SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
NETWORK SECURITY
INTRODUCTION
 Network    security is a complicated subject,
 historically only tackled by well-trained and
 experienced experts. However, as more and more
 people become ``wired'', an increasing number of
 people need to understand the basics of security in
 a networked world.
WHAT IS NETWORK SECURITY?
 Network     security consists of       the provisions
  and policies adopted by a network administrator to
  prevent and monitor unauthorized access, misuse,
  modification, or denial of a computer network and
  network-accessible resources.
 Network security involves the authorization of access to
  data in a network, which is controlled by the network
  administrator.
 Network security covers a variety of computer networks,
  both public and private, that are used in everyday jobs
  conducting transactions and communications among
  businesses, government agencies and individuals.
WHY DO WE NEED SECURITY?
 Protect vital information while still allowing access
 to those who need it
   Trade secrets, medical records, etc.
 Provide authentication and access control for
 resources
   Ex: AFS
 Guarantee availability of resources
   Ex: 5 9’s (99.999% reliability)
SECURITY OBJECTIVES
 IDENTIFICATION
 AUTHENTICATION
 ACCESS CONTROL
IDENTIFICATION
 Something which uniquely identifies a user and is
  called UserID.
 Sometimes users can select their ID as long as it is
  given too another user.
 UserID can be one or combination of the following:
   User Name
   User Student Number
   User SSN
AUTHENTICATION
 The process of verifying the identity of a user
 Typically based on
   Something user knows
      Password
   Something user have
      Key, smart card, disk, or other device
   Something user is
      fingerprint, voice, or retinal scans
AUTHENTICATION: 2 SUB
CONCERNS
 GENERAL ACCESS AUTHENTICATION
  To control whether or not a particular user has ANY
   type of access right to the element in question. Usually
   we consider these in the form of a “User Account”.
 FUNCTIONAL AUTHORIZATION
  Concern with individual        user “rights”. What, for
   example, can a user do once authenticated? Can they
   figure the device or only see data.
AUTHENTICATION: MAJOR
PROTOCOLS
AUTHENTICATION: PROCEDURE
 Authentication procedure
  Two-Party Authentication
     One-Way Authentication
     Two-Way Authentication
  Third-Party Authentication
     Kerberos
     X.509
  Single Sign ON
     User can access several network resources by logging
      on once to a security system.
AUTHENTICATION: PROCEDURE
 C lie n t                                                    S e rv e r


             U se rID & P a ssw o rd



                                                                                       O n e -w a y A u th e n tic a tio n

               A u th e n tic a te d




                 S e rv e rID &
                                                                           T w o -w a y A u th e n tic a tio n
                  P a ssw o rd




               A u th e n tic a te d




                 T w o - P a r ty A u th e n t ic a tio n s
AUTHENTICATION: PROCEDURE

                                                    S e c u rity S e r v e r




                                                                                     Se
                                 d
                               or




                                                                                         rv
                          sw




                                                                                           er
                        as




                                                                                           ID
                                        ed
                        ,P




                                                                                             ,P
                                      at
                      ID




                                                                                                as
                                                                               Au
                                    ic
                 nt




                                                                                                  sw
                                                                                  th
                                  nt
                 ie




                                                                                     e
                                   e




                                                                                                   or
                                                                                     nt
              Cl




                                th




                                                                                                     d
                                                                                       ic
                             Au




                                                                                         at
                                                                                           ed
                                                    Exchange Keys
  C lie n t                                                                                              S e rv e r
                                                    E x c h a n g e D a ta




