to do something good but covertly doing
something else.
Secretly downloading a virus or some other type
of mal-ware on to your computers.
Popular mechanism for hiding a virus or a worm
Trojans can be employed by cyber-thieves and hackers
trying to gain access to users' systems
19
Spy-wares
A software that literally spies on what you do on your
computer.
Example: Simple Cookies and Key Loggers
Logic Bomb
one of oldest types of malicious software
code embedded in legitimate program (Trojan horse)
activated when specified conditions met
eg presence/absence of some file
particular date/time
particular user
particular series of keystrokes
when triggered typically damage system
modify/delete files/disks
20
Trap door/Backdoor
▪ Is a mechanism built into a system by its
designer
▪ A trapdoor usually gives the designer away to
sneak back into the system
▪ Gives the original designer a secret route into
the system
21
The effects of malicious software
22
Denial of Service Attack
DoS Attack:
Is blocking access of legitimate users to a
service.
It aims to inhibit the normal use of
communication facilities
Make a network service unusable, usually
by overloading the server or network
23
Types of Security
Physical security
Keeping rooms, computers locked
A combination of locks and alarms is an excellent
theft prevention system for computer
Surge protectors and uninterruptable power
supplies (UPS) are a low cost investment that can
save very costly equipment damage.
24
Physical security
25
Logical security
concerned with security of data stored on
devices connected to the network.
It involves
controlling passwords and password
policies
controlling access to data on servers
controlling access to backup tapes
preventing sources outside the network
26
from gaining access to the network
Security Solutions
There are a number of basic ways that a computer can be made
more secure.
Backups/disaster recovery
Encryption
Authentication
Validation
Data Protection
Anti-Viruses
Firewall
Intrusion Detection System (IDS)
27
Backups (redundancy/disaster recovery)
32
Validation
Validation describes the ability to provide
assurance that a sender’s identity is true and that a
message, document or file has not been modified.
Encryption can be used to provide validation by
making a digital fingerprint of the information
contained within a message.
A digital fingerprint is a code that uniquely
identifies a file or a message by reflecting the
content of the file with tremendous specificity.
33
Antiviruses
To prevent viruses from entering a system there
are two options.
▪ Isolate the machine
▪ disconnect it from the Internet or any other
network, not using floppy disks, CD-ROMs or
any other removable disks.
▪ This way one can be sure that no virus enters
into the computer.
34
Antiviruses
▪ Install an Antivirus program
Antivirus programs are designed to keep a
watch at all incoming files so that no
malicious code can enter the computer.
Antivirus is a software utility, which
searches the hard disk for viruses and
removes which are found.
35
Antiviruses
Most Antivirus programs include an auto-
update feature that enables the program to
download profiles of new viruses so that it
can check for the new viruses as soon as they
are discovered.
AVG, Norton, Kaspersky, AVAST and
McAfee are some of the examples of
Antivirus programs.
36
Functions of anti-viruses
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion and overwriting of infected objects
37
Firewall
A firewall is a security system consisting of
hardware and/or software that prevents
unauthorized network access
A firewall is a network component that provides
a security barrier between networks or network
segments.
Firewalls are generally set up to protect a
particular network or network component from
attack, or unauthorized penetration by outside
invaders.
38
Firewall
Internet DMZ
Web server, email
server, web proxy,
Firewall
Firewall
etc
Intranet
39
Firewall
40
Intrusion Detection System (IDS)
42
Network Security Tools
✓ Nessus- vulnerability scanners
✓ Wireshark-- packet sniffers
✓ Snort (IDS- - intrusion detection system
✓ Netcat-- Netcat)
✓ Metasploit -Framework (vulnerability exploitation tools)
✓ HPing2 -- packet crafting tools
✓ Kismet -- wireless tools or packet sniffers
✓ TCPDump --- packet sniffers
✓ Cain and Abel (password crackers or packet sniffers)
✓ John The Ripper (password crackers)
43