The document discusses various threats to computer networks including network intrusion, security threats, social engineering, phishing and different types of attacks like viruses, worms, Trojan horses, denial of service attacks. It also covers security policies, software patching and keeping antivirus software up to date.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
14 views
Chapter4 - Basic Security
The document discusses various threats to computer networks including network intrusion, security threats, social engineering, phishing and different types of attacks like viruses, worms, Trojan horses, denial of service attacks. It also covers security policies, software patching and keeping antivirus software up to date.
Upon completion of this topic students will be able to:
4.3 Understand networking threats 4.3 .1 Describe risks of network intrusion 4.3 .2 Identify types of security threat for a given scenario 4.3 .3 Determine sources of network intrusion 4.3 .4 Explain social engineering and phishing in networking LEARNING OUTCOMES
4.5 Understand security policy
4.5 .1 Explain common security measures
4.5 .2 Identify importance of updated software and patches 4.5.3 Explain update software patches and antivirus latest Patterns RISKS OF NETWORK INTRUSION Once the hacker gains access to the network, four types of threat may arise: SOURCES OF NETWORK INTRUSION Security threats from network intruders can come from both internal and external sources. SOCIAL ENGINEERING AND PHISHING IN NETWORKING Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people. PHISHING • Phisher pretends to represent a legitimate outside organization. • Typically contact the target individual (the phisher) via email. • Ask for verification of information, such as passwords or usernames in order prevent some terrible consequence from occurring PHISHING PRETEXTING
• Pretexting is a form of social engineering where an
invented scenario (the pretext) is used on a victim in order to get the victim to release information or perform an action. • The target is typically contacted over the telephone. VISHING
• A new form of social engineering that uses Voice
over IP (VOIP) • With vishing, an unsuspecting user is sent a voice mail, instructing them to call a number which appears to be a legitimate telephone-banking service. • The call is then intercepted by a thief. • Bank account numbers or passwords entered over the phone for verification is then stolen. METHODS OF ATTACK Viruses, worms, and Trojan horses. VIRUSES
Program that runs and spreads by modifying other programs or files
Needs to be activated - replicate itself and spread Use all available memory and bring a system to a halt Delete or corrupt specific files before spreading Transmitted via email attachments, downloaded files, instant messages or via diskette, CD or USB devices. WORMS
Similar to a virus but does not need to attach itself to an
existing program. A worm uses the network to send copies of itself to any connected hosts. Run independently and spread quickly. Do not require activation or human intervention. Self-spreading network worms - greater impact than a single virus Can infect large parts of the Internet quickly. TROJAN HORSES
Non-self replicating program that is written to appear like
a legitimate program A Trojan horse relies upon its legitimate appearance to deceive the victim into initiating the program. May be relatively harmless or can contain code that can damage the contents of the computer's hard drive. Create a back door into a system allowing hackers to gain access. DENIAL OF SERVICE
SYN (synchronous) Flooding:
a flood of packets are sent to a server requesting a client connection. contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests Ping of death: Send packet greater size than the maximum allowed by IP (65,535 bytes) cause the receiving system to crash. DENIAL OF SERVICE (DOS) DISTRIBUTED DENIAL OF SERVICE (DDOS) • Operates on a much larger scale than DoS attacks BRUTE FORCE ATTACKS
A fast computer is used to try to guess passwords or to
decipher an encryption code. The attacker tries a large number of possibilities in rapid succession to gain access or crack the code. Can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts. SPYWARE, TRACKING COOKIES, ADWARE AND POP-UPS ADWARE
Used to collect information about a user based on websites
the user visits- for targeted advertising. Commonly installed by a user in exchange for a "free" product. When user opens browser window, Adware start new browser instances attempt to advertise products/services Can open repeatedly - make surfing very difficult Difficult to uninstall. POP-UPS
Additional advertising windows that display when
visiting a web site. Not intended to collect information about the user Typically associated only with the web-site being visited. Can be annoying and usually advertise products or services that are undesirable. SPAM
Unwanted bulk email
Can overload ISPs, email servers and individual end-user systems. Can be sent via email or more recently via Instant messaging software. Consumes large amounts of Internet bandwidth SPAM SECURITY POLICY
A formal statement of the rules that users must adhere to
when accessing technology and information assets Central point for how a network is secured, monitored, tested and improved upon SECURITY POLICY
i. Identification and authentication policies
ii. Password policies iii. Acceptable use policies iv. Remote access policies v. Network maintenance procedures vi. Incident handling procedures SECURITY POLICY The security tools and applications used in securing A network PATCHES AND UPDATES Patch - a small piece of code that fixes a specific problem. Update - include additional functionality to the software package as well as patches for specific issues. SOFTWARE PATCHES AND ANTI- VIRUS LATEST PATTERNS Anti-virus software – detecting virus SIGNS THAT A VIRUS, WORM OR TROJAN HORSE MAY BE PRESENT:
Computer starts acting abnormally
Program does not respond to mouse and keystrokes. Programs starting or shutting down on their own. Email program begins sending out large quantities of email CPU usage is very high There are unidentifiable, or a large number of, processes running. Computer slows down significantly or crashes SIGNS THAT A VIRUS, WORM OR TROJAN HORSE MAY BE PRESENT
Blue screen of death (BSOD) - is an error screen displayed on a Windows
computer system following a fatal system error. It indicates a system crash, in which the operating system has reached a condition where it can no longer operate safely. SUMMARY
Networks can be open to intrusion through
vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective network security is based on a variety of products and services, combined with a thorough security policy.