IT 602 Week 4- Slides
IT 602 Week 4- Slides
Infrastructure
Information Technology Infrastructure
• Credit Hours: 3
• Lecturer: Shafaq Nisar
1. Introduction
2. Computer Crimes
3. Risk Management
• Risk Response
• Exploits
4. Security Controls
• Attack vectores
5. Security Patterns
• Identity and Access management and Layered security
• Cryptography and Cryptographic Attacks
Introduction
Security Concepts
Introduction
• In the past, the hacker community was very keen on getting personal
or group exposure by hacking into a secured IT infrastructure. When
hackers proved that they could enter a secured system and made it
public, they gained respect from other hackers.
• While nowadays most hacking activity is done for other reasons, there
are still large communities of hackers that enjoy the game.
Creating Damage
• For instance, by holding data hostage and asking for ransom money,
stealing credit card data, changing account data in bank systems
OR
• or
• A nuclear power plant, could result in chaos and fear amongst citizens
Warfare
• Examples:
• Key loggers can send sensitive information like passwords to third
parties
• Network sniffers can show network packages that contain sensitive
information or replay a logon sequence
• Data on backup tapes outside of the building can get into wrong hands
• Disposed PCs or disks can get into the wrong hands
• Corrupt or dissatisfied staff can copy information
• End users are led to a malicious website that steals information (phishing)
Security Controls
CIA
❑Confidentiality
❑Integrity
❑Availability
CIA
• Confidentiality - prevents the intentional or unintentional
unauthorized disclosure of data
• Integrity - ensures that:
• No modifications to data are made by unauthorized staff or processes
• Data is consistent
• Malicious code
• Applications that, when activated, can cause network and server
overload, steal data and passwords, or erase data
• Worms
• Self-replicating programs that spread from one computer to
another, leaving infections as they travel
Attack Vectors
• Virus
• Self-replicating program fragment that attaches itself to a program
or file enabling it to spread from one computer to another, leaving
infections as it travels
• Trojan Horse
• Appears to be useful software but will actually do damage once
installed or run on your computer
Attack Vectors
• Lower the Time to Live (TTL) of the DNS records to be able to reroute traffic
to other servers when an attack occurs
• Phishing
• A technique of obtaining sensitive information
• The phisher sends an e-mail that appears to come from a legitimate
source, like a bank or credit card company, requesting
"verification" of information
• The e-mail usually contains a link to a fraudulent web page
Security Patterns
Identity and Access Management (IAM)
• The process of managing the identity of people and systems, and their
permissions
• Only the receiver has the ability to decrypt this data, transforming it
back to the original information
• Stream ciphers
• Create an arbitrarily long stream of key material
• Combines key stream with the plaintext bit-by-bit or character-by-
character
• Used when data is in transit over the network
• RC4 is a widely-used stream cipher
Cryptographic Attacks