SlideShare une entreprise Scribd logo
1  sur  19
ACIT EDUCATION PVT LTD
COMPUTER SECURITY
Computer and Network security was not at all well
known, even about 12 years ago
Today, it is something everyone is aware of the
need, but not sure what is really means
Interesting topic of threats, countermeasures,
risks, stories, events and paranoia
 With some mathematics, algorithms, designs and software
issues mixed in
 Yet, not enough people, even security specialists
understand the issues and implications
MEDIA STORIES
Consumers are bombarded with media reports narrating
dangers of the online world
 Identity Theft
 Embezzlement and fraud
 Credit card
theft
 Corporate
Loss
Just “fear
mongering”?
SECURITY? WHAT IS THAT?
Lock the doors and windows and you are secure
 NOT
Call the police when you feel insecure
 Really?
Computers are powerful, programmable machines
 Whoever programs them controls them (and not you)
Networks are ubiquitous
 Carries genuine as well as malicious traffic
End result: Complete computer security is unattainable,
it is a cat and mouse game
GOALS OF COMPUTER SECURITY
Integrity:
 Guarantee that the data is what we expect
Confidentiality
 The information must just be accessible to the authorized people
Reliability
 Computers should work without having unexpected problems
Authentication
 Guarantee that only authorized persons can access to the resources
SECURITY BASICS
What does it mean to be secure?
 “Include protection of information from theft or corruption, or the preservation of
availability, as defined in the security policy.” - The Wikipedia
Types of Security
 Network Security
 System and software security
 Physical Security
Very little in computing is inherently secure, you must protect yourself!
 Software cannot protect software (maybe hardware can)
 Networks can be protected better than software
SOME TYPES OF ATTACKS
What are some common attacks?
 Network Attacks
 Packet sniffing, man-in-the-middle, DNS hacking
 Web attacks
 Phishing, SQL Injection, Cross Site Scripting
 OS, applications and software attacks
 Virus, Trojan, Worms, Rootkits, Buffer Overflow
 Social Engineering
 (NOT social networking)
Not all hackers are evil wrongdoers trying to steal your info
 Ethical Hackers, Consultants, Penetration testers, Researchers
NETWORK ATTACKS
Packet Sniffing
 Internet traffic consists of data “packets”, and these can be
“sniffed”
 Leads to other attacks such as
password sniffing, cookie
stealing session hijacking,
information stealing
Man in the Middle
 Insert a router in the path between client and server, and change
the packets as they pass through
DNS hijacking
 Insert malicious routes into DNS tables to send traffic for genuine
sites to malicious sites
WEB ATTACKS
Phishing
 An evil website pretends to be a trusted website
 Example:
 You type, by mistake, “mibank.com” instead of “mybank.com”
 mibank.com designs the site to look like mybank.com so the
user types in their info as usual
 BAD! Now an evil person has your info!
SQL Injection
 Interesting Video showing an example
Cross Site Scripting
 Writing a complex Javascript program that steals data left by
other sites that you have visited in same browsing session
VIRUS
Definition
 Piece of code that automatically reproduces itself. It’s
attached to other programs or files, but requires user
intervention to propagate.
Infection (targets/carriers)
 Executable files
 Boot sectors
 Documents (macros), scripts (web pages), etc.
Propagation
is made by the user. The mechanisms are storage elements,
