Chapter 7
NETWORK SECURITY
Security
Security is about the well-being (integrity) of
computer systems and data
Network security is the protection of data,
networks and computing power.
Network security refers to techniques for
ensuring that data stored in a computer
cannot be read or compromised by any
individuals without authorization.
2
Why Computer Security?
Computer security is required because most organizations
can be damaged by software (malicious software) or
intruders (hackers and crackers).
The damages include:
Damage to computer systems (hardware and software)
Damage of internal data/information
Loss of sensitive information to hostile parties.
Use of sensitive information to steal items of monetary
value.
Use of sensitive information against the organization's
customers
Damage to the reputation of an organization.
3 Losing the ability to use the system
Who is vulnerable?
Financial institutions and banks
Internet service providers (ISP)
Government and defense agencies
Social medias
Contractors to various government agencies
Multinational corporations
ANYONE ON THE NETWORK/INTERNET
4
Who is the most secured?
“The most secure
computers are
those not
connected to the
Internet and
shielded from any
interference”
5
Computer Security Goals
Computer security addresses the following
goals:
Confidentiality
Confidentiality
Integrity
Availability Integrity
Availability
6
Confidentiality
The requirement that information maintained
by a computer system be accessible only by
authorized individuals.
Is the cover-up of information or resources.
The need for keeping information secret
arises from the use of computers in sensitive
fields such as government and financial
companies.
7
Integrity
Refers to the trustworthiness of data or resources
Integrity is preventing from unauthorized change.
Guarding against information modifications or
destruction.
Modification occurs when an unauthorized
users not only gains access to but changes a
resource such as data or the execution of a
running process.
8
Availability
Availability refers to the ability to use the
computer system and information resources at
desired times by authorized parties (24/7)
Availability is an important aspect of reliability
Unavailable system is at least as bad as no system
at all.
Interruption occurs when an unauthorized party
reduces the availability of or to a resource.
9
Security Threats
A computer security threat is any person,
act, or object that poses a danger to
computer security
A threat is a potential violation of security.
The effects of threats can be an affect on the
Confidentiality of data
Integrity of data
Availability of a system.
10
Causes of Security Threats
Physical threats:
weather, natural disaster, bombs, power failures,
terrorism, etc.
Human threats:
stealing, fraud, bribery, spying, sabotage,
accidents.
Software threats:
viruses, worms, Trojan horses, denial of service.
11
Types of Security Threats/Attacks
Fraud and Theft
Loss of Physical and Infrastructure Support
Intruders
Malicious Software
Threats to Personal Privacy
Denial of Service (DoS)
12
Fraud and Theft
An illegal taking of another’s physical,
electronic, or intellectual property
Insiders or outsiders can commit computer
fraud and theft.
Insiders (authorized users of a system) are
responsible for the majority of fraud.
13
Loss of Physical and Infrastructure Support
Power failures
Outages
a period when a power supply is not available
Spikes
contain very high voltages
Brownouts
reduction in the availability of electrical power
Disasters (natural and man-made)
14
Intruders
Intruders are usually trying to gain access to a
system, or to increased privileges to which they are
not entitled, often by obtaining the password for a
legitimate account.
Hacking: is any attempt to intrude or gain
unauthorized access to your system.
It can be via some operating system flaw or other
means.
It may or may not be for malicious purposes.
Cracking: is hacking conducted for malicious
purposes
15
Malicious Software
The most sophisticated threats to computer systems are
through malicious software, sometimes called malware.
Malware attempts to cause damage to, or consume the
resources of a target system.
Malicious code can attack personal computers and other
platforms.
Malicious Software refers to
Virus
Trojan Horse
Worm
Logic bomb
Trap door
Zombie
16
Virus
A small program that replicates and hides itself
inside other programs usually without your
knowledge
A virus is a program that can ”infect” other
programs by modification, as well as causing local
damage. Such modification includes a copy of the
virus, which can then spread further to other
programs.
The new copy of the virus is executed when a user
executes the new host program.
Similar to biological virus: Replicates and Spreads
17
Worm
Worm is an independent program that
spreads via network connections, typically
using either email, remote execution etc.
Worm reproduces by copying itself from one
computer to another and causes it to execute;
no user intervention is required
It can do as much harm as a virus
It often creates denial of service (DoS)
18
Trojan Horse
Seems to do something good but covertly doing
something else.
Secretly downloading a virus or some other type
of mal-ware on to your computers.
Popular mechanism for hiding a virus or a worm
Trojans can be employed by cyber-thieves and hackers
trying to gain access to users' systems
19
Spy-wares
A software that literally spies on what you do on your
computer.
Example: Simple Cookies and Key Loggers
Logic Bomb
one of oldest types of malicious software
code embedded in legitimate program (Trojan horse)
activated when specified conditions met
eg presence/absence of some file
particular date/time
particular user
particular series of keystrokes
when triggered typically damage system
modify/delete files/disks
20
Trap door/Backdoor
▪ Is a mechanism built into a system by its
designer
▪ A trapdoor usually gives the designer away to
sneak back into the system
▪ Gives the original designer a secret route into
the system
21
The effects of malicious software
Corrupting the systems data
Increasing file size
Formatting the hard disk
Slowing down the system
Renaming all files with different name
Display error messages
22
Denial of Service Attack
DoS Attack:
Is blocking access of legitimate users to a
service.
