SlideShare une entreprise Scribd logo
1  sur  20
SELÇUK ÜNİVERSİTESİ - Mühendislik Fakültesi
Bilgisayar Mühendisliği
BİLİŞİM TEKNOLOJİLERİ MÜHENDİSLİĞİ ANABİLİM DALI
BİLİŞİM GÜVENLİĞİ VE HUKUK DERSİ ÖDEV–1
24 Ekim 2016
DOÇ.DR. ŞAKİR TAŞDEMİR
Yük. Blig. Müh. Mustafa Aadel Mashjal
158229001009
2
What is network security?
(Ağ Güvenliği nedir?)
"Network security" refers to any activity designed to
protect the safety of your network and data. It
includes both hardware and software technologies.
Effective network security manages access to the
network. It targets a variety of threats and stops them
from entering on your network.
3
How does network security work?
Network security combines multiple layers of
defenses at the edge and in the network. Each
network security layer execute policies and
controls. Authorized users gain access to network
resources, but malicious actors are blocked from
carrying out threats.
4
How do I benefit from network security?
 protect proprietary information from attack.
- Trade secrets, medical records, etc.
 Provide authentication and access control for resources
- Ex: Andrew file system (AFS)
"is a distributed file system which uses a local cache to reduce
the workload and increase the performance of a distributed
computing environment".
 Guarantee availability of resources
- Ex: 5 9’s (99.999% reliability)
you get a total downtime “system is unavailable” of
approximately five minutes and nine seconds per year with
99.999% uptime “system is available” .
5
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Multinational companies
 ANYONE ON THE NETWORK
6
network access control (NAC)
it is a system that enables an authority to control
access based on a security policy.
Examples
PIN on an ATM cash machine
Password for logging in to a computer account
7
Common security attacks and their
countermeasures
 Finding a way into the network
– Firewalls
 Exploiting software bugs, buffer overflows
– Intrusion Detection Systems
 Denial of Service
– Ingress filtering, IDS
 TCP hijacking
– IPSec
 Packet sniffing
– Encryption (SSH, SSL, HTTPS)
8
firewall
-A firewall is a system that provides network security by
filtering incoming and outgoing network traffic based on a
set of user-defined rules.
- the purpose of a firewall is to reduce or eliminate the
occurrence of unwanted network communications while
allowing all legitimate communication to flow freely
9
firewall
.
 A firewall is like a castle with a
drawbridge
– Only one point of access into the network
– This can be good or bad
 Can be hardware or software
– Ex. Some routers come with firewall
functionality
– Windows XP and Mac OS X have built in
firewalls
10
Intranet
DMZInternet
Firewall
Firewall
Web server, email
server, web proxy,
etc
11
TCP Network Packets
TCP network traffic moves around a network in packets,
which are containers that consist of a packet header—this
contains control information such as source and destination
addresses, and packet sequence information—and the data
(also known as a payload). While the control information in
each packet helps to ensure that its associated data gets
delivered properly, the elements it contains also provides
firewalls a variety of ways to match packets against firewall
rules.
12
An intrusion prevention system
(IPS)
 Used to monitor for “suspicious activity”
on a network
– Can protect against known software
exploits, like buffer overflows
 Snort is an open-source, free and
lightweight network intrusion detection
system : www.snort.org
13
Denial of Service
 Purpose: Make a network service
unusable, usually by overloading the
server or network
 Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
– Mini Case Study: Code-Red
15-441 Networks Fall 2002
• SYN flooding usually executed by flooding the resource (site) with needless
requests in an attempt to overload systems and prevent legitimate requests.
A normal connection between a user (Alice) and a server.
The three-way handshake is correctly performed.
A normal connection between a user (Alice) and a server.
The three-way handshake is correctly performed.
SYN flooding
15-441 Networks Fall 2002
• ICMP is used by network administrator to exchange information about network
state, and also be used to ping other nodes to determine their operational status.
• The nodes which are operational return an echo message in response to a ping
message.
• In SMURF attack the Source IP address of a broadcast ping is forged
• Large number of machines respond back to victim, overloading it
SMURF
Internet
Perpetrator Victim
ICMP echo (spoofed source address of victim)
Sent to IP broadcast address
ICMP echo reply
15-441 Networks Fall 2002
• Distributed Denial of Service
– Same techniques as regular DoS, but on a much larger scale
– Example: Sub7Server Trojan and IRC bots
• Infect a large number of machines with a “zombie”
program
• zombie is a computer connected to the Internet that has
been compromised by a hacker, computer virus or trojan
horse program and can be used to perform malicious
tasks of one sort or another under remote direction.
Botnets of zombie computers are often used to spread e-
mail spam and launch denial-of-service attacks (DOS
attacks).
Distributed attacks
15-441 Networks Fall 2002
TCP reset attack, also known as "forged TCP resets",
"spoofed TCP reset packets" or "TCP reset attacks".
These terms refer to a method of tampering with
Internet communications. Sometimes, the tampering
is malicious; other times, it is beneficial.
TCP reset attack
15-441 Networks Fall 2002 18
Packet Sniffing
• How can we protect ourselves?
• SSH, not Telnet
– Many people at CMU still use Telnet and send their password in the
clear (use PuTTY instead!)
– Now that I have told you this, please do not exploit this information
– Packet sniffing is, by the way, prohibited by Computing Services
• HTTP over SSL
– Especially when making purchases with credit cards!
• SFTP, not FTP
– Unless you really don’t care about the password or data
– Can also use KerbFTP (download from MyAndrew)
• IPSec
– Provides network-layer confidentiality
TEŞEKKÜRLER.
24 Ekim 2016
20
Kaynakça
.
1. https://en.wikipedia.org/wiki/Information_security
2. http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm
3. https://en.wikipedia.org/wiki/Security_software
4. https://en.wikipedia.org/wiki/Network_security
5. https://en.wikipedia.org/wiki/Electronic_signature
6. https://en.wikipedia.org/wiki/E-commerce
7. https://en.wikipedia.org/wiki/E-government
8. http://whatis.techtarget.com/definition/Web-20-or-Web-2
9. http://whatis.techtarget.com/definition/ISO-27001
10. https://en.wikipedia.org/wiki/Cybercrime
11. http://www.cybercrimelaw.net/Turkey.html
12. http://portal.unesco.org/culture/es/files/39666/12517344053tk_copyri
ght_1951_2006_en.pdf/tk_copyright_1951_2006_en.pdf

