Chapter 1 - Introduction To Network Security
Chapter 1 - Introduction To Network Security
INFORMATION SECURITY
1
CHAPTER 1
[email protected]
Learning Outcomes
2
[email protected]
What is Security?
Operations security
Communications security
Network security
Information security
Challenges in Information Security
4
[email protected]
Challenges in Information Security (Cont)
5
Sophistication of attacks
Distributed attacks
Difficulties of patching
[email protected]
Challenges in Information Security (Cont)
6
[email protected]
Challenges in Information Security (Cont)
7
[email protected]
What is Information Security?
8
Information security:
1. Tasks of guarding digital information,
which is typically processed by a computer
(such as a personal computer), stored on a
magnetic or optical storage device (such
as a hard drive or DVD), and transmitted
over a network spacing
[email protected]
What is Information Security? (Cont)
9
[email protected]
What is Information Security? (Cont)
10
[email protected]
What is Information Security? (Cont)
11
[email protected]
Securing Components
Physical Security
Operational Security
Management and Policies
[email protected]
Physical Security
1. Integrity
Assurance that data is not altered or destroyed
in an unauthorized manner
2. Confidentiality
Protection of data from unauthorized
disclosure to a third party
3. Availability
Continuous operation of computing systems
[email protected]
Information Security Organisation
20
CERT/CC
US-CERT
SANS Institute
ISC2
FIPS
ICSA
[email protected]
Information Security Organisation (Cont.)
21
[email protected]
Security Issues in Information Security
22
Information Theft:
Attacks that allow an attacker to get data without ever
having to directly use your computers.
How:
dumpster diving
Used for:
to access bank account
[email protected]
Attack Definition (Cont)
24
Unauthorised disclosure :
An organization suspects some of its employees
of leaking confidential information to its
competitor.
It is also usually believed that its competitor
actually planted spies within the organization in
order to target and steal new product plan.
How:
planting virus, trojan horse
snooping software
[email protected]
Attack Definition (Cont)
25
Information warfare:
Is the use and management of information in
pursuit of a competitive advantage over an
opponent.
Remotely disabling target using software (e.g.;
television and radio disinformation)
Disinformation: false or inaccurate information
that is spread deliberately.
[email protected]
Attack Definition (Cont)
26
[email protected]
Attacker Profiles
27
Six categories:
Hackers
Crackers
Script kiddies
Spies
Employees
Cyberterrorists
[email protected]
Attacker Profiles (Cont.)
28
[email protected]
Attacker Profiles (Cont.)
29
Hacker
Person who uses advanced computer skills to attack computers,
but not with a malicious intent
Use their skills to expose security flaws
Crackers
Person who violates system security with malicious intent
Have advanced knowledge of computers and networks and the
skills to exploit them
Destroy data, deny legitimate users of service, or otherwise
cause serious problems on computers and networks
[email protected]
Attacker Profiles (Cont.)
30
Script Kiddies
Break into computers to create damage
Are unskilled users
Download automated hacking software from Web sites and use it
to break into computers
Tend to be young computer users with almost unlimited amounts of
leisure time, which they can use to attack systems
Spies
Person hired to break into a computer and steal information
Do not randomly search for unsecured computers to attack
Hired to attack a specific computer that contains sensitive
information
[email protected]
Attacker Profiles (Cont.)
31
Employees
One of the largest information security threats to business
Employees break into their companys computer for these reasons:
To show the company a weakness in their security
To say, Im smarter than all of you
For money
Cyberterrorists
Experts fear terrorists will attack the network and computer
infrastructure to cause panic
Cyberterrorists motivation may be defined as ideology, or attacking for
the sake of their principles or beliefs
One of the targets highest on the list of cyberterrorists is the Internet
itself
[email protected]
Attacker Profiles (Cont.)
