David Gamez IUA and the Autumn 2007 Security

Size: px
Start display at page:

Download "David Gamez IUA and the Autumn 2007 Security"

Transcription

1 Overview Computer Security Vast topic only space here to touch on some of the key issues. Extremely important sloppy computer security costs time, money and even lives. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Bad Computer Security Costs Loss of data - code, financial information, plans for new cars etc. Loss of information about employees - National Insurance numbers, bank details, etc. Loss of customer information - credit card numbers etc. Loss of reputation no one wants to use with a bank whose security has been compromised. Bad Computer Security Costs Loss of cash many electronic attempts to steal money from banks. Loss of service if the website is down it can t deliver services or sell goods. Customers will go elsewhere. Loss of work time if the computer network is compromised, employees cannot do their job. Clean up time network administrators have to spend a lot of time cleaning up the mess. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Costs Graph Taken from: David Gamez IUA Week 5 Autumn Costs Graph Shows that the most reported types of attacks are not the ones that cause the greatest losses. Theft of proprietary information (reported by 21%) and denial of service (reported by 42%) accounted for 67.3% of total money losses ($135.8 million out of $201.8 million). Companies estimates of losses due to cyberattacks should be interpreted with caution! David Gamez IUA Week 5 Autumn

2 Physical Access Vulnerabilities Often overlooked, but it is the easiest way to access an organization. Staff member holds door open for the person behind them. They plug their computer into the network or shoulder surf a password and steal the organization s information. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Phone The hacker phones someone in the organization and claims to be the network administrator. Requests username and password for a test. Many users will give this information, especially if the attacker is persuasive or threatening and knows the name of their boss. Sniffing Easy to listen on a network to access the information being sent across it. All unencrypted information can be read. Can access passwords, s, sensitive documents etc. Ethereal: David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Scanning Scanning software used to probe the network to find out: IP addresses of other machines. Ports open on other machines. Services running on these ports Vulnerabilities Network scanning discovers the machines on the network. Vulnerability scanning discovers vulnerabilities on a given machine. Network Access Company is running a program that is listening on a particular port, perhaps the DBMS, a webserver or something else. Malicious software on another computer sends packets containing a buffer overflow attack (for example). This starts a new application on the compromised computer, which may download other code and attack other machines in turn. Can be run from anywhere in the world. Easier when you have physical access to the company network. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

3 Wireless Access An organization s wireless networks can be accessed without physical access. With a suitable aerial, this can be over a long distance. Wireless security (or WEP) can be cracked easily once you have captured enough packets. Wireless networks should always be isolated from main networks. Or communications over wireless should themselves be encrypted, using virtual private networks (VPN), for example. Malicious Websites Exploit buffer overflow vulnerability or similar to execute arbitrary code on users computer. User just has to view site using a vulnerable browser for example Internet Explorer. One common response is to maintain a list of dangerous websites and automatically block access to them. Also worth using a better browser, such as Firefox (see Resources). David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn s can be sent to members of the organization containing malicious code. Sometimes these are very obvious, such as FILENAME.exe, and the user has to take action to run the file and install the virus. Other attachments can exploit vulnerabilities in Windows to automatically run the code when the is viewed. Sometimes the user is given a link to a website that breaks into the computer when the user clicks on it. Sometimes the user is tricked into entering their login details on a bogus website. s may also contain ActiveX or JavaScript code that can hack the system. s often use clever social engineering to make the user click on the link or install the code. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Buffer Overflow Attacks Common way for malicious software to access the system. Exploits a program that does not check the length of a piece of data. Provides a way for an attacker to execute arbitrary code on a remote computer. Often part of other methods of attack, such as or website. Buffer Overflow Attack Two requirements: Inject attack code The attacker provides an input string that is actually executable, binary code native to the machine being attacked. Typically this code is simple, and does something similar to exec("sh") to produce a root shell. Change return address There is a stack frame for a currently active function above the buffer being attacked on the stack. The buffer overflow changes the return address to point to the attack code. When the function returns, instead of jumping back to where it was called from, it jumps to the attack code. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

4 Buffer Overflow Attacks Protection Use safe C libraries that check the amount of data that is being copied. Stack smashing protection checks to see if stack has been altered before returning and throws error if it is has changed. Separate executable code from data on the stack supported by some CPUs. Address space randomization addresses are different in each copy of Windows Vista, for example. Scan packets for buffer overflow exploits using an intrusion detection system. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Format String Attack Exploits function in C that carries out string formatting, such as printf( ). Program is forced to overwrite the address of a library function or the return address on the stack with a pointer to some malicious code. The malicious code is executed and installs itself on the user s computer. SQL Injection SQL Injection takes advantage of the syntax of SQL to inject commands that read or modify a database, or compromise the meaning of the original query. Russian hackers broke into a Rhode Island government web site and allegedly stole 53,000 credit card numbers. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn UN Website Compromised by SQL Injection SQL Injection Example Breaks code that controls access to a website. Form has a user name and password field. Both are assumed to be an ordinary string. The following SQL is used to query database with user supplied information. If this returns 1 row, the user is given access. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

5 SQL Code SELECT UserList.Username FROM UserList WHERE UserList.Username = 'Username' AND UserList.Password = 'Password' What if an unauthorized user types mypassword OR 1 = 1? SQL Code SELECT UserList.Username FROM UserList WHERE UserList.Username = 'Username' AND UserList.Password = 'password' OR '1'= '1' Now the query will always return one row (assuming the username is correct) and the attacker will gain unauthorized access. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Worms Malicious Software Spread over networks by attacking vulnerable services. Generally are not malicious, but may provide a way in which other malicious software can spread. Main impact is consuming network resources so that websites etc. can no longer be reached. For example, Blaster and Slammer worms. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Viruses Malicious code that spreads through a variety of methods. Distributed through malicious websites. Sends s using addresses harvested from the user s computer Network attack Copies itself into shared folders and removable media. David Gamez IUA Week 5 Autumn Trojan Software that is often installed by a virus (although there is not a clear distinction between the two). May contain a key logger, which records all of the keystrokes on the computer. Can be used to control many other features of the computer. May block access to anti-virus websites. May stop user running the Task Manager. David Gamez IUA Week 5 Autumn

