Professional Documents
Culture Documents
Network Security: Dr. Imran Rashid
Network Security: Dr. Imran Rashid
irashid@mcs.edu.pk
About Myself
PhD (University of Manchester, UK) – 2007 to 2011
MS (Technical University of Denmark (DTU)) –2002 to 2004
BE (MCS – NUST) – 1996 to 1999 (President Gold Medal)
Certified Ethical Hacking (CEH) - 2014
Computer Hacking Forensic Investigator (CHFI) – 2014
EC-Council Certified Security Analyst (ECSA)-2015
EC-Council Certified Incident Handler (ECIH)-2016
Certified EC-Council Instructor (CEI)
4 x PhD students completed PhD in 2020-21 under my supervision
Supervising 5 x PhD students; Co-supervising 3 x PhD students
Supervising 6 x MS thesis students
Adv NW Security
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
https://www.zdnet.com/article/details-of-44m-pakistani-mobile-users-leaked-online-part-
of-bigger-115m-cache/
Backdoor found in Netis or Netcore
Routers
Netcore or Netis has a
backdoor that can easily run
arbitrary code on these
routers
Open UDP port listening at
port 53413
port is accessible from the
WAN side of the router
hardcoded password
located in the router’s
firmware How funny the security is
users cannot modify or
disable this backdoor
Kevin Mitnick
•Served a five-year sentence
• One of the most wanted hacker
• Started from using bus for free
• Hacked various organizations
• Now runs a security firm named Mitnick Security
Consulting
• Hollywood movie was made on him “Takedown”
in year 2000.
• IMDB ranking is 6.3
Folk Model
‘EAST LANSING, Mich. — Most home computers are vulnerable to hacker attacks because the users either
mistakenly think they have ’ Security
enough security in place or they don’t believe they have enough valuable information that would be of interest
to a hacker.
That’s the point of a paper published this month by Michigan State University’s Rick Wash,
who says that most home‐computer users rely on what are known as “folk models.” Those
are beliefs about what hackers or viruses are that people use to make decisions about
security
– to keep their information safe.
Unfortunately, they don’t often work the way they should.
“Home security is hard because people are untrained in security,” said Wash, an assistant
professor in the Department of Telecommunication,
3 Information Studies and Media. “But
it isn’t because people are idiots. Rather they try their best to make sense of what’s going
on and frequently make choices that leave them vulnerable.”
http://news.msu.edu
RANSOMWARE
CryptoLocker-2013 TeslaCrypt-2016
spread via Variant of CryptoLocker
attachments to spam
messages,
SimpleLocker-2016
Infected over
Android based
500,000 machines
The U.K.’s Financial Conduct Authority issued a £16.4 million ($21.4 million)
penalty to Tesco Bank for failing to protect clients from a cyber attack in
November 2016. (£ 2.26million was stolen from 9000 customers)
Computer Security
1 2 3
10 Copyright © by EC-Council
All Rights Reserved.
Reproduction is Strictly
Prohibited.
Why Security?
11 Copyright © by EC-Council
All Rights Reserved.
Reproduction is Strictly
Prohibited.
Layers of Security Layer 5
Layer 4
Layer 3
User
Layer 2
Security
Application
Layer 1 Ensures that
Security a valid user
System
Covers the use is logged in
Security
Network of software, and that the
Protects the hardware, and logged‐in
Security
Physical system and its procedural user is
Security Protects the information methods to allowed to
networks and from theft, protect use an
Safeguards the their services corruption, applications application/
personnel, from unauthorized from external program
hardware, unauthorized access, or threats
programs, modification, misuse
networks, and destruction, or
data from disclosure
physical
threats
17 Copyright © by EC-Council
All Rights Reserved.
Reproduction is Strictly
Prohibited.
Potential Losses Due to
Attacks
Misuse of computer
resources Financial loss
Unavailability of
Data loss/theft
resources
12 Copyright © by EC-Council
All Rights Re served. Reproduction is Strictly Prohibited.