                                       T h ir d -P a r ty A u th e n tic a tio n s
ACCESS CONTROL
 refers to security features that control who can
 access resources in the operating system.
 Applications call access control functions to set who
 can access specific resources or control access to
 resources provided by the application.
ENCRYPTION
ENCRYPTION
 In cryptography, encryption is   the process of
  transforming information (referred to as plaintext)
  using an algorithm (called a cipher) to make it
  unreadable to anyone except those possessing
  special knowledge, usually referred to as a key.
 The reverse process, i.e., to make the encrypted
  information readable again, is referred to
  as DECRYPTION.
ENCRYPTION: USES
 Encryption can be used to protect data "at rest",
 such as files on computers and storage devices
 (e.g. USB flash drives).
   Digital rights management systems which prevent
    unauthorized use or reproduction of copyrighted
    material and protect software against reverse
    engineering
 Encryption is also used to protect data in transit
 Encryption, by itself, can protect the confidentiality
 of messages.
ENCRYPTION: APPLICATIONS
 Disk encryption software (also known
  as OTFE software)
 File/folder encryption
 Database encryption
 Communication encryption software
ENCRYPTION: APPLICATIONS
 NETWORK TRAFFIC ENCRYPTION TOOLS
  Generic
  IPSec based
WIRELESS SECURITY
WIRELESS SECURITY:
INTRODUCTION
 Very convenient to have wireless connections
 Nightmare for security – the range for 802.11 is often
  a few hundred meters, so that one can spy on a
  company by leaving a laptop on in the parking lot
 Many problems arise from the vendors trying to
  make their products as friendly as possible – when
  you plug the device it starts working right away,
  usually with no security by default.
 Several ways wireless nets handle security
   802.11i
   Bluetooth
   WAP 2.0
WIRELESS SECURITY: 802.11
SECURITY
 IEEE 802.11i specifies security standards for IEEE
 802.11 LANs
   Interoperable implementations called Wi-Fi Protected
    Areas (WPA)
 Wireless Application Protocol (WAP) – standard
  to provide wireless phones and other wireless
  devices access to telephony and information
  services, including the internet.
 WAP security primarily provided by Wireless
  Transport Layer Security (WTLS) – provides
  security between the mobile device and the WAP
  gateway to the Internet
WIRELESS SECURITY: 802.11
SECURITY
 802.11 standard prescribed a data link-level security
 protocol called WEP (Wired Equivalent Privacy)
 designed to make the security of a wireless LAN as
 good as that of a wired LAN.
   WEP has been broken already in July 2001
 Solution
   Replace WEP with WPA (Wi-fi Protected Access) or
    WPA2
   Final proposal in      802.11i: Robust Security Network
    (RSN)
      The Wi-Fi Alliance certifies vendors in compliance with the
      full 802.11i specification under the WPA2 program.
WIRELESS SECURITY: BLUETOOTH
 Considerably shorter range than 802.11 – cannot be
 attacked from the parking lot but feasible to attack
 it from next office.
   An attacker next door can read the signals from one’s
    keyboard or the data sent to the Bluetooth printer in
    the next office.
 Bluetooth has 3 security modes ranging from
 nothing to full data encryption and integrity control
 – many users have security turned off.
   Two devices must share a secret key – perhaps the user
    types a PIN in both
WIRELESS SECURITY: BLUETOOTH
  They negotiate the channel to be used and establish a
   128-bit session key (some bits made public due to
   government restrictions)
  Encryption uses a stream cipher called E0, integrity
   control uses SAFER+, both classical block-ciphers
WIRELESS SECURITY: WAP 2.0
 Introduced      for handheld-devices connectivity
  (mobile phones)
 Uses standard protocols in all layers
 It is IP-based and it supports IPsec in the network
  layer
 TCP connections protected by TLS in the transport
  layer
 Uses HTTP client authentication
 Probably better than 802.11 and Bluetooth because
  it only relies on well-known security standards.
SECURITY PROCESSES
 HOW TO SECURE DATA IN THE NETWORK?
SECURITY PROCESSES: INTRODUCTION
 Some data is also confidential; not only do you want
  to lose it, you don’t want others to even view it
  without authorisation.
 Let’s look at some ways to protect your all-
  important user data from loss and/or unauthorised
  access.
 http://www.zdnet.co.uk/news/networking/2006/04/19
SECURITY PROCESSES: 10 WAYS
E   Back up early or often- you can use the backup utility built into
    Windows (ntbackup.exe) to perform basic backups. You can use
    Wizard Mode to simplify the process of creating and restoring
    backups.
i   Use file-level and share-level security- to keep others out of
    data, the first step is to set permissions on data files and folders. If you
    have data in network shares, you can set share permissions to control
