The document provides an overview of network security threats and countermeasures. It discusses various types of threats like viruses, denial of service attacks, and spoofing. It recommends a defense-in-depth approach using multiple layers of security like firewalls, intrusion detection systems, antivirus software, and encryption. Specific security measures are examined, including network monitoring, access control, and securing servers and applications.
The document provides information on vulnerability assessment and penetration testing. It defines vulnerability assessment as a systematic approach to finding security issues in a network or system through manual and automated scanning. Penetration testing involves exploring and exploiting any vulnerabilities that are found to confirm their existence and potential damage. The document outlines the types of testing as blackbox, graybox, and whitebox. It also lists some common tools used for testing like Nmap, ZAP, Nikto, WPScan, and HostedScan. Finally, it provides examples of specific vulnerabilities found and their solutions, such as outdated themes/plugins, backup files being accessible, and SQL injection issues.
The document discusses various cybersecurity attack vectors and how organizations can protect themselves. It outlines common attack methods like ransomware, malicious code delivery, social engineering, and phishing. It then recommends that organizations conduct regular security audits, establish governance policies, create an incident response plan, and provide cybersecurity education to employees. The document promotes cybersecurity services from Future Point of View including vulnerability testing, forensics, and training to help organizations enhance their protections.
This document discusses computer worms, including how they work, types of worms, and examples of major worms. It defines worms as programs that replicate themselves across a network by exploiting security vulnerabilities. The document covers worm target discovery, propagation, activation methods, payloads, examples like Morris worm, Code Red, Nimda, SQL Slammer, and Sobig.f, as well as prevention techniques and current research focus areas.
Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the country’s national security itself.
Presentation of Social Engineering - The Art of Human Hackingmsaksida
Nowadays if you want to hack a corporation or damage a personal "enemy" fast, Social Engineering techniques work every time and more often than not it works the first time. Within the presentation you will be able to learn what social engineering is, types of social engineering and related threats.
Cyber security involves protecting computers, networks, and data from malicious attacks. The document discusses how the global cyber threat is rising, with over 7 billion records exposed in data breaches in the first nine months of 2019. It also outlines frameworks and guidance from organizations like NIST and ACSC to help combat cyber threats. The types of cyber threats include cybercrime, cyber attacks, and cyberterrorism. Common methods that malicious actors use to gain control of systems include malware, SQL injection, phishing, and man-in-the-middle attacks. The document provides examples of recent cyber threats like romance scams and concludes with cyber safety tips.
Social engineering and phishing attacks are the largest threats to companies, as attackers are increasingly relying on tricking users to gain access to systems. Mobile malware and internet-connected devices are also growing vulnerabilities, as more business is conducted and data is stored on mobile and cloud systems. Companies need to invest in protections against these emerging threats like social engineering, mobile malware, cloud vulnerabilities, and weaknesses in the growing Internet of Things. Staying ahead of changing attack types can help reduce vulnerabilities, but protecting against current and future risks is a ongoing challenge.
This document discusses phishing, which is an attempt to acquire personal information like usernames, passwords, and credit card details under false pretenses. It covers common phishing techniques like link manipulation and website forgery. It also discusses types of phishing like deceptive, malware-based, and DNS-based phishing. The document outlines causes of phishing like misleading emails and lack of user awareness. It proposes both technical and social approaches to anti-phishing and examines the effects of phishing like identity theft and financial loss. Finally, it recommends defenses like education and detection tools to counter phishing attacks.
-The project "Strengthening European Network Centres of Excellence in Cybercrime" (SENTER
project, Reference No HOME/2014/ISFP/AG/7170) is funded by the European Commission under
Internal Security Fund-Police 2014-2020 (ISFP). The main goal of the project is to create a single
point of Reference for EU national Cybercrime Centres of Excellence (CoE) and develop further the
Network of national CoE into well-defined and well-functioning community. More details here: http://www.senter-project.eu/
5 biggest cyber attacks and most famous hackersRoman Antonov
A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
The document discusses cyber security. It introduces cyber security and the need for it to protect internet-connected systems, hardware, software and data from cyber attacks. It describes common cyber security threats like ransomware, malware, social engineering and phishing. It also discusses cyber security vendors, advantages of cyber security in defending against hacks and viruses, disadvantages like slowing systems down, and career opportunities in the field. The conclusion states that the only truly secure system is one that is turned off.