Threat Environment
Israel
Israel conducted air strikes and
destroyed nuclear facility at Kibar
Camp
37
RUSSIAN CYBER ATTACK ON GEORGIA
38
US’s CYBER ATTACK ON
IRAN
41
DUTCH ELECTIONS
Amid “Hacking” fears, Dutch
Government decided that general
elections will be entirely conducted
manually and votes will be counted by
hand and tallied with pen and paper
42
NSA’S WORLDWIDE
SURVEILLANCE
Edward Snowden defected US in 2013
Revealed information regarding
various cyber-attacks by US
43
NSA’S WORLDWIDE SURVEILLANCE
44
NSA’S WORLDWIDE
SURVEILLANCE
shipment
Accessible to NSA
45
CYBER ATTACK ON
UKRAINE
Cyber attack on Ukraine’s power grid
in 2015 and 2016
Massive power outage
Reportedly attack originated from
Russia
46
CYBER ATTACKS ON
BANKS
Bangladesh’s
Central Bank, 101
million USD – Feb
2016
Ukrainian Bank –
10 million USD –
Jun 2016
47
CYBER TERRORISM
ISIS Cyber Warfare Wing - United
Cyber Caliphate
Capabilities
Support to evade monitoring
Conduct cyber attacks
48
CYBER TERRORISM
ISIS released list of 1400 officers of US Armed
Forces
Paris Attacks 2015
ISIS’s cyber Attacks against servers in UK, Canada
etc
Disrupted of some servers in target countries
49
CYBERSECURITY EFFORTS AT
NATIONAL LVL
VISION
The vision is for Pakistan to have a secure, robust, and continually
improving nationwide digital ecosystem ensuring accountable
confidentiality, integrity, and availability of digital assets leading to socio-
economic development and national security (Para 2.1)
National Cyber Security Policy
July 2021 (Cont…)
Objectives
•To establish governance and institutional framework
•To enhance the security of national information systems and infrastructure
•To create a protection and information sharing mechanism at all tiers capable
to monitor, detect, protect and respond against threats
•To mandate national security standards and processes
•To create an information assurance framework of audits and compliance
•To ensure the integrity of ICT products, systems, and services by establishing
a mechanism of testing, screening, forensics, and accreditation
•To protect the online privacy of the citizens
•To create a country-wide culture of Cyber Security awareness
•To train skilled Cyber Security professionals
•To encourage and support indigenization and development of Cyber
Security solutions
•To provide a framework on national-global cooperation and collaborations
•To Identify and process legislative and regulatory actions
Contents. . . . continued
Contents
PREVENTION OF ELECTRONIC CRIME
ACT – 2016
NATIONAL CYBER SECURITY
CHALLENGES
Implementation of Cyber Security laws / regs
Lack of qual Cyber Security workforce both in pub and pte secs
63
Most of the critical networks are connected to the public internet
64
Lack of qualified Cyber Security workforce both in public and
private sectors
65
IXP
An Internet exchange point (IXP) is a physical location through which Internet
infrastructure companies such as Internet Service Providers (ISPs) connect with
each other and international Internet Service Provider
In early hours of Feb. 24, as Russian forces entered eastern Ukraine, hackers
crippled tens of thousands of satellite internet modems in Ukraine
Hybrid War Continues
After the invasion, Russian hackers compromised several important Ukrainian
organizations, including nuclear power companies, media firms and government
entities
Malware named Industroyer 2
Russia's military intelligence agency, designed Industroyer 2, which could
manipulate equipment in electrical utilities to control the flow of power
Reference
https://www.reuters.com/world/europe/factbox-the-cyber-war-between-ukraine-russia-2022-05-10/
CASE STUDY – 1
(Open Source Profiling)
Attk Methodology
URL
CASE STUDY – 2
(Bulk Spread of Malwares)
CASE STUDY – 2
(Bulk Spread of Malwares)
L ost
l Data
C