    which user accounts can and cannot access the files across the
    network. If you share the computer with someone else, you'll have to
    use file-level permissions (also called NTFS permissions, because
    they're available only for files/folders stored on NTFS-formatted
    partitions). File-level permissions are set using the Security tab on the
    properties sheet and are much more granular than share-level
    permissions.
SECURITY PROCESSES: 10WAYS
e   Password-Protect Documents- Many productivity applications,
    such as Microsoft Office applications and Adobe Acrobat, will allow
    you to set passwords on individual documents. To open the document,
    you must enter the password. To password-protect a document in
    Microsoft Word 2003, go to Tools | Options and click the Security tab.
    You can require a password to open the file and/or to make changes to
    it. You can also set the type of encryption to be used. You can also use
    zipping software such as WinZip or PKZip to compress and encrypt
    documents.
    Use EFS Encryption- Windows 2000, XP Pro, and Server 2003
    support the Encrypting File System (EFS). You can use this built-in
    certificate-based encryption method to protect individual files and
    folders stored on NTFS-formatted partitions. Encrypting a file or
    folder is as easy as selecting a check box; just click the Advanced
    button on the General tab of its properties sheet. Note that you can't
    use EFS encryption and NTFS compression at the same time.
SECURITY PROCESSES: 10 WAYS
e   Use Disk Encryption- Disk encryption products can be used to
    encrypt removable USB drives, flash drives, etc. Some allow creation of
    a master password along with secondary passwords with lower rights
    you can give to other users. Examples include PGP Whole Disk
    Encryption and DriveCrypt, among many others.
r   Make use of a public key infrastructure- A public key
    infrastructure is a system for managing public/private key pairs and
    digital certificates. Because keys and certificates are issued by a trusted
    third party (a certification authority, either an internal one installed on
    a certificate server on your network or a public one, such as Verisign),
    certificate-based security is stronger.
d   Protect data in transit with IP Security- Your data can be
    captured while it's travelling over the network by a hacker with sniffer
    software (also called network monitoring or protocol analysis
    software). To protect your data when it's in transit, you can use IPsec —
    but both the sending and receiving systems have to support it.
SECURITY PROCESSES: 10 WAYS
e   Secure Wireless Transmissions- Data that you send over a
    wireless network is even more subject to interception than that sent
    over an Ethernet network. Hackers don't need physical access to the
    network or its devices; anyone with a wireless-enabled portable
    computer and a high gain antenna can capture data and/or get into the
    network and access data stored there if the wireless access point isn't
    configured securely.
    You should send or store data only on wireless networks that use
    encryption, preferably WPA, which is stronger than WEP.
e   Use Rights Management to retain Control- If you need to send
    data to others but are worried about protecting it once it leaves your
    own system, you can use Windows Rights Management Services (RMS)
    to control what the recipients are able to do with it.
ETHICAL HACKING
ETHICAL HACKING
   HACKER- A person who enjoys learning the
    details of computer systems and how to stretch
    their capabilities—as opposed to most users of
    computers, who prefer to learn only the minimum
    amount necessary.
               - One who programs enthusiastically or
    who enjoys programming         rather than just
    theorizing about programming.
ETHICAL HACKING: Definition
   also called Penetration testing or white-hat
  hacking
 Evaluate the target systems’ security and report
  back to the owners with the vulnerabilities they
  found and instructions for how to remedy them.
 This method has been in use from the early days of
  computers.
ETHICAL HACKING: Goals
 Hack your systems in a non destructive fashion
 Enumerate vulnerabilities and if, necessary, prove
  to upper management that vulnerabilities exists.
 Apply results to remove vulnerabilities & better
  secure your systems.
ETHICAL HACKING: History
         The United States Air Force conducted a “security
        evaluation” of the Multics operating systems for “potential
        use as a two-level (secret/top secret) system.”
       With the growth of computer networking, and of the
        Internet in particular, computer and network vulnerability
        studies began to appear outside of the military
        establishment
         One of these was the work by Farmer and Venema, which was
          originally posted to Usenet in December of 1993.