Slides for my lecture "Software security: vulnerabilities, exploits and
possible countermeasures" I had been giving for Samsung Electronics in Suwon, Korea (South).
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
This document summarizes different types of cyber attacks. It describes web-based attacks like SQL injection, cross-site scripting, and denial of service attacks. It also outlines system-based attacks such as viruses, worms, and trojan horses. Additionally, it covers methods that can assist attacks, including spoofing, sniffing, and port scanning. The goal of the document is to provide an overview of common cyber attacks and threats that exist in the cyber world.
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.
The document discusses the process and importance of conducting a security audit. It summarizes that a security audit systematically evaluates a company's information security by measuring how well it conforms to established criteria. A thorough audit assesses physical security, software, information handling processes, and user practices. It also examines site methodologies, policies, risks, and ensures ongoing security through remediation and compliance checks.
This document discusses using machine learning and deep learning for malware detection. It notes that over 350,000 new malware are created daily, posing a significant threat. Traditional signature-based detection has limitations in detecting new malware. The document reviews research applying machine learning and deep learning techniques to malware detection using static and dynamic analysis of features. It then describes the authors' approach of using opcode frequency models with random forest and neural networks to classify files, achieving 97-98% precision and recall on a test set. The conclusion is that machine learning and deep learning can help address limitations of traditional approaches by enabling detection of new malware.
Cybersecurity involves protecting individuals, businesses, and critical infrastructure from threats arising from computer and internet use. It addresses both external attacks by remote agents exploiting vulnerabilities, as well as insider threats from valid users. Cybersecurity deals with a range of technical and human factors, as vulnerabilities usually stem from a mix of these. Key concerns include malware, cyber attacks aiming to cause damage or steal data, and accidental incidents that can also lead to losses.
Introduction To Exploitation & MetasploitRaghav Bisht
Penetration testing involves evaluating systems or networks using malicious techniques to identify security vulnerabilities. It is done by exploiting vulnerabilities to gain unauthorized access to sensitive information. Common vulnerabilities arise from design errors, poor configuration, and human error. Penetration testing is conducted to secure government data transfers, protect brands, and find vulnerabilities in applications, operating systems, databases, and network equipment. Metasploit is an open-source framework used for hacking applications and operating systems that contains exploits, payloads, and modules. Msfconsole is an interface used to launch attacks and create listeners in Metasploit.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
The document discusses computer security, outlining potential vulnerabilities, types of computer crimes, security requirements, and malicious programs. It notes that financial institutions, internet service providers, government agencies, and multinational corporations are all at risk of computer security breaches. Computer security aims to protect information and property from theft, corruption or disaster while maintaining accessibility for intended users, and requires secrecy, integrity, availability, authenticity, non-repudiation and access control. Common computer crimes include hacking, phishing, viruses, and identity theft.
This document discusses primary computer storage, including RAM and ROM. RAM (Random Access Memory) is the main memory that allows both reading and writing of data and programs. It stores temporary instructions and data for processing and uses more power. ROM (Read-Only Memory) permanently stores programs and data even when powered off, can only be written by the manufacturer, and uses less power. The document outlines the functions and differences between RAM and ROM.
Cyber security involves protecting computers, networks, and data from malicious attacks. The document discusses how the global cyber threat is rising, with over 7 billion records exposed in data breaches in the first nine months of 2019. It also outlines frameworks and guidance from organizations like NIST and ACSC to help combat cyber threats. The types of cyber threats include cybercrime, cyber attacks, and cyberterrorism. Common methods that malicious actors use to gain control of systems include malware, SQL injection, phishing, and man-in-the-middle attacks. The document provides examples of recent cyber threats like romance scams and concludes with cyber safety tips.
Social engineering and phishing attacks are the largest threats to companies, as attackers are increasingly relying on tricking users to gain access to systems. Mobile malware and internet-connected devices are also growing vulnerabilities, as more business is conducted and data is stored on mobile and cloud systems. Companies need to invest in protections against these emerging threats like social engineering, mobile malware, cloud vulnerabilities, and weaknesses in the growing Internet of Things. Staying ahead of changing attack types can help reduce vulnerabilities, but protecting against current and future risks is a ongoing challenge.
