Chapter 01 Introduction To Network Security
Chapter 01 Introduction To Network Security
Mazlan Osman
Contents
Introduction
The Basics of a Network
Understanding Security Terminology
Approaching Network Security
2
Introduction
3
The Basics of a Network
Data packets
4
Basic Network Structure
5
Data Packets
6
What Does This Mean for Security?
7
Assessing Likely Threats to the
Network
There are two perspectives in relation to
security:
First, there is no real threat
Second, all hackers are experts and out to break
into my network
8
Assessing Likely Threats to the
Network cont.
No real threat:
Fosters a laissez-faire attitude toward security
Promotes a reactive approach to security
Security measures are not put in place until after a
breach has occurred
This approach must be avoided at all costs
9
Assessing Likely Threats to the
Network cont.
Expert hackers out to get me?
Yes, they exist, but not to the extent publicized
Lesser skilled hackers are more pervasive
These target smaller companies
Usually experts seek high profile networks
Financial and ideological gain are the targets
10
Assessing Likely Threats to the
Network cont.
The only practical approach is the realistic
one
This approach is a moderate solution to the
two extremes
Assessment is a complex task
Many factors need to be addressed
11
Classifications of Threats
12
Classifications of Threats cont.
13
Intrusion-type Attacks on Security
Intrusion
Gain unauthorized access to a system through a breach
in the security of that network or machine on the
network.
Blocking
Prohibit legitimate traffic or access to the network
resources. (e.g. DoS, DDoS)
Malware
Software with a malicious intent that is installed on a
machine includes all viruses, worms, trojan horses, etc.
This is the most common threat.
14
Intrusion-type Attacks on Security
Social engineering
A broad range of malicious activities accomplished
through human interactions such as phishing.
War-dialing
Occurs when an attacker systematically calls a
sequence of phone numbers in order to find an
inadequately protected system on a modem.
War-driving
Attackers who wander through areas searching for
wireless capabilities
15
Malware
Additional discussion is needed:
Viruses
A program that can damage computer system and self-
replicated with human assistance
Worms
A type of virus that is a malicious, self-replicating
program that can spread throughout a network without
human assistance
Trojan horses
A program that looks benign but actually has a malicious
purpose.
16
Malware
17
Blocking-type Attacks
Denial-of-Service (DoS)
An attack meant to shut down a machine or
network, making it inaccessible to its intended
users and it can be accomplished this by flooding
the target with traffic or sending it information that
triggers a crash.
Dynamic Denial of Service
Occurs when multiple systems attacked by DoS
and sometimes called Distributed DoS
18
Likely Attacks
19
Threat Assessment
20
Threat Assessment cont.
21
Understanding Security Terminology
Hacking terminology
Security terminology
22
Understanding Security Terminology
cont.
Hacking terminology (people & activity)
White hat hackers
Often referred to as ethical hackers
Specializes in ethical hacking tools, techniques, and
methodologies to secure an organization’s information
systems.
Black hat hackers
Individual who attempts to gain unauthorized entry into a
system or network to exploit them for malicious reasons
Does not have any permission or authority to
compromise their targets
23
Understanding Security Terminology
cont.
Hacking terminology (people & activity)
Gray hat hackers
Grey hats exploit networks and computer systems in the
way that black hats do but do so without any malicious
intent.
Script kiddy
A script kiddie (also known as a skid or skiddie) is an
unskilled hacker who breaks into computer systems by
using automated tools written by others (usually by other
black hat hackers).
24
Understanding Security Terminology
cont.
Hacking terminology (people & activity)
Cracker
A hacker who intend to crack down the system usually
password.
Phreaking
An individual fascinated by the telephone system.
Commonly, an individual who uses his knowledge of the
telephone system to make calls at the expense of
another.
25
Understanding Security Terminology
cont.
Security terminology (devices & policies)
Firewall
A firewall is a barrier between a network and the outside
world. Sometimes a firewall takes the form of a
standalone server, sometimes a router, and sometimes
software running on a machine
Proxy server
Security device used with a firewall to hide the internal
network’s IP address and present a single IP address
(its own) to the outside world.
26
Understanding Security Terminology
cont.
Security terminology (devices & policies)
Intrusion-detection system
IDS simply monitors traffic, looking for suspicious activity
that might indicate an attempted intrusion.
Authentication
The process of determining if the credentials given by a
user or another system (such as a username and
password) are authorized to access the network
resource
27
Understanding Security Terminology
cont.
Security terminology (devices & policies)
Auditing
The process of reviewing logs, records, and procedures
to determine if these items meet standards.
28
Approaching Network Security
29
Approaching Network Security
Proactive (dynamic)
A dynamic or proactive defence is one in which
steps are taken to prevent attacks before they
occur.
Reactive (passive)
A passive security approach takes few or no steps
to prevent an attack.
Hybrid approach
Encompasses multiple security paradigms that
overlap or are combined to tighten security.
30
Approaching Network Security cont.
31
Summary
32
Summary cont.
34