         Idea: assess the security of the system
         Security Analysis Tool for Auditing Networks (SATAN)- program
          created by Farmer and Venema for auditing capability
ETHICAL HACKING: Network-
infrastructure Attacks
 Connecting into a network through a rogue modem attached
    to a computer behind a firewall
   Exploiting weaknesses in network transport mechanisms,
    such as TCP/IP and NetBIOS.
   Flooding a network with too many requests, creating a denial
    of service (DoS) for legitimate requests
   Installing a network analyzer on a network and capturing
    every packet that travels across it, revealing confidential
    information in clear text
   Piggybacking onto a network through an insecure 802.11b
    wireless configuration.
ETHICAL HACKING: What do ethical
hackers do?
 1.       FORMULATE A PLAN
         3 basic questions:
           What can an intruder see on the target systems?
           What can an intruder do with that information?
           Does anyone at the target notice the intruder’s attempts or
            successes?
         The “get out of jail free card”
           A contractual agreement between the client and the
            ethical hackers, who typically write it together.
           Protects the ethical hackers against prosecution
           Provides a precise description, usually in the form of
            network addresses or modern telephone numbers, of the
            systems to be evaluated.
ETHICAL HACKING: What do ethical
hackers do?
        “no-holds-barred” approach
          The agreement must describe how they should be tested
           once the target systems are identified.
        Testing may begin as define in the agreement
          Remote network- simulates the intruder launching an
           attack across the internet
          Remote dial-up network- simulates the intruder launching
           an attack against the client’s modem pools
          Local network- simulates an employee or other authorized
           person who has legal connection to the organization’s
           network
ETHICAL HACKING: What do ethical
hackers do?
     Stolen Laptop computer- the laptop computer of a key
      employee, such as an upper-level manager or strategist, is
      taken by the client without warning and given to the
      ethical hackers
     Social Engineering- evaluates the target organization’s
      staff as to whether it would leak information to someone
     Physical Entry- acts out a physical penetration of the
      organization’s building.
   The final report- collection of all of the ethical hacker’s
      discoveries made during the evaluation
ETHICAL HACKING: What do ethical
hackers do?
   1. SELECTING TOOLS
   As with any project, if you don’t have the right tools for
       ethical hacking, accomplishing the task effectively is
       difficult. Having said that, just because you see the
       right tools doesn’t mean that you will discover all
       vulnerabilities
   Many tools focus on specific tests, but no one tool can
       test for everything.
      to crack passwords, you need a cracking tool such as
        LC4, John the Ripper, or pwdump.
        A general port scanner, such as Superscan, may not crack
         passwords
ETHICAL HACKING: What do ethical
hackers do?
   1. SELECTING TOOLS
   As with any project, if you don’t have the right tools for
       ethical hacking, accomplishing the task effectively is
       difficult. Having said that, just because you see the
       right tools doesn’t mean that you will discover all
       vulnerabilities
   Many tools focus on specific tests, but no one tool can
       test for everything.
      to crack passwords, you need a cracking tool such as
        LC4, John the Ripper, or pwdump.
        A general port scanner, such as Superscan, may not crack
         passwords
ETHICAL HACKING: What do ethical
hackers do?
ETHICAL HACKING: What do ethical
hackers do?
   1.   EXECUTING THE PLAN
       Ethical Hacking can take persistence. Time and
        patience are important. Be careful when you’re
        performing your ethical hacking tests.
       Make sure you keep everything as quiet and private as
        possible. This is especially critical hen transmitting
        and soring your test results. If possible, encrypt these
        emails and files using Pretty Good Privacy (PGP) or
        something similar. At minimum, password-protect
        them.
ETHICAL HACKING: What do ethical
hackers do?
   1. Evaluating Results
    Assess your results to see what you uncovered,
      assuming that the vulnerabilities haven’t been made
      obvious before now. Submit a formal report to upper
      management or to your customer, outlining your
      results.
   3. Moving On
    When you’ve finished your ethical hacking tests, you
      still need to implement your analysis and
      recommendations to make sure your systems are
      secure.
ETHICAL HACKING: What do ethical
hackers do?
PRESENTED BY:


 ABARE, DONNA

AMON, GICHELLE

MARTES, ELVIN JAN

Contenu connexe

Tendances (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Software security
Software securitySoftware security
Software security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Network security
Network securityNetwork security
Network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Network security
Network security Network security
Network security
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 

En vedette

File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Touch screen technology-bharadwaj
Touch screen technology-bharadwajTouch screen technology-bharadwaj
Touch screen technology-bharadwajdhiru8342
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transactionHarsh Mehta
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 

En vedette (20)

File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Touch screen technology-bharadwaj
Touch screen technology-bharadwajTouch screen technology-bharadwaj
Touch screen technology-bharadwaj
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
IP Security
IP SecurityIP Security
IP Security
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 

Similaire à Network security

Online payments threats_report_matousec
Online payments threats_report_matousecOnline payments threats_report_matousec
Online payments threats_report_matousecAnatoliy Tkachev
 
The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...
The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...
The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...Avalon Media System
 
Digital ID World 2007 - Understanding Openid
Digital ID World 2007 - Understanding OpenidDigital ID World 2007 - Understanding Openid
Digital ID World 2007 - Understanding OpenidDavid Recordon
 
OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...opencloudware
 
OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...opencloudware
 
Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...
Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...
Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...opencloudware
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 

Similaire à Network security (11)

四大移动操作系统企业应用安全性和可管理性横向评测
四大移动操作系统企业应用安全性和可管理性横向评测四大移动操作系统企业应用安全性和可管理性横向评测
四大移动操作系统企业应用安全性和可管理性横向评测
 
Online payments-threats-2
Online payments-threats-2Online payments-threats-2
Online payments-threats-2
 
Online payments threats_report_matousec
Online payments threats_report_matousecOnline payments threats_report_matousec
Online payments threats_report_matousec
 
GTB DLP Brochure
GTB DLP BrochureGTB DLP Brochure
GTB DLP Brochure
 
The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...
The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...
The Avalon Media System: A Next Generation Hydra Head for Audio and Video Del...
 
Digital ID World 2007 - Understanding Openid
Digital ID World 2007 - Understanding OpenidDigital ID World 2007 - Understanding Openid
Digital ID World 2007 - Understanding Openid
 
GroteckSmartEvent
GroteckSmartEventGroteckSmartEvent
GroteckSmartEvent
 
OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative Project presented at Cloud Expo Europe 2012 in Lo...
 
OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...
OpenCloudware Collaborative project presented at Cloud Expo Europe 2012 in Lo...
 
Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...
Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...
Think to PaaS for Multi-IaaS Cloud Computing: the OpenCloudware collaborative...
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 

Plus de Gichelle Amon (20)

Kerberos
KerberosKerberos
Kerberos
 
Os module 2 d
Os module 2 dOs module 2 d
Os module 2 d
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Lec3 final
Lec3 finalLec3 final
Lec3 final
 
Lec 3
Lec 3Lec 3
Lec 3
 
Lec2 final
Lec2 finalLec2 final
Lec2 final
 
Lec 4
Lec 4Lec 4
Lec 4
 
Lec1 final
Lec1 finalLec1 final
Lec1 final
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contracts
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architecture
 
Time triggered arch.
Time triggered arch.Time triggered arch.
Time triggered arch.
 
Subnetting
SubnettingSubnetting
Subnetting
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Os module 2 ba
Os module 2 baOs module 2 ba
Os module 2 ba
 
Lec5
Lec5Lec5
Lec5
 
Delivery
DeliveryDelivery
Delivery
 
Addressing
AddressingAddressing
Addressing
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 

Dernier

Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Dernier (20)

Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Network security

  • 2. INTRODUCTION  Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world.
  • 3. WHAT IS NETWORK SECURITY?  Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.  Network security involves the authorization of access to data in a network, which is controlled by the network administrator.  Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.
  • 4. WHY DO WE NEED SECURITY?  Protect vital information while still allowing access to those who need it  Trade secrets, medical records, etc.  Provide authentication and access control for resources  Ex: AFS  Guarantee availability of resources  Ex: 5 9’s (99.999% reliability)
  • 5. SECURITY OBJECTIVES  IDENTIFICATION  AUTHENTICATION  ACCESS CONTROL
  • 6. IDENTIFICATION  Something which uniquely identifies a user and is called UserID.  Sometimes users can select their ID as long as it is given too another user.  UserID can be one or combination of the following:  User Name  User Student Number  User SSN
  • 7. AUTHENTICATION  The process of verifying the identity of a user  Typically based on  Something user knows  Password  Something user have  Key, smart card, disk, or other device  Something user is  fingerprint, voice, or retinal scans
  • 8. AUTHENTICATION: 2 SUB CONCERNS  GENERAL ACCESS AUTHENTICATION  To control whether or not a particular user has ANY type of access right to the element in question. Usually we consider these in the form of a “User Account”.  FUNCTIONAL AUTHORIZATION  Concern with individual user “rights”. What, for example, can a user do once authenticated? Can they figure the device or only see data.
  • 10. AUTHENTICATION: PROCEDURE  Authentication procedure  Two-Party Authentication  One-Way Authentication  Two-Way Authentication  Third-Party Authentication  Kerberos  X.509  Single Sign ON  User can access several network resources by logging on once to a security system.
  • 11. AUTHENTICATION: PROCEDURE C lie n t S e rv e r U se rID & P a ssw o rd O n e -w a y A u th e n tic a tio n A u th e n tic a te d S e rv e rID & T w o -w a y A u th e n tic a tio n P a ssw o rd A u th e n tic a te d T w o - P a r ty A u th e n t ic a tio n s
  • 12. AUTHENTICATION: PROCEDURE S e c u rity S e r v e r Se d or rv sw er as ID ed ,P ,P at ID as Au ic nt sw th nt ie e e or nt Cl th d ic Au at ed Exchange Keys C lie n t S e rv e r E x c h a n g e D a ta T h ir d -P a r ty A u th e n tic a tio n s
  • 13. ACCESS CONTROL  refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application.
  • 15. ENCRYPTION  In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  The reverse process, i.e., to make the encrypted information readable again, is referred to as DECRYPTION.
  • 16. ENCRYPTION: USES  Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives).  Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering  Encryption is also used to protect data in transit  Encryption, by itself, can protect the confidentiality of messages.
  • 17. ENCRYPTION: APPLICATIONS  Disk encryption software (also known as OTFE software)  File/folder encryption  Database encryption  Communication encryption software
  • 18. ENCRYPTION: APPLICATIONS  NETWORK TRAFFIC ENCRYPTION TOOLS  Generic  IPSec based
  • 20. WIRELESS SECURITY: INTRODUCTION  Very convenient to have wireless connections  Nightmare for security – the range for 802.11 is often a few hundred meters, so that one can spy on a company by leaving a laptop on in the parking lot  Many problems arise from the vendors trying to make their products as friendly as possible – when you plug the device it starts working right away, usually with no security by default.  Several ways wireless nets handle security  802.11i  Bluetooth  WAP 2.0
  • 21. WIRELESS SECURITY: 802.11 SECURITY  IEEE 802.11i specifies security standards for IEEE 802.11 LANs  Interoperable implementations called Wi-Fi Protected Areas (WPA)  Wireless Application Protocol (WAP) – standard to provide wireless phones and other wireless devices access to telephony and information services, including the internet.  WAP security primarily provided by Wireless Transport Layer Security (WTLS) – provides security between the mobile device and the WAP gateway to the Internet
  • 22. WIRELESS SECURITY: 802.11 SECURITY  802.11 standard prescribed a data link-level security protocol called WEP (Wired Equivalent Privacy) designed to make the security of a wireless LAN as good as that of a wired LAN.  WEP has been broken already in July 2001  Solution  Replace WEP with WPA (Wi-fi Protected Access) or WPA2  Final proposal in 802.11i: Robust Security Network (RSN)  The Wi-Fi Alliance certifies vendors in compliance with the full 802.11i specification under the WPA2 program.
