Uploaded by Behailu Gobanti

chapter one

advertisement
COMPUTER
NETWORK SECURITY
Compiled by:
BEHAILU GOBANTI
CHAPTER ONE
CONTENTS
01
02
03
04
Definition of Computer Security and
Challenges of Computer Security
Security Goals and Security Attacks
Passive Attacks and Active Attacks
Types of Attacks Based on Security Goals
Network Security Services(NSS)
Data Confidentiality, Data Integrity,
Authentication, Non Repudiation, Access
Control
 Security Mechanisms
Cryptography & Steganography
INTRODUCTION TO SECURITY
DEFINITION OF COMPUTER SECURITY AND
CHALLENGES OF COMPUTER SECURITY
Definition of Computer Security and Challenges of
Computer Security
Your T COMPUTER SECURITY
also called cyber security, the protection
You
can simply impress
your and
audience
and add a unique
of computer
systems
information
from zing
and appeal to your Presentations. Get a modern PowerPoint
harm,
theft,
unauthorized
Presentation
thatand
is beautifully
designed.use. Here
Computer facilities have been physically
protected for three reasons:
To prevent theft of or damage to the hardware
To prevent theft of or damage to the information
To prevent disruption of service
Why ?
Increased rate of cyber crime.
Increased demand to protect data.
Increased number of Cyber criminals and cyber army .
Increased financial frauds
Why ?
24,000 millions of mobile
apps blocked daily
300 Billions passwords
were be generated
24 plus millions records
exposed every day
Cybercrime costs six
million dollar
In 2021
In 2020
In 2018
Health care attack will be quadruple
 60% of fraud originated from mobile devices
Personal data will be cheap
90 % the hackers uses encryption
In 2021
Future
expectation
The Challenges of Computer Security
Computer and network security is both fascinating and complex. Some of the
reasons follow:
Ransomware attacks
IoT attacks
Cloud attacks
Phishing attacks
Block chain and cryptocurrency attacks
Software vulnerabilities
Machine learning and AI attacks
Insider attacks
Outdated hardware
FACTORS AFFECTING CYBER
SECURITY
PLATFORMS AND TOOLS
OPERATION SUPPORT FOR SECURITY
NEW OR EMERGING SECURITY TOOLS
LEVEL OF IT COMPLEXITY AND
NETWORK CONNECTIVITY
NATURE OF BUSINESS
OUT SOURCING SERVICE PROVI
DERS
RISK TOLERANCE AND INDUSTRY
TREND
PARTNER SHIP
SECURITY GOALS
AVAILABILITY
CONFIDENTIALITY
Prevention of unauthorized disclosure of information
Authorized parties can access the information
(military secret )
INTEGRITY
Prevention of unauthorized
modification of information
Authorizing people can add,
remove or alter information
Prevention of unauthorized
withholding of information or resource
Information must be available on
demand
APPROACHES TO CYBER SECURITY
COMPLIANCE BASED SECURITY
Determine security implementation
Risk based security
Identifying unique risk
AD hoc
Implementing security with out criteria
CYBER SECURITY: KEY TERMS
Give rise to
THREAT AGENT
THREAT
Indirectly affects
EXPOSURE
VENERABILITY
.
Counter
measure
RISK
ASSET
Can damage
THREAT ACTOR CATEGORIES AND TYPES
Script kiddies
and Hactivist
B
A
C
Organized crime and
Nation state APT
Insider and Competitor
D
Natural environmental
threat
Sociopolitical threats
Supply system threat
Man made threat
MALWARE TYPES
WORMS
VIRUS
Backdoor
TROJANS
LOGIC BOMBS.
MALWARE
ADWARE
ROOT KIT .
SPYWARE
RANSOM WARE .
SECURITY ATTACKS
An attempt to gain unauthorized access to information resource or
services, or to cause harm or damage to information systems.
Internet
The unauthorized or illegal actions that are taken against the government, corporate, or
private IT assets in order to destroy, modify, or steal the sensitive data.
Intruder intercept
data traveling
through the network
Intruder Initiates of
commands to disrupt
network normal
operation
Active attacks
Hackers & Snoopers
Passive attacks
TYPES OF ATTACKS BASED ON SECURITY GOALS
AVAILABILITY
CONFIDENTIALITY
Threat level three
Threat level one
Monitoring Attack
Traffic Analysis Attack
Main in the middle(MiMA) Attack
SECURITY
INTEGRITY
Threat level two
Message Alternation Attack
message Fabrication attack
Incorrect Data Injecting Attack
DOS Attack
DDOS Attack
Malware Attack
Black hole Attack
Broadcast Tampering Attack
Spamming Attack
SECURITY SERVICES
Ports and Services Vulnerability Scan
OS Vulnerability Scan
Virus Check
Vulnerability Assessment
Automated to be sent to the customer
Endpoint device security protection and monitoring
Email spam and malware protection, monitoring, and
alerting
Domain Name System (DNS) breach protection and
internet-wide visibility on and off your networ
Firewall, IDS, and IPS monitoring and alerting
Quarterly vulnerability scan
CRYPTOGRAPHY & STEGANOGRAPHY
CRYPTOGRAPHY
Some security services can be implemented using
cryptography. Cryptography, a word with Greek origins,
means “secret writing”.
STEGANOGRAPHY
The word steganography, with its origin in Greek, means
“covered writing”, in contrast to cryptography, which
means “secret writing”.
STEGANOGRAPHY
Steganography is the art of hiding the existence of a message.
• It is used to insert digital watermarks on images to identify illegal copies.
• It is used to send secret messages through emails.
• It involves concealing the very existence of data by hiding it in some
other media such as a picture, audio, and video file.
Computer Security
Assignment (10%):
•
•
Read about these security attack related keywords.
Study about one of these keywords and write a five
page (maximum) summary of your findings
including any recorded history of significant
damages created by these attacks.
Send your report by email (bgobanti@gmail.com)
in doc. format one day before the next class).
Report content:
•
•
•
•
Introduction ( definition)
How the attack works
Prevention mechanisms
Serious damages caused
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Brute Force Attack
Buffer Overflow
Cookie Injection
Cookie Poisoning
Cracking
DNS Poisoning
DoS Attack
DDoS Attack
Eavesdropping
HTTP Tunnel Exploit
ICMP Flood
Logic Bomb
Malware Attack
Packet Sniffing
Ping of Death
Serge
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
Spike
Server Spoofing
Session Hijacking
Smurf Attack
SNMP Community Strings
Spamming
Scam and Phishing
Spoofing Attack
SQL Injection
SYN Attack
Teardrop
Traffic Analysis
Trojan Horses
UDP Flood
Viruses
Worms
War Dialing
Wire Tapping
THANK YOU
Download