This document discusses phishing, which is an attempt to acquire personal information like usernames, passwords, and credit card details under false pretenses. It covers common phishing techniques like link manipulation and website forgery. It also discusses types of phishing like deceptive, malware-based, and DNS-based phishing. The document outlines causes of phishing like misleading emails and lack of user awareness. It proposes both technical and social approaches to anti-phishing and examines the effects of phishing like identity theft and financial loss. Finally, it recommends defenses like education and detection tools to counter phishing attacks.
-The project "Strengthening European Network Centres of Excellence in Cybercrime" (SENTER
project, Reference No HOME/2014/ISFP/AG/7170) is funded by the European Commission under
Internal Security Fund-Police 2014-2020 (ISFP). The main goal of the project is to create a single
point of Reference for EU national Cybercrime Centres of Excellence (CoE) and develop further the
Network of national CoE into well-defined and well-functioning community. More details here: http://www.senter-project.eu/
5 biggest cyber attacks and most famous hackersRoman Antonov
A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
The document discusses cyber security. It introduces cyber security and the need for it to protect internet-connected systems, hardware, software and data from cyber attacks. It describes common cyber security threats like ransomware, malware, social engineering and phishing. It also discusses cyber security vendors, advantages of cyber security in defending against hacks and viruses, disadvantages like slowing systems down, and career opportunities in the field. The conclusion states that the only truly secure system is one that is turned off.
Slides for my lecture "Software security: vulnerabilities, exploits and
possible countermeasures" I had been giving for Samsung Electronics in Suwon, Korea (South).
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
This document summarizes different types of cyber attacks. It describes web-based attacks like SQL injection, cross-site scripting, and denial of service attacks. It also outlines system-based attacks such as viruses, worms, and trojan horses. Additionally, it covers methods that can assist attacks, including spoofing, sniffing, and port scanning. The goal of the document is to provide an overview of common cyber attacks and threats that exist in the cyber world.
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.
The document discusses the process and importance of conducting a security audit. It summarizes that a security audit systematically evaluates a company's information security by measuring how well it conforms to established criteria. A thorough audit assesses physical security, software, information handling processes, and user practices. It also examines site methodologies, policies, risks, and ensures ongoing security through remediation and compliance checks.
This document discusses using machine learning and deep learning for malware detection. It notes that over 350,000 new malware are created daily, posing a significant threat. Traditional signature-based detection has limitations in detecting new malware. The document reviews research applying machine learning and deep learning techniques to malware detection using static and dynamic analysis of features. It then describes the authors' approach of using opcode frequency models with random forest and neural networks to classify files, achieving 97-98% precision and recall on a test set. The conclusion is that machine learning and deep learning can help address limitations of traditional approaches by enabling detection of new malware.
Cybersecurity involves protecting individuals, businesses, and critical infrastructure from threats arising from computer and internet use. It addresses both external attacks by remote agents exploiting vulnerabilities, as well as insider threats from valid users. Cybersecurity deals with a range of technical and human factors, as vulnerabilities usually stem from a mix of these. Key concerns include malware, cyber attacks aiming to cause damage or steal data, and accidental incidents that can also lead to losses.
Introduction To Exploitation & MetasploitRaghav Bisht
Penetration testing involves evaluating systems or networks using malicious techniques to identify security vulnerabilities. It is done by exploiting vulnerabilities to gain unauthorized access to sensitive information. Common vulnerabilities arise from design errors, poor configuration, and human error. Penetration testing is conducted to secure government data transfers, protect brands, and find vulnerabilities in applications, operating systems, databases, and network equipment. Metasploit is an open-source framework used for hacking applications and operating systems that contains exploits, payloads, and modules. Msfconsole is an interface used to launch attacks and create listeners in Metasploit.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
The document discusses computer security, outlining potential vulnerabilities, types of computer crimes, security requirements, and malicious programs. It notes that financial institutions, internet service providers, government agencies, and multinational corporations are all at risk of computer security breaches. Computer security aims to protect information and property from theft, corruption or disaster while maintaining accessibility for intended users, and requires secrecy, integrity, availability, authenticity, non-repudiation and access control. Common computer crimes include hacking, phishing, viruses, and identity theft.
This document discusses primary computer storage, including RAM and ROM. RAM (Random Access Memory) is the main memory that allows both reading and writing of data and programs. It stores temporary instructions and data for processing and uses more power. ROM (Read-Only Memory) permanently stores programs and data even when powered off, can only be written by the manufacturer, and uses less power. The document outlines the functions and differences between RAM and ROM.