32
Employees
One of the largest information security threats to business
Employees break into their companys computer for these reasons:
To show the company a weakness in their security
To say, Im smarter than all of you
For money
Cyberterrorists
Experts fear terrorists will attack the network and computer
infrastructure to cause panic
Cyberterrorists motivation may be defined as ideology, or attacking for
the sake of their principles or beliefs
One of the targets highest on the list of cyberterrorists is the Internet
itself
[email protected]
Basic Attacks
33
[email protected]
Basic Attacks (Cont)
34
Social Engineering
Easiest way to attack a computer system requires almost no technical
ability and is usually highly successful
Social engineering relies on tricking and deceiving someone to access a
system
Social engineering is not limited to telephone calls or dated credentials
Password Guessing
Password: secret combination of letters and numbers that validates or
authenticates a user
Passwords are used with usernames to log on to a system using a
dialog box
Attackers attempt to exploit weak passwords by password guessing
[email protected]
Basic Attacks (Cont)
35
Social Engineering
Dumpster diving: digging through trash receptacles to find computer
manuals, printouts, or password lists that have been thrown away
Phishing: sending people electronic requests for information that
appear to come from a valid source
Password Guessing
Brute force: attacker attempts to create every possible password
combination by changing one character at a time, using each newly
generated password to access the system
Dictionary attack: takes each word from a dictionary and encodes it
(hashing) in the same way the computer encodes a users password
[email protected]
Basic Attacks (Cont)
36
Weak Keys
Cryptography:
Science of transforming information so it is secure while being
transmitted or stored
Encryption:
changing the original text to a secret message using cryptography
Mathematical Attacks
Cryptanalysis: process of attempting to break an encrypted
message
Mathematical attack: analyzes characters in an encrypted text to
discover the keys and decrypt
the data
[email protected]
Basic Attacks (Cont)
37
Man-in-the-Middle Attacks
Passive attack: attacker captures sensitive data being
transmitted and sends it to the original recipient without his
presence being detected
Active attack: contents of the message are intercepted and
altered before being sent on
Replay
Similar to an active man-in-the-middle attack
Whereas an active man-in-the-middle attack changes the
contents of a message before sending it on, a replay attack only
captures the message and then sends it again later
[email protected]
Basic Attacks (Cont)
38
TCP/IP Hijacking
With wired networks, TCP/IP hijacking uses spoofing, which is the
act of pretending to be the legitimate owner
One particular type of spoofing is Address Resolution Protocol
(ARP) spoofing
In ARP spoofing, a hacker changes the table so packets are
redirected to his computer
Denial of Service
attempts to make a server or other network device unavailable by
flooding it with requests
After a short time, the server runs out of resources and can no
longer function
[email protected]
Malicious Code - Malware
39
Worms
Logic bombs
Trojan horses
Back doors
[email protected]
Malicious Code Malware (Cont)
40
Viruses
Programs that secretly attach to another document or program and
execute when that document or program is opened
Worms
A virus needs the user to perform some type of action, such as
starting a program or reading an e-mail message, to start the
infection
Logic Bombs
Computer program that lies dormant until triggered by a specific
event, for example:
A certain date being reached on the system calendar
A persons rank in an organization dropping below a specified level
[email protected]
Malicious Code Malware (Cont)
41
Trojan Horses
Programs that hide their true intent and then reveals themselves
when activated
Might disguise themselves as free calendar programs or other
interesting software
Back Doors
Secret entrances into a computer of which the user is unaware
Many viruses and worms install a back door allowing a remote
user to access a computer without the legitimate users
knowledge or permission
[email protected]
Security Threats
42
Categories::
Data disclosure:
Exposure of data to third parties. Key point to consider is
whether the disclosure is relevant and necessary.
Data modification:
A modification attack is an attempt to modify information
that an attacker is not authorized to modify.
Data availability:
Describe products and services that that continues to be
available at a required level of performance in situations
ranging from normal through "disastrous."
[email protected]
Security Threats (Cont)
43
Activities::
Hacking:
Computer hacking is the practice of modifying computer
hardware and software to accomplish the hackers goal.
Cracking:
Activities to breaks into someone else's computer system
or bypasses passwords or licenses in computer programs.
[email protected]
Security Threats (Cont)
44
Spoofing:
A method of attacking a computer program, in which
the program is modified so as to appear to be working
normally when in reality it has been modified with the
purpose to circumvent security mechanisms.
Sniffing:
A method that a network device, like the Nintendo DS,
uses to identify available wireless networks in the area.
[email protected]
Information Security Careers
45
[email protected]
Information Security Careers (Cont)
46
[email protected]
Summary
47