Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Network Security

1
A Brief History of the World

2
Overview

 Need for securing a network; principal of security


 Type of attack
 Introduction to cyber cime
 Cyber ethics
 Ethical hacking
 Difference between hacker and attackers

3
What is “Security”
 Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.

4
What is “Security”
 Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.

5
What is “Security”
 Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.

6
What is “Security”
 Dictionary.com says:
– 1. Freedom from risk or danger; safety.
– 2. Freedom from doubt, anxiety, or fear; confidence.
– 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building security
if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
…etc.

7
Why do we need security?
 Protect vital information while still allowing
access to those who need it
– Trade secrets, medical records, etc.
 Provide authentication and access control for
resources
– Ex: AFS
 Guarantee availability of resources
– Ex: 5 9’s (99.999% reliability)

8
principle of security
 The principle of information security protection of confidentiality, integrity, and availability
cannot be overemphasized: This is central to all studies and practices in IS. You'll often see
the term CIA triad to illustrate the overall goals for IS throughout the research, guidance,
and practices you encounter.
 A principal in computer security is an entity that can be authenticated by a computer
system or network. It is referred to as a security principal in Java and Microsoft literature

9
TYPE OF ATTACK

Active attacks contrast with passive attacks, in which


an unauthorized party monitors networks and sometimes
scans for open ports and vulnerabilities. The purpose is to
gain information about the target and no data is changed.
However, passive attacks are often preparatory activities for
active attacks.
10
ACTIVE ATTACKS

 An active attack is a network exploit in which a hacker attempts to make changes


to data on the target or data en route to the target. Types of active attacks: In a
masquerade attack, the intruder pretends to be a particular user of a system to
gain access or to gain greater privileges than they are authorized for.

11
masquerade attack

12
REPLAY ATTACK

13
modification of messages

15-441 Networks Fall 2002 14


Daniel of service

15
PASSIVE ATTACKS

 A passive attack is a network attack in which a system is monitored and sometimes


scanned for open ports and vulnerabilities. The purpose is solely to gain information about
the target and no data is changed on the target.Passive attacks include active
reconnaissance andpassive reconnaissance.

16
1 RELEASE OF MESSAGE CONTENTS

17
TREFFIC ANALYSIS

15-441 Networks Fall 2002 18


 Cybercrime, or computer oriented crime, is crime that involves a computer and
a network.[1] The computer may have been used in the commission of a crime, or it may be
the target.[2] Cybercrimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication networks such as Internet (networks including
but not limited to Chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)".[3] Cybercrime may threaten a person or a nation's security and
financial health.[4] Issues surrounding these types of crimes have become high-profile,
particularly those surrounding hacking, copyright infringement, unwarranted mass-
surveillance, sextortion, child pornography, and child grooming. There are also problems
of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
Debarati Halder and K. Jaishankar further define cybercrime from the perspective of
gender and defined 'cybercrime against women' as "Crimes targeted against women with a
motive to intentionally harm the victim psychologically and physically, using modern
telecommunication networks such as internet and mobile phones". [3] Internationally, both
governmental and non-state actors engage in cybercrimes, including espionage, financial
theft, and other cross-border crimes. Activity crossing international borders and involving
the interests of at least one nation state is sometimes referred to as cyberwarfare.
19
CYBER ETHICS
 Cyberethics is the philosophic study of ethics
pertaining to computers, encompassing user
behavior and what computers are
programmed to do, and how this affects
individuals and society. For years, various
governments have enacted regulations while
organizations have defined policies about
cyberethics.

20
ETHICAL HACKING
 Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer
and information systems by duplicating the intent and actions of
malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing,
or red teaming.
 A Hacker is a person who finds and exploits the weakness in computer systems and/or
networks to gain access. Hackers are usually skilled computer programmers with
knowledge of computer security.
 Hacking is identifying weakness in computer systems or networks to exploit its
weaknesses to gain access. Example of Hacking: Using password cracking algorithm to
gain access to a system

 Computers have become mandatory to run a successful businesses. It is not enough to


have isolated computers systems; they need to be networked to facilitate communication
with external businesses. This exposes them to the outside world and hacking. Hacking
means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars
every year. Businesses need to protect themselves against such attacks.

21
WHAT IS ATTACKER?
 Attacker: According to Wikipedia, “In computer and computer networks an attack is any
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make
unauthorized use of an asset.” Thus, an attacker is the individual or organization
performing these malicious activities.
 For an Attacker, BeyondTrust’s PowerBroker privileged access management solutions
remove unnecessary administrator (or root) rights on applications and operating systems,
and document any changes to Active Directory, File Systems, Exchange or MS SQL to
ensure that their destructive tasks do not occur or are documented per the attack they are
trying to commit. A combination of all BeyondTrust solutions not only prevents outsider
attacks, but limits privileges to assets and users, thereby inhibiting the lateral movement of
actors, hackers and attackers if they manage to somehow gain unapproved access to your
environment.
The next time you see an article on a breach or incident, think about the
offending persona and how they conducted their nefarious activity. BeyondTrust can help
defend against all three personas. For more information, including a personalized demo,
contact us today.

22
WHAT IS HACKER?
 Hacker: According to Wikipedia, “In computing, a hacker is any skilled computer expert that
uses their technical knowledge to overcome a problem. While “hacker” can refer to any
computer programmer, the term has become associated in popular culture with a “security
hacker“, someone who, with their technical knowledge, uses bugs or exploits to break into
computer systems.
 Hackers and attackers are technical personas or organizations intentionally targeting
technology to create incident and hopefully (for them, not you) a breach. They can be solo
individuals, groups, or even nation states with goals and missions anywhere in the world
looking to destabilize a business, government, to disseminate information, or for financial
gains.
 For a Hacker, BeyondTrust’s Retina enterprise vulnerability management solutions are
design to identify vulnerabilities in operating systems, applications and infrastructure to
ensure that they can be remediated in a timely manner. This closes the gaps that a hacker
can use to compromise your environment, including automated patch management for
Windows to streamline the workflow for security patches (external threat).

23

You might also like