This document defines key concepts related to information security. It discusses what information and information security are, as well as the multilayered nature of security. The main threats to information security are described as inadvertent acts, deliberate acts, natural disasters, technical failures, and management failure. Specific types of malware like viruses, worms, trojans, and spyware are explained. The document also differentiates between hackers and crackers and emphasizes the importance of using antivirus software to protect against threats.
The document provides an overview of secondary storage, including its advantages and disadvantages. It discusses the evolution of secondary storage devices and the main types, which include magnetic tape, magnetic disks like hard disks and floppy disks, and optical disks like CDs, DVDs, and their variations. Secondary storage is used to overcome limitations of primary storage and provide virtually unlimited storage capacity to store large volumes of data permanently or for backup purposes.
This document presents information on primary and secondary storage devices. It discusses random access memory (RAM), which includes dynamic RAM and static RAM, as the primary storage device. It also discusses various types of read-only memory (ROM) like PROM, EPROM, and EEPROM. The document outlines different secondary storage devices such as hard disks, floppy disks, compact disks, tape drives, and USB storage. It provides details on the storage capacity, usage, and key features of each secondary storage type.
3 Most Common Threats Of Information SecurityAna Meskovska
The document discusses the most common threats to information security, including malware, email threats, spam, social engineering (phishing), and the top 10 internet threats. It provides details on each threat such as possible consequences and recommended protections. Some key threats mentioned are viruses, worms, Trojan horses, spyware, phishing scams seeking personal/financial information, and social engineering attacks. The document stresses the importance of user education, strong passwords/authentication, antivirus software, and caution when sharing information or opening email attachments.
This document provides an overview of information security. It defines information and discusses its lifecycle and types. It then defines information security and its key components - people, processes, and technology. It discusses threats to information security and introduces ISO 27001, the international standard for information security management. The document outlines ISO 27001's history, features, PDCA process, domains, and some key control clauses around information security policy, organization of information security, asset management, and human resources security.
This document discusses network security. It begins by defining network security and explaining the three main types: physical, technical, and administrative security controls. It then defines vulnerabilities as weaknesses that can be exploited by threats such as unauthorized access or data modification. Common network attacks are described as reconnaissance, access, denial of service, and worms/viruses. Emerging attack trends include malware, phishing, ransomware, denial of service attacks, man-in-the-middle attacks, cryptojacking, SQL injection, and zero-day exploits. The document aims to help students understand vulnerabilities, threats, attacks, and trends regarding network security.
Network security protects networks and data from threats through hardware, software, and processes. It involves firewalls, network segmentation, remote access VPNs, email security, data loss prevention, intrusion prevention systems, and sandboxing to control network traffic and protect against cyber attacks like malware, phishing, and denial of service attacks. Cyber attacks can disable computers, steal data, or use compromised computers to launch additional attacks through various methods.
This document provides an overview of computer security concepts. It discusses threats like viruses, worms, bots and rootkits that can compromise security. It defines key terms like assets, attacks, intruders and vulnerabilities. The CIA triad of confidentiality, integrity and availability is explained as the standard for information security. Common attacks are also outlined, such as password cracking, man-in-the-middle, spoofing and social engineering. Malware is defined and the characteristics of viruses, worms and trojans are described.
This document discusses information system security. It defines information system security as collecting activities to protect information systems and stored data. It outlines four components of an IT security policy framework: policies, standards, procedures, and guidelines. It also discusses vulnerabilities, threats, attacks, and trends in attacks. Vulnerabilities refer to weaknesses, while threats use tools and scripts to launch attacks like reconnaissance, access, denial of service, and viruses/Trojans. Common attacks trends include malware, phishing, ransomware, denial of service, man-in-the-middle, cryptojacking, SQL injection, and zero-day exploits.
This document discusses why information security is needed for organizations. It provides four key functions of information security: 1) protecting the organization's ability to function, 2) enabling safe application operation, 3) protecting data, and 4) safeguarding technology assets. It then discusses various threats to information security, including intellectual property breaches, software attacks like viruses and worms, service disruptions, unauthorized access, natural disasters, human error, extortion, sabotage, theft, and technical failures. It concludes with discussing secure software development and common security problems.