Contenu connexe

Tendances

Tendances (19)

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Basic Knowledge About Denial Of Service Or DoS
Basic Knowledge About Denial Of Service Or DoSBasic Knowledge About Denial Of Service Or DoS
Basic Knowledge About Denial Of Service Or DoS
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ga13
Ga13Ga13
Ga13
 
Firewalls
FirewallsFirewalls
Firewalls
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Firewall
FirewallFirewall
Firewall
 

En vedette

Carlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera versionCarlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera version
Pepa Priego
 

En vedette (18)

Twitter.
Twitter.Twitter.
Twitter.
 
Actividad la reina de los colores
Actividad la reina de los coloresActividad la reina de los colores
Actividad la reina de los colores
 
Agregacion familiar y cancer
Agregacion familiar y cancerAgregacion familiar y cancer
Agregacion familiar y cancer
 
кормушки для птиц
кормушки для птицкормушки для птиц
кормушки для птиц
 
Lasegundaguerramundial 140503074410-phpapp01
Lasegundaguerramundial 140503074410-phpapp01Lasegundaguerramundial 140503074410-phpapp01
Lasegundaguerramundial 140503074410-phpapp01
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Apostila de teoria geral da administração
Apostila de teoria geral da administraçãoApostila de teoria geral da administração
Apostila de teoria geral da administração
 
Esculturas clásicas griegas
Esculturas clásicas griegasEsculturas clásicas griegas
Esculturas clásicas griegas
 
Objetivos de aprendizaje
Objetivos de aprendizajeObjetivos de aprendizaje
Objetivos de aprendizaje
 
Miembro inferior
Miembro inferior Miembro inferior
Miembro inferior
 
Fracasa Rapido para Alcanzar Exito
Fracasa Rapido para Alcanzar ExitoFracasa Rapido para Alcanzar Exito
Fracasa Rapido para Alcanzar Exito
 
ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1
ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1
ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1
 
Carlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera versionCarlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera version
 
Micropython el sílice y la serpiente
Micropython el sílice y la serpienteMicropython el sílice y la serpiente
Micropython el sílice y la serpiente
 
Arquitectura islamica
Arquitectura islamicaArquitectura islamica
Arquitectura islamica
 
Adam Phillip - Men's Clothing
Adam Phillip - Men's ClothingAdam Phillip - Men's Clothing
Adam Phillip - Men's Clothing
 
RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA
RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA
RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA
 
P.a.
P.a.P.a.
P.a.
 

Similaire à Network security

Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
Serious_SamSoul
 
write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
noreendchesterton753
 

Similaire à Network security (20)

Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Securitych1
Securitych1Securitych1
Securitych1
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network security
Network security Network security
Network security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network security
Network securityNetwork security
Network security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 

Dernier

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 

Dernier (20)