  • 23. WIRELESS SECURITY: BLUETOOTH  Considerably shorter range than 802.11 – cannot be attacked from the parking lot but feasible to attack it from next office.  An attacker next door can read the signals from one’s keyboard or the data sent to the Bluetooth printer in the next office.  Bluetooth has 3 security modes ranging from nothing to full data encryption and integrity control – many users have security turned off.  Two devices must share a secret key – perhaps the user types a PIN in both
  • 24. WIRELESS SECURITY: BLUETOOTH  They negotiate the channel to be used and establish a 128-bit session key (some bits made public due to government restrictions)  Encryption uses a stream cipher called E0, integrity control uses SAFER+, both classical block-ciphers
  • 25. WIRELESS SECURITY: WAP 2.0  Introduced for handheld-devices connectivity (mobile phones)  Uses standard protocols in all layers  It is IP-based and it supports IPsec in the network layer  TCP connections protected by TLS in the transport layer  Uses HTTP client authentication  Probably better than 802.11 and Bluetooth because it only relies on well-known security standards.
  • 26. SECURITY PROCESSES HOW TO SECURE DATA IN THE NETWORK?
  • 27. SECURITY PROCESSES: INTRODUCTION  Some data is also confidential; not only do you want to lose it, you don’t want others to even view it without authorisation.  Let’s look at some ways to protect your all- important user data from loss and/or unauthorised access.  http://www.zdnet.co.uk/news/networking/2006/04/19
  • 28. SECURITY PROCESSES: 10 WAYS E Back up early or often- you can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups. i Use file-level and share-level security- to keep others out of data, the first step is to set permissions on data files and folders. If you have data in network shares, you can set share permissions to control which user accounts can and cannot access the files across the network. If you share the computer with someone else, you'll have to use file-level permissions (also called NTFS permissions, because they're available only for files/folders stored on NTFS-formatted partitions). File-level permissions are set using the Security tab on the properties sheet and are much more granular than share-level permissions.
  • 29. SECURITY PROCESSES: 10WAYS e Password-Protect Documents- Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, go to Tools | Options and click the Security tab. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used. You can also use zipping software such as WinZip or PKZip to compress and encrypt documents. Use EFS Encryption- Windows 2000, XP Pro, and Server 2003 support the Encrypting File System (EFS). You can use this built-in certificate-based encryption method to protect individual files and folders stored on NTFS-formatted partitions. Encrypting a file or folder is as easy as selecting a check box; just click the Advanced button on the General tab of its properties sheet. Note that you can't use EFS encryption and NTFS compression at the same time.
  • 30. SECURITY PROCESSES: 10 WAYS e Use Disk Encryption- Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users. Examples include PGP Whole Disk Encryption and DriveCrypt, among many others. r Make use of a public key infrastructure- A public key infrastructure is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party (a certification authority, either an internal one installed on a certificate server on your network or a public one, such as Verisign), certificate-based security is stronger. d Protect data in transit with IP Security- Your data can be captured while it's travelling over the network by a hacker with sniffer software (also called network monitoring or protocol analysis software). To protect your data when it's in transit, you can use IPsec — but both the sending and receiving systems have to support it.
  • 31. SECURITY PROCESSES: 10 WAYS e Secure Wireless Transmissions- Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely. You should send or store data only on wireless networks that use encryption, preferably WPA, which is stronger than WEP. e Use Rights Management to retain Control- If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it.
  • 33. ETHICAL HACKING  HACKER- A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. - One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
  • 34. ETHICAL HACKING: Definition  also called Penetration testing or white-hat hacking  Evaluate the target systems’ security and report back to the owners with the vulnerabilities they found and instructions for how to remedy them.  This method has been in use from the early days of computers.
  • 35. ETHICAL HACKING: Goals  Hack your systems in a non destructive fashion  Enumerate vulnerabilities and if, necessary, prove to upper management that vulnerabilities exists.  Apply results to remove vulnerabilities & better secure your systems.