mails, downloaded files or shared folders
Infection
Propagation
Payload
WORM
Definition
 Piece of code that automatically reproduces itself over the
network. It doesn’t need the user intervention to propagate
(autonomous).
Infection
 Via buffer overflow, file sharing, configuration errors and other
vulnerabilities.
Target selection algorithm
 Email addresses, DNS, IP, network neighborhood
Payload
 Malicious programs
 Backdoor, DDoS agent, etc.
Infection
Propagation
engine
Payload
Target
Selection
algorithm
Scanning
engine
BACKDOOR, TROJAN, ROOTKITS
Goal
 The goal of backdoor, Trojan and rootkits is to take possession of a machine
subsequently through an infection made via a backdoor.
Backdoor
 A backdoor is a program placed by a black-hacker that allows him to access a
system. A backdoor have many functionalities such as keyboard-sniffer, display
spying, etc.
Trojan
 A Trojan is a software that seems useful or benign, but is actually hiding a
malicious functionality.
Rootkits (the ultimate virus)
 Rootkits operate like backdoor and Trojan, but also modify existing programs in
the operating system. That allows a black-hacker to control the system without
being detected. A rootkit can be in user-mode or in kernel-mode.
SOCIAL ENGINEERING
Why is this social engineering?
 Manipulating a person or persons into divulging confidential information
I am not dumb, so does this really apply to me?
 YES! Attackers are ALSO not dumb.
 Social Engineers are coming up with much better and much more elaborate
schemes to attack users.
 Even corporate executives can be tricked into revealing VERY secret info
What can I do to protect myself?
 NEVER give out your password to ANYBODY.
 Any system administrator should have the ability to change your password without
having to know an old password
PASSWORD ATTACKS
Password Guessing
 Ineffective except in targeted cases
Dictionary Attacks
 Password are stored in computers as hashes, and these hashes can
sometimes get exposed
 Check all known words with the stored hashes
Rainbow Tables
 Trade off storage and computation – uses a large number of pre-
computed hashes without having a dictionary
 Innovative algorithm, that can find passwords fast!
VULNERABILITIES IN SYSTEMS
How do viruses, rootkits enter a system?
 Even without the user doing something “stupid”
There are vulnerabilities in most software systems.
 Buffer Overflow is the most dangerous and common one
How does it work?
 All programs run from memory.
 Some programs allow access to reserved memory locations when given incorrect
input.
 Hackers find out where to place incorrect input and take control.
 Easy to abuse by hackers, allows a hacker complete access to all resources
HOW CAN YOU ACHIEVE SECURITY?
Many techniques exist for ensuring computer and network
security
 Cryptography
 Secure networks
 Antivirus software
 Firewalls
In addition, users have to practice “safe computing”
 Not downloading from unsafe websites
 Not opening attachments
 Not trusting what you see on websites
 Avoiding Scams
CRYPTOGRAPHIC PROTOCOLS
Symmetric encryption
Authentication
Asymmetric encryption
Public Key Infrastructure
WHY CARE?
Online banking, trading, purchasing may be insecure
 Credit card and identity theft
Personal files could be corrupted
 All school work, music, videos, etc. may be lost
Computer may become too slow to run
Upon discovery, vulnerabilities can be used against many computers
connected to the internet.
System-Security-acit-Institute