In my college i will created this presentation for seminar with my own interest so this will help you for your career.Please you also create any presentation and upload it,Thank you.
This document discusses types of cyber attacks, including web-based attacks like password guessing, man-in-the-middle attacks, and phishing. It also discusses system-based attacks such as spoofing, backdoors, viruses, worms, and Trojan horses. Password guessing attacks can include brute force or dictionary attacks. Man-in-the-middle attacks intercept communications. Phishing involves deception to steal personal information. Spoofing modifies packet headers to hide identity. Backdoors bypass security checks. Viruses and worms can self-replicate and spread. Trojan horses claim to do one thing but actually cause harm.
This document discusses computer system security and various types of cyber attacks. It begins by defining computer security and explaining the components of a computer system that need protection, such as hardware, firmware and software. It then describes different types of cyber attacks including web-based attacks like SQL injection, session hijacking and phishing. It also discusses system-based attacks like viruses, worms and Trojans. The document explains control hijacking attacks, defenses against them using techniques like ASLR, and runtime defenses such as stack canaries. It provides examples of advanced attacks like return-oriented programming and heap spray attacks.
Unit II discusses cyber crime, including the methods and taxonomy of cyber attacks. The cyber world refers to the online environment where people interact through digital media like sharing and consuming content. Cyber crime involves any criminal activity using computers or networks and can be for profit, to damage systems, or use computers to spread illegal materials. Cyber attacks are classified based on the responsible agent as cyber warfare by states, cyber crime by individuals/organizations, or cyber terrorism. Common cyber attacks include injection attacks, DNS spoofing, and denial of service attacks on websites, as well as viruses, worms, and trojans on systems. Reasons for cyber crime include the ease of accessing systems, ability to store data in small spaces, complexity of systems, negligence
A presentation I am giving this evening, as a guest speaker, invited by the Wisconsin Union Directorate, on the topics of cybersecurity, hacking, and privacy. The presentation covers some timely topics, such as: Hacking, Botnets, Deep Web, Target Stores Data Breach, Bitcoin and Ransomware. The presentation is designed to educate, stimulate conversation and entertain and is open to all students, faculty and staff of UW-Madison, who are interested in learning more about computer security and IT threats.
1. The document discusses the topic of ethical hacking and defines it as "methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments."
2. Ethical hackers are independent computer security professionals who break into computer systems to evaluate security without damaging systems or stealing information.
3. The document outlines different types of attacks ethical hackers may perform such as insider attacks, outsider attacks, and social engineering attacks to evaluate a target system's security and vulnerabilities.
A Presentation On Basic Network Security And Viruses For College Level. Basics on Networking, Network Security, Virus, Spyware, Vulnerability, Hacking And Indian Laws To Prevent Hacking
Internet security involves establishing rules and measures to protect against attacks over the Internet. It relates to securing browsers and network security across operating systems. The objective is to secure the exchange of information because the Internet represents an insecure channel with risks like phishing. Common signs of a compromised system include slow connections, popups, strange behavior, and inability to download updates. Malicious software, denial-of-service attacks, and phishing are major security threats. Defenses include antivirus software, encryption, secure connections, and multi-factor authentication.
Computer and network security helps protect data and equipment from internal and external threats. Internal threats come from inside an organization from users and employees, while external threats come from outside the organization from unauthorized users. Security threats can physically damage equipment or steal and corrupt data. Malware like viruses, worms, Trojans, and spyware are common security threats that can be installed without user knowledge and harm computers. Organizations implement security policies, passwords, and other measures to protect against these threats.
The document discusses e-commerce security challenges and developments over the past decade due to widespread computerization and growing networking. It covers network and internet security issues like confidentiality, authentication, integrity, and key management. It describes security threats like unauthorized access, data theft, and denial of service attacks. It also discusses encryption techniques like symmetric and asymmetric encryption, and cryptography concepts like public and private keys, digital signatures, and digital certificates.
This presentation focus on cybersecurity and mainly four parts 1) Introduction to cybersecurity tools and cyber attack 2) Cybersecurity roles, processes and operating system security 3) Cybersecurity compliance, Framework and system administration 4) Network security and Database
2. Why do we need
Security?
Increased reliance on Information technology
with or with out the use of networks.
The use of IT has changed our lives drastically.
