Professional Documents
Culture Documents
Network Security
Network Security
1
A Brief History of the World
2
Overview
3
What is “Security”
Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
4
What is “Security”
Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
5
What is “Security”
Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
6
What is “Security”
Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.
7
Why do we need security?
Protect vital information while still allowing
access to those who need it
– Trade secrets, medical records, etc.
Provide authentication and access control for
resources
– Ex: AFS
Guarantee availability of resources
– Ex: 5 9’s (99.999% reliability)
8
principle of security
The principle of information security protection of confidentiality, integrity, and availability
cannot be overemphasized: This is central to all studies and practices in IS. You'll often see
the term CIA triad to illustrate the overall goals for IS throughout the research, guidance,
and practices you encounter.
A principal in computer security is an entity that can be authenticated by a computer
system or network. It is referred to as a security principal in Java and Microsoft literature
9
TYPE OF ATTACK
11
masquerade attack
12
REPLAY ATTACK
13
modification of messages
15
PASSIVE ATTACKS
16
1 RELEASE OF MESSAGE CONTENTS
17
TREFFIC ANALYSIS
20
ETHICAL HACKING
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer
and information systems by duplicating the intent and actions of
malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing,
or red teaming.
A Hacker is a person who finds and exploits the weakness in computer systems and/or
networks to gain access. Hackers are usually skilled computer programmers with
knowledge of computer security.
Hacking is identifying weakness in computer systems or networks to exploit its
weaknesses to gain access. Example of Hacking: Using password cracking algorithm to
gain access to a system
21
WHAT IS ATTACKER?
Attacker: According to Wikipedia, “In computer and computer networks an attack is any
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make
unauthorized use of an asset.” Thus, an attacker is the individual or organization
performing these malicious activities.
For an Attacker, BeyondTrust’s PowerBroker privileged access management solutions
remove unnecessary administrator (or root) rights on applications and operating systems,
and document any changes to Active Directory, File Systems, Exchange or MS SQL to
ensure that their destructive tasks do not occur or are documented per the attack they are
trying to commit. A combination of all BeyondTrust solutions not only prevents outsider
attacks, but limits privileges to assets and users, thereby inhibiting the lateral movement of
actors, hackers and attackers if they manage to somehow gain unapproved access to your
environment.
The next time you see an article on a breach or incident, think about the
offending persona and how they conducted their nefarious activity. BeyondTrust can help
defend against all three personas. For more information, including a personalized demo,
contact us today.
22
WHAT IS HACKER?
Hacker: According to Wikipedia, “In computing, a hacker is any skilled computer expert that
uses their technical knowledge to overcome a problem. While “hacker” can refer to any
computer programmer, the term has become associated in popular culture with a “security
hacker“, someone who, with their technical knowledge, uses bugs or exploits to break into
computer systems.
Hackers and attackers are technical personas or organizations intentionally targeting
technology to create incident and hopefully (for them, not you) a breach. They can be solo
individuals, groups, or even nation states with goals and missions anywhere in the world
looking to destabilize a business, government, to disseminate information, or for financial
gains.
For a Hacker, BeyondTrust’s Retina enterprise vulnerability management solutions are
design to identify vulnerabilities in operating systems, applications and infrastructure to
ensure that they can be remediated in a timely manner. This closes the gaps that a hacker
can use to compromise your environment, including automated patch management for
Windows to streamline the workflow for security patches (external threat).
23