Professional Documents
Culture Documents
COE444 Lect1 Intro 2s
COE444 Lect1 Intro 2s
Now What?
Mon Wed
Introduction
Jan 23 25 1
Authentication & Authorization
Feb 30 1 2
6 8 3
Physical Security
13 15 4
Cryptography
20 22 5 Midterm Exam #1
Mar 27 1 6 Network Security
6 8 7 Wireless Security
13 15 8 DOS Attacks & Malware
20 22 9 Email & Web Security
27 29 10
IDS & Firewalls
Apr 3 5 11
Midterm Exam #2
10 12 12
OS Security
17 19 13
24 26 14
Program Security
May 1 3 15
Disaster Recovery & Sec. Mgmt
8 10 16 Ethical & Legal Issues in Security
COE 444: Computer Security American University of Sharjah
Dr. Fadi Aloul Page 8
1
3.7B Internet Users in the World (2016)
2
Security News in International Media
3
COE 444: Computer Security American University of Sharjah
Dr. Fadi Aloul Page 13
4
Yearly Dollar Loss in Millions
Media
Governments
Banks
Mostly
Universities
Targeted Attacks
Nuclear Plants
Oil & Gas Few
Telco Opportunistic Attacks
.
5
Examples of Cybercrime Attackers
CyberActivists CyberWarSoldiers
CyberGangs CyberScriptKiddies
LulzSec
COE 444: Computer Security American University of Sharjah
Dr. Fadi Aloul Page 32
6
Why Increase in Attacks?
Internal&ExternalThreats FreePublicTutorials&Tools
IncreaseinMobileDevices Cybercrime&PrivacyLaws
Security Vulnerabilities
7
Lecture Objectives
8
Cyber Crime - 1994
9
Cyber Crime - 1999
Melissa Virus
written by David Smith
Best known of the early
macro type of virus that
attaches itself to documents,
which contain programs with
a limited macro programming
capability.
Infected about a million
computers and caused an
estimated $80 million in
damages.
10
Cyber Crime - 2002
11
FBI Statistics
Of all the computer crimes, only 1% are detected, and 7% of
the detected crimes are reported (why?).
Lost
Customer Loyalty
Lost
Revenue
COE 444: Computer Security American University of Sharjah
Dr. Fadi Aloul Page 44
12
Lecture Objectives
Traditional Attacks
System Penetration
Steal, delete, or change information (Active Attack)
Use the machine for malicious reasons (Passive
Attack)
Denial-of-Service Attacks
When hackers cant break into the
system, stop legitimate users from
accessing it
13
Who Executes These Attacks?
1. Malware
Virus, Worms, Trojan horses, etc.
2. Intruders
Hackers (8~12%) access computer system without
authorization
White hats report problem to vendor
Black hats goal is to cause harm
Gray hats may conduct illegal activities for ethical reasons
Script kiddies (85~90%) hacker with no experience
Elite hackers (1~2%) can discover new vulnerabilities
Ethical hackers break into a system to assess its security
(typically paid consultants)
(also known as Penetration Testers)
Level of Experience
14
Who Executes These Attacks?
3. Insiders
Are more dangerous than outside intruders.
Can cause immediate damage to an organization.
Most security is designed to protect against outside intruders
Besides employees, insiders also include a number of other
individuals who have physical access to facilities.
Who is Attacked?
15
Lecture Objectives
Steps in an Attack
16
URL: http://www.google.com
URL: http://www.google.com
17
URL: http://www.google.com
18
URL: http://www.internic.com
Administrative Contact:
Surname, Name (SNIDNo-ORG) targetcompany@domain.com
targetcompany (targetcompany-DOM) # Street Address
City, Province, State, Pin, Country
Telephone: XXXXX Fax XXXXX
Technical Contact:
Surname, Name (SNIDNo-ORG) targetcompany@domain.com
targetcompany (targetcompany-DOM) # Street Address
City, Province, State, Pin, Country
Telephone: XXXXX Fax XXXXX
19
Tool: SmartWhois information lookup
* E. H.
COE 444: Computer Security American University of Sharjah
Dr. Fadi Aloul Page 59
20
Steps in an Attack
21
Tool: Pinger check if machine is alive
* E. H.
COE 444: Computer Security American University of Sharjah
Dr. Fadi Aloul Page 63
Steps in an Attack
Vuln. Information
Attacking System
22
Tool: nmap Port Scanner (Windows/Linux)
* E. H.
23
ShieldsUP Scans Your PC for Open Ports
24
ShieldsUP Scans Your PC for Open Ports
Steps in an Attack
Attacking System
25
URL: http://www.netcraft.com
URL: http://uptime.netcraft.com/
26
URL: http://uptime.netcraft.com/
URL: http://uptime.netcraft.com/
27
Steps in an Attack
28
Scanner: http://www.parosproxy.org
Steps in an Attack
29
Minimizing Avenues of Attack
30
Security Certifications
Lecture 1 Tools
www.internic.net
Check domain information
www.netcraft.com
Check website information (OS, Web Server Type, etc)
Ping, Pinger
Check if machine is alive
Traceroute
Check the servers located between origin and destination
Nmap, NetBrute, NetScan, SuperScan
Port scanner
Smart Whois, Nslookup, Whois
Check domain information
31