(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Network security

  • 1. SELÇUK ÜNİVERSİTESİ - Mühendislik Fakültesi Bilgisayar Mühendisliği BİLİŞİM TEKNOLOJİLERİ MÜHENDİSLİĞİ ANABİLİM DALI BİLİŞİM GÜVENLİĞİ VE HUKUK DERSİ ÖDEV–1 24 Ekim 2016 DOÇ.DR. ŞAKİR TAŞDEMİR Yük. Blig. Müh. Mustafa Aadel Mashjal 158229001009
  • 2. 2 What is network security? (Ağ Güvenliği nedir?) "Network security" refers to any activity designed to protect the safety of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering on your network.
  • 3. 3 How does network security work? Network security combines multiple layers of defenses at the edge and in the network. Each network security layer execute policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out threats.
  • 4. 4 How do I benefit from network security?  protect proprietary information from attack. - Trade secrets, medical records, etc.  Provide authentication and access control for resources - Ex: Andrew file system (AFS) "is a distributed file system which uses a local cache to reduce the workload and increase the performance of a distributed computing environment".  Guarantee availability of resources - Ex: 5 9’s (99.999% reliability) you get a total downtime “system is unavailable” of approximately five minutes and nine seconds per year with 99.999% uptime “system is available” .
  • 5. 5 Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Multinational companies  ANYONE ON THE NETWORK
  • 6. 6 network access control (NAC) it is a system that enables an authority to control access based on a security policy. Examples PIN on an ATM cash machine Password for logging in to a computer account
  • 7. 7 Common security attacks and their countermeasures  Finding a way into the network – Firewalls  Exploiting software bugs, buffer overflows – Intrusion Detection Systems  Denial of Service – Ingress filtering, IDS  TCP hijacking – IPSec  Packet sniffing – Encryption (SSH, SSL, HTTPS)
  • 8. 8 firewall -A firewall is a system that provides network security by filtering incoming and outgoing network traffic based on a set of user-defined rules. - the purpose of a firewall is to reduce or eliminate the occurrence of unwanted network communications while allowing all legitimate communication to flow freely
  • 9. 9 firewall .  A firewall is like a castle with a drawbridge – Only one point of access into the network – This can be good or bad  Can be hardware or software – Ex. Some routers come with firewall functionality – Windows XP and Mac OS X have built in firewalls
  • 11. 11 TCP Network Packets TCP network traffic moves around a network in packets, which are containers that consist of a packet header—this contains control information such as source and destination addresses, and packet sequence information—and the data (also known as a payload). While the control information in each packet helps to ensure that its associated data gets delivered properly, the elements it contains also provides firewalls a variety of ways to match packets against firewall rules.
  • 12. 12 An intrusion prevention system (IPS)  Used to monitor for “suspicious activity” on a network – Can protect against known software exploits, like buffer overflows  Snort is an open-source, free and lightweight network intrusion detection system : www.snort.org
  • 13. 13 Denial of Service  Purpose: Make a network service unusable, usually by overloading the server or network  Many different kinds of DoS attacks – SYN flooding – SMURF – Distributed attacks – Mini Case Study: Code-Red
  • 14. 15-441 Networks Fall 2002 • SYN flooding usually executed by flooding the resource (site) with needless requests in an attempt to overload systems and prevent legitimate requests. A normal connection between a user (Alice) and a server. The three-way handshake is correctly performed. A normal connection between a user (Alice) and a server. The three-way handshake is correctly performed. SYN flooding
  • 15. 15-441 Networks Fall 2002 • ICMP is used by network administrator to exchange information about network state, and also be used to ping other nodes to determine their operational status. • The nodes which are operational return an echo message in response to a ping message. • In SMURF attack the Source IP address of a broadcast ping is forged • Large number of machines respond back to victim, overloading it SMURF Internet Perpetrator Victim ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply
  • 16. 15-441 Networks Fall 2002 • Distributed Denial of Service – Same techniques as regular DoS, but on a much larger scale – Example: Sub7Server Trojan and IRC bots • Infect a large number of machines with a “zombie” program • zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e- mail spam and launch denial-of-service attacks (DOS attacks). Distributed attacks
  • 17. 15-441 Networks Fall 2002 TCP reset attack, also known as "forged TCP resets", "spoofed TCP reset packets" or "TCP reset attacks". These terms refer to a method of tampering with Internet communications. Sometimes, the tampering is malicious; other times, it is beneficial. TCP reset attack
  • 18. 15-441 Networks Fall 2002 18 Packet Sniffing • How can we protect ourselves? • SSH, not Telnet – Many people at CMU still use Telnet and send their password in the clear (use PuTTY instead!) – Now that I have told you this, please do not exploit this information – Packet sniffing is, by the way, prohibited by Computing Services • HTTP over SSL – Especially when making purchases with credit cards! • SFTP, not FTP – Unless you really don’t care about the password or data – Can also use KerbFTP (download from MyAndrew) • IPSec – Provides network-layer confidentiality
  • 20. 20 Kaynakça . 1. https://en.wikipedia.org/wiki/Information_security 2. http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm 3. https://en.wikipedia.org/wiki/Security_software 4. https://en.wikipedia.org/wiki/Network_security 5. https://en.wikipedia.org/wiki/Electronic_signature 6. https://en.wikipedia.org/wiki/E-commerce 7. https://en.wikipedia.org/wiki/E-government 8. http://whatis.techtarget.com/definition/Web-20-or-Web-2 9. http://whatis.techtarget.com/definition/ISO-27001 10. https://en.wikipedia.org/wiki/Cybercrime 11. http://www.cybercrimelaw.net/Turkey.html 12. http://portal.unesco.org/culture/es/files/39666/12517344053tk_copyri ght_1951_2006_en.pdf/tk_copyright_1951_2006_en.pdf