L1 Introduction
L1 Introduction
An introduction
• Data Security
• Database Security
• OS Security
• Program Security
Protective Measures or Controls
– Control is an action, device, procedure or
technique that reduces vulnerability.
Kinds of Threats
• Interception
• Release of message contents
• Traffic analysis
• Interruption
• Modification
• Fabrication
• To come with something different instead of
something existing one.
Interruption
Wiring,
eavesdrop
Modification
Replaced
intercept
info
Fabrication
Slide 14
Slide 15
Attack Descriptions
• IP Scan and Attack – Compromised system scans
random or local range of IP addresses and targets
any of several vulnerabilities known to hackers or left
over from previous exploits
• Web Browsing - If the infected system has write
access to any Web pages, it makes all Web content
files infectious, so that users who browse to those
pages become infected
• Virus - Each infected machine infects certain
common executable or script files on all computers
to which it can write with virus code that can cause
infection
Slide 16
Attack Descriptions
• Unprotected Shares - using file shares to copy viral
component to all reachable locations
• Mass Mail - sending e-mail infections to addresses found
in address book
• Simple Network Management Protocol - SNMP
vulnerabilities used to compromise and infect
• Hoaxes - A more devious approach to attacking
computer systems is the transmission of a virus hoax,
with a real virus attached
Slide 17
Attack Descriptions
• Back Doors - Using a known or previously unknown and
newly discovered access mechanism, an attacker can gain
access to a system or network resource
• Password Crack - Attempting to reverse calculate a password
• Brute Force - The application of computing and network
resources to try every possible combination of options of a
password
• Dictionary - The dictionary password attack narrows the field
by selecting specific accounts to attack and uses a list of
commonly used passwords (the dictionary) to guide guesses
Slide 18
Attack Descriptions
• Denial-of-service (DoS) –
– attacker sends a large number of connection or information
requests to a target
– so many requests are made that the target system cannot
handle them successfully along with other, legitimate requests
for service
– may result in a system crash, or merely an inability to perform
ordinary functions
• Distributed Denial-of-service (DDoS) - an attack in which
a coordinated stream of requests is launched against a
target from many locations at the same time
Slide 19
Slide 20
Attack Descriptions
• Spoofing - technique used to gain unauthorized
access whereby the intruder sends messages to a
computer with an IP address indicating that the
message is coming from a trusted host
• Man-in-the-Middle - an attacker sniffs packets from
the network, modifies them, and inserts them back
into the network
• Spam - unsolicited commercial e-mail - while many
consider spam a nuisance rather than an attack, it is
emerging as a vector for some attacks
Slide 21
Slide 22
Slide 23
Attack Descriptions
• Mail-bombing - another form of e-mail attack that is
also a DoS, in which an attacker routes large quantities
of e-mail to the target
• Sniffers - a program and/or device that can monitor data
traveling over a network. Sniffers can be used both for
legitimate network management functions and for
stealing information from a network
• Social Engineering - within the context of information
security, the process of using social skills to convince
people to reveal access credentials or other valuable
information to the attacker
Slide 24
Attack Descriptions
• Buffer Overflow –
– application error occurs when more data is sent to a buffer
than it can handle
– when the buffer overflows, the attacker can make the target
system execute instructions, or the attacker can take advantage
of some other unintended consequence of the failure
– Usually the attacker fill the overflow buffer with executable
program code to elevate the attacker’s permission to that of an
administrator.
Slide 25
Attack Descriptions
• Ping of Death Attacks --
– A type of DoS attack
– Attacker creates an ICMP packet that is larger
than the maximum allowed 65,535 bytes.
– The large packet is fragmented into smaller
packets and reassembled at its destination.
– Destination user cannot handle the
reassembled oversized papcket, thereby
causing the system to crash or freeze.
Slide 26
Attack Descriptions
• Timing Attack –
– relatively new
– works by exploring the contents of a web browser’s cache
– can allow collection of information on access to password-protected
sites
– another attack by the same name involves attempting to intercept
cryptographic elements to determine keys and encryption algorithms
Slide 27
OSI Security Architecture
• ITU-T X.800 Security Architecture for OSI
• defines a systematic way of defining and
providing security requirements
• for us it provides a useful, if abstract, overview
of concepts we will study
Services, Mechanisms, Attacks
• Encipherment
• Digital Signature
• Access Control
– Proxy Server
– Firewall
• Data Integrity
• Authentication Exchange
Security Mechanisms (X.800)
• specific security mechanisms:
– encipherment, digital signatures, access controls,
data integrity, authentication exchange, traffic
padding, routing control, notarization
• pervasive security mechanisms:
– trusted functionality, security labels, event
detection, security audit trails, security recovery
Model for Network Security
Model for Network Security
• using this model requires us to:
– design a suitable algorithm for the security
transformation
– generate the secret information (keys) used by the
algorithm
– develop methods to distribute and share the
secret information
– specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Security
• using this model requires us to:
– design a suitable algorithm for the security
transformation
– generate the secret information (keys) used by the
algorithm
– develop methods to distribute and share the
secret information
– specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Access Security
Model for Network Access Security