Contenu connexe

Tendances

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]MeeraNairJ
 
Network Threats
Network ThreatsNetwork Threats
Network ThreatsDan Oblak
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 

Tendances (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
internet security
internet securityinternet security
internet security
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Firewall
FirewallFirewall
Firewall
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Computer security
Computer securityComputer security
Computer security
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Portfolio 7
Portfolio 7Portfolio 7
Portfolio 7
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Computer security
Computer securityComputer security
Computer security
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 

En vedette

CCI Media event promotion and controlling
CCI Media event promotion and controllingCCI Media event promotion and controlling
CCI Media event promotion and controllingCCIMediaSwitzerland
 
Preventing Bullying Through Character Formation
Preventing Bullying Through Character FormationPreventing Bullying Through Character Formation
Preventing Bullying Through Character FormationMann Rentoy
 
Bdd and Agile Requirements Boiling Frogs 2016
Bdd and Agile Requirements Boiling Frogs 2016Bdd and Agile Requirements Boiling Frogs 2016
Bdd and Agile Requirements Boiling Frogs 2016Wiktor Żołnowski
 
Io t presentation_v01
Io t presentation_v01Io t presentation_v01
Io t presentation_v01Ashish Bhasin
 
JAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASA
JAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASAJAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASA
JAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASAJose Antonio Gras Iñigo
 

En vedette (10)

CCI Media Barcelona inventory
CCI Media Barcelona inventoryCCI Media Barcelona inventory
CCI Media Barcelona inventory
 
CCI Media event promotion and controlling
CCI Media event promotion and controllingCCI Media event promotion and controlling
CCI Media event promotion and controlling
 
Preventing Bullying Through Character Formation
Preventing Bullying Through Character FormationPreventing Bullying Through Character Formation
Preventing Bullying Through Character Formation
 
Mood board
Mood boardMood board
Mood board
 
Seminar Proposal Skripsi PMW
Seminar Proposal Skripsi PMWSeminar Proposal Skripsi PMW
Seminar Proposal Skripsi PMW
 
Bdd and Agile Requirements Boiling Frogs 2016
Bdd and Agile Requirements Boiling Frogs 2016Bdd and Agile Requirements Boiling Frogs 2016
Bdd and Agile Requirements Boiling Frogs 2016
 
Io t presentation_v01
Io t presentation_v01Io t presentation_v01
Io t presentation_v01
 
Tej Packaging intro
Tej Packaging introTej Packaging intro
Tej Packaging intro
 
Estadística
EstadísticaEstadística
Estadística
 
JAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASA
JAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASAJAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASA
JAGras_Smart Cities_Tecnología y Ciudad en La Ciudad como Hábitat_ASA
 

Similaire à System-Security-acit-Institute

Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 

Similaire à System-Security-acit-Institute (20)

Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
ASSIST - Fraud Presentation
ASSIST - Fraud PresentationASSIST - Fraud Presentation
ASSIST - Fraud Presentation
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Internet security
Internet securityInternet security
Internet security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