  • 36. ETHICAL HACKING: History  The United States Air Force conducted a “security evaluation” of the Multics operating systems for “potential use as a two-level (secret/top secret) system.”  With the growth of computer networking, and of the Internet in particular, computer and network vulnerability studies began to appear outside of the military establishment  One of these was the work by Farmer and Venema, which was originally posted to Usenet in December of 1993.  Idea: assess the security of the system  Security Analysis Tool for Auditing Networks (SATAN)- program created by Farmer and Venema for auditing capability
  • 37. ETHICAL HACKING: Network- infrastructure Attacks  Connecting into a network through a rogue modem attached to a computer behind a firewall  Exploiting weaknesses in network transport mechanisms, such as TCP/IP and NetBIOS.  Flooding a network with too many requests, creating a denial of service (DoS) for legitimate requests  Installing a network analyzer on a network and capturing every packet that travels across it, revealing confidential information in clear text  Piggybacking onto a network through an insecure 802.11b wireless configuration.
  • 38. ETHICAL HACKING: What do ethical hackers do? 1. FORMULATE A PLAN  3 basic questions:  What can an intruder see on the target systems?  What can an intruder do with that information?  Does anyone at the target notice the intruder’s attempts or successes?  The “get out of jail free card”  A contractual agreement between the client and the ethical hackers, who typically write it together.  Protects the ethical hackers against prosecution  Provides a precise description, usually in the form of network addresses or modern telephone numbers, of the systems to be evaluated.
  • 39. ETHICAL HACKING: What do ethical hackers do?  “no-holds-barred” approach  The agreement must describe how they should be tested once the target systems are identified.  Testing may begin as define in the agreement  Remote network- simulates the intruder launching an attack across the internet  Remote dial-up network- simulates the intruder launching an attack against the client’s modem pools  Local network- simulates an employee or other authorized person who has legal connection to the organization’s network
  • 40. ETHICAL HACKING: What do ethical hackers do?  Stolen Laptop computer- the laptop computer of a key employee, such as an upper-level manager or strategist, is taken by the client without warning and given to the ethical hackers  Social Engineering- evaluates the target organization’s staff as to whether it would leak information to someone  Physical Entry- acts out a physical penetration of the organization’s building. The final report- collection of all of the ethical hacker’s discoveries made during the evaluation
  • 41. ETHICAL HACKING: What do ethical hackers do? 1. SELECTING TOOLS As with any project, if you don’t have the right tools for ethical hacking, accomplishing the task effectively is difficult. Having said that, just because you see the right tools doesn’t mean that you will discover all vulnerabilities Many tools focus on specific tests, but no one tool can test for everything.  to crack passwords, you need a cracking tool such as LC4, John the Ripper, or pwdump.  A general port scanner, such as Superscan, may not crack passwords
  • 42. ETHICAL HACKING: What do ethical hackers do? 1. SELECTING TOOLS As with any project, if you don’t have the right tools for ethical hacking, accomplishing the task effectively is difficult. Having said that, just because you see the right tools doesn’t mean that you will discover all vulnerabilities Many tools focus on specific tests, but no one tool can test for everything.  to crack passwords, you need a cracking tool such as LC4, John the Ripper, or pwdump.  A general port scanner, such as Superscan, may not crack passwords
  • 43. ETHICAL HACKING: What do ethical hackers do?
  • 44. ETHICAL HACKING: What do ethical hackers do? 1. EXECUTING THE PLAN  Ethical Hacking can take persistence. Time and patience are important. Be careful when you’re performing your ethical hacking tests.  Make sure you keep everything as quiet and private as possible. This is especially critical hen transmitting and soring your test results. If possible, encrypt these emails and files using Pretty Good Privacy (PGP) or something similar. At minimum, password-protect them.
  • 45. ETHICAL HACKING: What do ethical hackers do? 1. Evaluating Results  Assess your results to see what you uncovered, assuming that the vulnerabilities haven’t been made obvious before now. Submit a formal report to upper management or to your customer, outlining your results. 3. Moving On  When you’ve finished your ethical hacking tests, you still need to implement your analysis and recommendations to make sure your systems are secure.
  • 46. ETHICAL HACKING: What do ethical hackers do?
  • 47. PRESENTED BY: ABARE, DONNA AMON, GICHELLE MARTES, ELVIN JAN