It aims to inhibit the normal use of
communication facilities
Make a network service unusable, usually
by overloading the server or network
23
Types of Security
Physical security
Keeping rooms, computers locked
A combination of locks and alarms is an excellent
theft prevention system for computer
Surge protectors and uninterruptable power
supplies (UPS) are a low cost investment that can
save very costly equipment damage.
24
Physical security
25
Logical security
concerned with security of data stored on
devices connected to the network.
It involves
controlling passwords and password
policies
controlling access to data on servers
controlling access to backup tapes
preventing sources outside the network
26
from gaining access to the network
Security Solutions
There are a number of basic ways that a computer can be made
more secure.
Backups/disaster recovery
Encryption
Authentication
Validation
Data Protection
Anti-Viruses
Firewall
Intrusion Detection System (IDS)
27
Backups (redundancy/disaster recovery)
The purpose of a backup is to make a copy of
data, which is unlikely to be lost or destroyed.
If we want a backup to be protected from
some accidents that would destroy the data,
we have to store it in a different physical
location.
Backups can be done on tapes, disks and at a
different physical location by using network
copying.
28
Backups
There are two kinds of backup
Full dump: copies every file on a source medium to a
backup medium.
Incremental or differential dump: copies files
according to the level of the dump.
A level 0 dump copies everything.
A level 1 dump copies everything, which has
changed since the last level 0 dump.
A level 2 dump copies everything which has changed
since the last level 1 dump or level 0 dump and so
on.
30
Encryption
Process of converting plaintext (readable data)
into ciphertext (unreadable characters) to prevent
unauthorized parties from viewing or modifying
it.
Encryption key specifies the transformation of
plaintext into ciphertext, and vice versa for
decryption algorithms
To read the data, the recipient must decrypt, or
decipher the data
The security of encryption lies in the ability of an
algorithm to generate ciphertext that is not easily
reverted to the original plaintext
31
Authentication
Authentication is the process of proving his or her
identity using username and password to gain access to
a system, network or web site.
The username and password combination is often
referred to as a person’s credentials and it is frequently
sent over networks.
Item that you must carry to gain access to computer or
facility are called personal identification number (PIN)
32
Validation
Validation describes the ability to provide
assurance that a sender’s identity is true and that a
message, document or file has not been modified.
Encryption can be used to provide validation by
making a digital fingerprint of the information
contained within a message.
A digital fingerprint is a code that uniquely
identifies a file or a message by reflecting the
content of the file with tremendous specificity.
33
Antiviruses
To prevent viruses from entering a system there
are two options.
▪ Isolate the machine
▪ disconnect it from the Internet or any other
network, not using floppy disks, CD-ROMs or
any other removable disks.
▪ This way one can be sure that no virus enters
into the computer.
34
Antiviruses
▪ Install an Antivirus program
Antivirus programs are designed to keep a
watch at all incoming files so that no
malicious code can enter the computer.
Antivirus is a software utility, which
searches the hard disk for viruses and
removes which are found.
35
Antiviruses
Most Antivirus programs include an auto-
update feature that enables the program to
download profiles of new viruses so that it
can check for the new viruses as soon as they
are discovered.
AVG, Norton, Kaspersky, AVAST and
McAfee are some of the examples of
Antivirus programs.
36
Functions of anti-viruses
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion and overwriting of infected objects
37
Firewall
A firewall is a security system consisting of
hardware and/or software that prevents
unauthorized network access
A firewall is a network component that provides
a security barrier between networks or network
segments.
Firewalls are generally set up to protect a
particular network or network component from
attack, or unauthorized penetration by outside
invaders.
38
Firewall
Internet DMZ
Web server, email
server, web proxy,
Firewall
Firewall
etc
Intranet
39
Firewall
40
Intrusion Detection System (IDS)
An IDS gathers and analyzes information from
various areas within a computer or a network to
identify possible security breaches
Used to monitor for “suspicious activity” on a
network
It detects both intrusions and misuse
Freeware IDS exist e.g. snort (www.snort.org)
41
Intrusion Detection System (IDS)
Intrusion detection functions include
Monitoring and analyzing both user and system
activities
Analyzing system configurations and vulnerabilities
Assessing system and file integrity
Ability to recognize patterns typical of attacks
Analysis of abnormal activity patterns
Tracking user policy violations
42
Network Security Tools
✓ Nessus- vulnerability scanners
✓ Wireshark-- packet sniffers
✓ Snort (IDS- - intrusion detection system
✓ Netcat-- Netcat)
✓ Metasploit -Framework (vulnerability exploitation tools)
✓ HPing2 -- packet crafting tools
✓ Kismet -- wireless tools or packet sniffers
✓ TCPDump --- packet sniffers
✓ Cain and Abel (password crackers or packet sniffers)
✓ John The Ripper (password crackers)
43