We depend on E-mail, Internet banking, and
several other governmental activities that use
IT
Increased use of E-Commerce and the World
wide web on the Internet as a vast repository of
various kinds of information (immigration
databases, flight tickets, stock markets etc.)
3. History
In 1983, Kevin Mitnick did an intrusion on a
Pentagon’s computer
Robert Tappan Morris created the first worm
and sent it from MIT to the web and caused
$50,000 of damages
In 1994, Vladimir Levin intruded in an
American bank computer and stole 10 millions
dollars
Jonathan James “c0mrade”, 16 years old,
infiltrated a NASA computer in 1999 and had
access to data worth 1,7 millions dollars
4. Definition
Branch of Computer Technology that
includes protection of information and
property from theft, corruption, or natural
disaster allowing the information and
property to remain accessible and productive
to its intended users.
It deals with the prevention and detection of
unauthorised actions by users of a computer
system.
5. Prevention : ~ Helps to stop unauthorized
users (known as “intruders”) from accessing
any part of computer.
Detection : ~ Helps to determine whether or
not anyone attempted to break into your
system, if they were successful, and what they
may have done.
Re-action: ~ Ensure future security needs.
7. Confidentiality
Confidentiality is the avoidance of the
unauthorized disclosure of information.
– confidentiality involves the protection of data,
providing access for those who are allowed to see
it while disallowing others from learning anything
about its content.
Tools for Confidentiality
1. Encryption
2. Access Control
3. Authentication
4. Authorization
8. Integrity
Integrity:the property that information
has not be altered in an unauthorized
way.
Tools of Integrity
– Backups
– Checksums
– Data correcting codes
9. Availability
The property that information is accessible and
modifiable in a timely fashion by those
authorized to do so.
Tools of Availability
– Physical protections
– Computational redundancies
11. Some common attacks
Network Attacks
Packet sniffing, man-in-the-middle, Denial of
Service attack, Identity Spoofing ,Password-
based attacks, Session Hijacking.
Web attacks
Phishing, SQL Injection, Cross Site Scripting.
Software attacks
Malware: Virus, Trojan, Worms, Root kits,
Backdoors.
12. Network Attacks
Packet Sniffing
Internet traffic consists of data “packets”,
and these can be “sniffed” means
captured.
Leads to other attacks such as
password sniffing, cookie
stealing ,Session Hijacking.
Man in the Middle
Insert a router in the path between
client and server, and change the
packets as they pass through
12
13. Denial of Service(DoS): A special kind
of Internet attack aimed at large
websites.
Flood a computer or the entire
network with traffic until a
shutdown occurs because of the
overload.
Block traffic, which results in a loss
of access to network resources by
authorized users.
A denial-of-service attack (DoS
attack) is an attempt to make a
computer resource unavailable to
its intended respondents
Yahoo! and e-bay were both
victims of such attacks in February
2000.
14. A Dos attack can be perpetrated in a number of ways. There
are three basic types of attack.
Consumption of computational resources, such as band
width, disk space or CPU time.
Disruption of configuration information, such as routing
information.
Disruption of physical network components.
The consequences of a DoS attack:
Unusually slow network performance.
Unavailability of a particular web site.
Inability to access any web site.
Dramatic increase in the amount of spam you receive in
your account.
15. Identity Spoofing (IP Address Spoofing): A hijacking
technique in which a cracker masquerades as a trusted host
to conceal his identity, spoof a website, hijack browsers or
gain access to a network.
How it works : The hijacker obtains the IP address of a
legitimate host and alters packet headers so that the
legitimate host appears to be the source.
16. Password-based Attacks: An attack in which repetitive
attempts are made to duplicate a valid logon or password
sequence.
Techniques for cracking password:
Cryptography
Guessing
Dictionary based attack
After gaining access to your network with a valid account,
an attacker can:
Obtain lists of valid user and computer names and
network information.
Modify server and network configurations, including
access controls and routing tables.
Modify, reroute, or delete your data.
17. Session Hijacking: A illicit method of stealing a Web user
session by obtaining data i.e session id, about an authorized
user.
Session hijacking exploits computer session between two
machines.
When a TCP session is established a cookie is used to
verify if the session is active or not. The attacker can steal
these cookies by sniffing or using the saved cookies on
victim’s computer.
