CNPT 3220 Network Security
CNPT 3220 Network Security
Dishonest
employees
16%
http://www.sans.org/newlook/resources/errors.htm
There are four general categories of security threats
to the network:
Unstructured threats
Structured threats
Internal
External threats exploitation
Internet Dial-in
Internal threats exploitation
Compromised
host
What is the difference?
Threat:
A person, thing, event, or idea which poses some danger
to an asset in terms of that asset's confidentiality,
integrity, availability, or legitimate use.
Attack:
A realization of a threat
Any action that attempts to compromise the security of
the information owned by an organization or person
Reconnaissance attacks
Access attacks
Denial of service attacks
Worms, viruses, and Trojan horses
Network reconnaissance refers to the overall act of learning
information about a target network by using publicly available
information and applications. Includes:
Information gathering
Attempts to illicitly map your network
Port Scans, Ping Sweeps, Sniffers, and so on.
Not designed to gain access or attack a specific target.
The information can be used at a later date to launch one of
the other attack types.
These types of attacks can be viewed as a warning to an
oncoming incident.
Scan for open TCP/UDP ports
Collect server type and version information
“Clever” port scans
Do not complete TCP handshake (no final ACK)
Drown the scan with large number of spoofed probing
packets
OS fingerprinting
Network reconnaissance cannot be prevented entirely.
IDSs at the network and host levels can usually notify an
administrator when a reconnaissance gathering attack (for
example, ping sweeps and port scans) is under way.
The general description that Cisco uses to group most attack
signatures into.
These attacks can be broken down into three subcategories:
Unauthorized Data Retrieval
Unauthorized System Access
Unauthorized Access Elevation
These attacks are not intended to actually manipulate data or
gain access to systems.
These attacks are designed simply to secretly remove a service
from the public’s view.
Viruses refer to malicious software that are attached to
another program to execute a particular unwanted function
on a user’s workstation. End-user workstations are the
primary targets.
A Trojan horse is different only in that the entire application
was written to look like something else, when in fact it is an
attack tool. A Trojan horse is mitigated by antivirus software at
the user level and possibly the network level.
Find a scanner for latest OS/server vulnerabilities and
scan a wide range of address space
Use available exploits to gain access
Hide yourself on attacked host
Install sniffers to collect passwords on remote sites.
“A security policy is a formal statement of the
rules by which people who are given access
to an organization’s technology and
information assets must abide.”