System-Security-acit-Institute

  • 2. COMPUTER SECURITY Computer and Network security was not at all well known, even about 12 years ago Today, it is something everyone is aware of the need, but not sure what is really means Interesting topic of threats, countermeasures, risks, stories, events and paranoia  With some mathematics, algorithms, designs and software issues mixed in  Yet, not enough people, even security specialists understand the issues and implications
  • 3. MEDIA STORIES Consumers are bombarded with media reports narrating dangers of the online world  Identity Theft  Embezzlement and fraud  Credit card theft  Corporate Loss Just “fear mongering”?
  • 4. SECURITY? WHAT IS THAT? Lock the doors and windows and you are secure  NOT Call the police when you feel insecure  Really? Computers are powerful, programmable machines  Whoever programs them controls them (and not you) Networks are ubiquitous  Carries genuine as well as malicious traffic End result: Complete computer security is unattainable, it is a cat and mouse game
  • 5. GOALS OF COMPUTER SECURITY Integrity:  Guarantee that the data is what we expect Confidentiality  The information must just be accessible to the authorized people Reliability  Computers should work without having unexpected problems Authentication  Guarantee that only authorized persons can access to the resources
  • 6. SECURITY BASICS What does it mean to be secure?  “Include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.” - The Wikipedia Types of Security  Network Security  System and software security  Physical Security Very little in computing is inherently secure, you must protect yourself!  Software cannot protect software (maybe hardware can)  Networks can be protected better than software
  • 7. SOME TYPES OF ATTACKS What are some common attacks?  Network Attacks  Packet sniffing, man-in-the-middle, DNS hacking  Web attacks  Phishing, SQL Injection, Cross Site Scripting  OS, applications and software attacks  Virus, Trojan, Worms, Rootkits, Buffer Overflow  Social Engineering  (NOT social networking) Not all hackers are evil wrongdoers trying to steal your info  Ethical Hackers, Consultants, Penetration testers, Researchers
  • 8. NETWORK ATTACKS Packet Sniffing  Internet traffic consists of data “packets”, and these can be “sniffed”  Leads to other attacks such as password sniffing, cookie stealing session hijacking, information stealing Man in the Middle  Insert a router in the path between client and server, and change the packets as they pass through DNS hijacking  Insert malicious routes into DNS tables to send traffic for genuine sites to malicious sites
  • 9. WEB ATTACKS Phishing  An evil website pretends to be a trusted website  Example:  You type, by mistake, “mibank.com” instead of “mybank.com”  mibank.com designs the site to look like mybank.com so the user types in their info as usual  BAD! Now an evil person has your info! SQL Injection  Interesting Video showing an example Cross Site Scripting  Writing a complex Javascript program that steals data left by other sites that you have visited in same browsing session
  • 10. VIRUS Definition  Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate. Infection (targets/carriers)  Executable files  Boot sectors  Documents (macros), scripts (web pages), etc. Propagation is made by the user. The mechanisms are storage elements, mails, downloaded files or shared folders Infection Propagation Payload
  • 11. WORM Definition  Piece of code that automatically reproduces itself over the network. It doesn’t need the user intervention to propagate (autonomous). Infection  Via buffer overflow, file sharing, configuration errors and other vulnerabilities. Target selection algorithm  Email addresses, DNS, IP, network neighborhood Payload  Malicious programs  Backdoor, DDoS agent, etc. Infection Propagation engine Payload Target Selection algorithm Scanning engine
  • 12. BACKDOOR, TROJAN, ROOTKITS Goal  The goal of backdoor, Trojan and rootkits is to take possession of a machine subsequently through an infection made via a backdoor. Backdoor  A backdoor is a program placed by a black-hacker that allows him to access a system. A backdoor have many functionalities such as keyboard-sniffer, display spying, etc. Trojan  A Trojan is a software that seems useful or benign, but is actually hiding a malicious functionality. Rootkits (the ultimate virus)  Rootkits operate like backdoor and Trojan, but also modify existing programs in the operating system. That allows a black-hacker to control the system without being detected. A rootkit can be in user-mode or in kernel-mode.
  • 13. SOCIAL ENGINEERING Why is this social engineering?  Manipulating a person or persons into divulging confidential information I am not dumb, so does this really apply to me?  YES! Attackers are ALSO not dumb.  Social Engineers are coming up with much better and much more elaborate schemes to attack users.  Even corporate executives can be tricked into revealing VERY secret info What can I do to protect myself?  NEVER give out your password to ANYBODY.  Any system administrator should have the ability to change your password without having to know an old password
  • 14. PASSWORD ATTACKS Password Guessing  Ineffective except in targeted cases Dictionary Attacks  Password are stored in computers as hashes, and these hashes can sometimes get exposed  Check all known words with the stored hashes Rainbow Tables  Trade off storage and computation – uses a large number of pre- computed hashes without having a dictionary  Innovative algorithm, that can find passwords fast!
  • 15. VULNERABILITIES IN SYSTEMS How do viruses, rootkits enter a system?  Even without the user doing something “stupid” There are vulnerabilities in most software systems.  Buffer Overflow is the most dangerous and common one How does it work?  All programs run from memory.  Some programs allow access to reserved memory locations when given incorrect input.  Hackers find out where to place incorrect input and take control.  Easy to abuse by hackers, allows a hacker complete access to all resources
  • 16. HOW CAN YOU ACHIEVE SECURITY? Many techniques exist for ensuring computer and network security  Cryptography  Secure networks  Antivirus software  Firewalls In addition, users have to practice “safe computing”  Not downloading from unsafe websites  Not opening attachments  Not trusting what you see on websites  Avoiding Scams
  • 18. WHY CARE? Online banking, trading, purchasing may be insecure  Credit card and identity theft Personal files could be corrupted  All school work, music, videos, etc. may be lost Computer may become too slow to run Upon discovery, vulnerabilities can be used against many computers connected to the internet.

Notes de l'éditeur

  1. CS = Computer Security