Types of Session Hijacking attacks
1. Active: Man-in-the-middle
2. Passive: Sniffer tools
3. Hybrid: Combination
Methods
1. Session fixation
2.Session side jacking
19. Web Attacks
Phishing : It is the act of tricking someone into giving
confidential information (like passwords and credit card
information) on a fake web page or email form pretending
to be from a legitimate company .
Some phishing e-mails also contain malicious or
unwanted software that can track your activities or slow
your computer.
Types of Phishing:
1. Deceptive Email
2. Malware-based
3. DNS-based
4. Search engine Phishing
21. Sql Injection: An attack in which malicious code is inserted
into strings that are later passed to an instance of SQL
Server for parsing and execution.
The primary form of SQL injection consists of direct
insertion of code into user-input variables that are
concatenated with SQL commands and executed.
SQL injection refers to the technique of inserting SQL
meta characters and commands into Web-based input
fields in order to manipulate the execution of the back-
end SQL queries.
Tw0 types: First-order & Second-order
Easy to inject. many websites are vulnerable to them.
Dot Defender: web app firewall, inspects HTTP traffic
Cross-site Scripting(XSS): Writing a complex JavaScript
program that steals data left by other sites that you have
visited in same browsing session.
22. A malicious website might employ JavaScript to make
changes to local system, such as copying or deleting
files
A malicious website might employ JavaScript to
monitor activity on local system.
A malicious website might employ JavaScript to
interact with other Websites the user has open in
other browser windows or tabs.
It’s called “cross-site” because it involves interactions
between two separate websites to achieve its goals.
23. Software Attacks
Malware : “Malicious Software” is intended to damage or
disable computer systems.
Malware can be classified into several categories,
depending on propagation and concealment
Propagation
– Virus: human-assisted propagation
– Worm: automatic propagation
Concealment
– Root kit: modifies operating system to hide its
existence
– Trojan: provides desirable functionality but hides
malicious operation
24. 1. Virus
Computer program that can replicate itself and
spread from one computer to another.
Types of Virus:
1. File Virus: Program file
2. Boot sector virus: Floppy and Hard drives
3. Macro Virus: Macro programming feature
25. 2. Worms
Standalone malware computer program that
replicates itself in order to spread to other
computers.
Types of Worms:
1. Internet Worms
2.Email Worms
3.File sharing Network worms
26. 3. Root Kits
It is a collection of tools that enable
administrator-level access to a computer or
computer networks.
Four types:
1. Virtualized: Virtual environment
2. Kernel Level: Kernel of OS
3. Library Level: Replace system calls
4. Application Level
27. 4. Trojan
Malicious computer program must be
executed by user.
Executable programs that perform some
actions.
They have file extensions like
“exe”,”com” etc.
28. TYPES OF SECURITY
Information Security:
The protection of information and its critical elements,
including systems and hardware that use, store, and
transmit that information
Necessary tools: policy, awareness, training,
education, technology
C.I.A. triangle was standard based on confidentiality,
integrity, and availability
30. Network Security
It consists of the provisions and
policies adopted by a network
administrator to prevent and
monitor unauthorized
access,misuse,modification,or denial
of a computer network and network
accessible resources.
31. Firewalls
A firewall is an integrated collection
of security measures designed to
prevent unauthorized electronic access
to a networked computer system.
A network firewall is similar to firewalls
in building construction, because in
both cases they are intended to isolate
one "network" or "compartment "from
another.
33. Firewall Policies
To protect private networks and individual
machines from the dangers of the greater
Internet, a firewall can be employed to filter
incoming or outgoing traffic based on a
predefined set of rules called firewall policies.
34. Virtual Private Networking
(VPN)
Virtual private networking (VPN) is a technology
that allows private networks to be safely extended over
long physical distances by making use of a public
network, such as the Internet, as a means of transport.
• VPN provides guarantees of data confidentiality,
integrity, and authentication, despite the use of an
untrusted network for transmission.
There are two primary types of VPNs, remote access
VPN and site-to-site VPN.
35. Intrusion Detection Systems
Intrusion
– Actions aimed at compromising the security of the target
(confidentiality, integrity, availability of
computing/networking resources)
Intrusion detection
– The identification through intrusion signatures and
report of intrusion activities
Intrusion prevention
The process of both detecting intrusion activities and
managing automatic responsive actions throughout the
network