Professional Documents
Culture Documents
A virus is a malware, self replicating, piece of software whose intent is to harm the target system. VITAL INFORMATION RESOURCE UNDER SEIZE
exe files, .com, .dll, .htm, .asp, .jsp Cannot infect purely data files such as mp3, txt etc. Attached to the code of a file 90% of virus infections are a result of user igonrance. End user may unknowingly install malicious software on their system
Self Replicating Able to carry itself on a network Very Compact in File Size Contains piece of executable code Infects File-System
Avoid visiting suspicious websites Scan media properly Prevent running suspicious Programs
Reduced system performance Damage to System Hardware Reduced System Immunity Vulnerability towards vital information resource
What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures
Firewalls & Intrusion Detection Systems Denial of Service Attacks Social Problems
Dictionary.com says:
1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
etc.
Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
10
Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK
11
12
TCP hijacking
PSec
Packet sniffing
ncryption (SSH, SSL, HTTPS)
Social problems
ducation
13
These are security tools to impose restrictions on any part of network as desired. It basically segregates internal network of any organization from external network. Their implementation could be hard-wired or softwired. Example: Zone Alarm
14
Internet
Firewall
DMZ
Web server, email server, web proxy, etc
Firewall
Intranet
15
It is any hardware or software used to detect and prevent eavesdropping, masquerading, intrusion and encroachment into a network. It monitors all the activities on a network such as site access etc. Open Source IDS: Snort, www.snort.org
16
Example
IRIX vulnerability in webdist.cgi
17
18
I C I C
M M
e c h o S e n t t o P e c h o
( s p o o f e d s o u r c e a d d r e I P b r o a d c a s t a d d r e s s r e p ly
I n t e r n e t
e r p e t r a t o r
ic t i m
19
20
So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information
But, this solution is still not perfect
21
The Internet works only because we implicitly trust one another It is very easy to exploit this trust The same holds true for software It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
22