6 Trojan May stop installation of anti-virus programs. May delete all or some of the data on your computer. Often gathers credit card details and other information for identity theft. Often sends spam s. Attacks other computers, either by sending , copying files or via scanning + network attack. David Gamez IUA Week 5 Autumn Rootkit Piece of code that hides itself in the operating system. Often changes the behaviour of the operating system so the root kit is completely invisible to the user. Common way for malicious software to hide itself. Viruses and trojans can be removed relatively easily. May take a complete reinstall to get rid of rootkits. David Gamez IUA Week 5 Autumn Sony Rootkit Recent case in which Sony installed a rootkit as part of its copy-prevention software. Interfered with the normal way in which the Microsoft Windows operating system played CDs. Opened security holes that allowed viruses to break in, and caused other problems. Sony Rootkit More than half a million computers worldwide were infected with Sony rootkit. Lawsuit claimed that the rootkit had damaged users computers. Sony removed software from shelves and offered to replace the copy-protected CDs with non-copy-protected CDs. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Spyware Often installed as part of a free or cheap application. Sends back private information to companies, possibly about the user s browsing habits etc. Not always recognized by anti-virus software. Specialized anti-spyware software can be used to recognize and remove it (see Resources section). Human Attackers David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

7 Overview Have covered how different types of malicious software are distributed in different ways. Threat from human attackers who want to break into business systems to steal money, credit card details or information. Several different stages to a successful cyberattack. Some examples in the Resources section. Cyberattack Example 1 Wearing a blue boiler suit and fake ID the attacker gains physical access to the building. Carries something big so that an employee helpfully lets him through the door and he does not have to swipe his fake ID. Installs a wireless device that sniffs the network and allows him to communicate with it. Sits outside the organisation and gathers any information that he wants. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Cyberattack Example 1 The wireless device may allow him to penetrate other computers on the network. Could also have installed a rootkit on the computers to accomplish the same task. This would have been even easier if the attacker had gained a cleaning job at the organisation. Cyberattack Example 2 Laptop containing sensitive information with an unencrypted hard drive is left in a car by a stupid employee. Steal laptop. Job done! If laptop does not contain the required information, it may contain VPN passwords etc., which give the attacker remote access to the corporate network. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Cyberattack Example 3 Research on the companies website reveals a list of telephone numbers of employees. Could use Google to discover poorly secured information about employees (see article in Resources section). Phone employee and pretend to be a network administrator. Get their username and password and use this to access the system. Cyberattack Example 4 Attacker in Russia sends carefully targeted s to employees. These contain a game or amusing pictures and the employee has to open the attachment to play the game or view the amusing picture. Or they just have to follow a link. Malicious software is installed on the machine which the attacker uses to access it remotely from Russia. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

8 Cyberattack Example 4 This software sends all of the keystrokes on the worker s machine. It also allows the attacker to use other methods, such as buffer overflow exploits to attack other machines on the network. The attacker can also sniff all of the traffic on the network, including unsecured s, passwords, etc. Cyberattack Example 5 Attacker gathers as much information as he or she can about the computer infrastructure of the organization. This includes software, hardware, IP addresses etc. Company reports, software consultants, etc. can all be sources for this information. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Cyberattack Example 5 Cyberattack Example 5 Attacker selects target machines and runs a vulnerability scanner against them. This is a piece of software that reveals the vulnerable parts of the system, which services are running, etc. Attacker launches an exploit against a machine and installs malicious software. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Cyberattack Example 5 Once inside the corporate network he or she can run a network scanner. This reveals all of the machines on the network. He can then choose another machine to attack, steal sensitive information, or disable the network. Cyberterrorism? Most industrial systems are controlled by computers using standard technology, such as TCP/IP and Windows. Conceivable that an attacker could break into a nuclear or chemical plant s networks and disable safety systems, release dangerous substances or worse. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

9 Cyberterrorism - Examples An ex-employee broke into a sewage treatment plant computer system and released 250 million tonnes of raw sewage. Slammer worm compromised safety systems of an Ohio nuclear plant. Claims that Russian hackers controlled a gas pipeline for 24 hours. Denial of Service David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Botnets Poor home security practices enable attackers to compromise and control very large numbers of computers. Called bots or zombie computers. Generally communicate using Internet Relay Chat. Botnets Used to send spam and to host illegal websites. Attack other computers in order to increase the size of the botnet. Used for distributed denial of service attacks. Can be huge Storm Worm botnet probably has over half a million machines. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Denial of Service Brings a website or service down in different ways. Can exploit a flaw in the program to crash it. For example Ping of death crashed many operating systems by sending a malformed packet Or can use up the server s memory resources by sending lots of fraudulent requests. Denial of Service Can also bring down a website by flooding it with nonsense packets. For example, a large number of big packets is sent, which the webserver has to spend a lot of time filtering out. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

10 DDos Attack DDos Extortion Criminals controlling large botnets try to extort money from companies in exchange for not bringing their website down. First they launch a DDos attack on a website and then threaten to attack again unless paid $40,000, for example. Online gambling sites are often targeted. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn DDos Extortion One article claims that organisations are paying extortion demands. Resources section has a recent news item of man arrested for DDos extortion with 7000 remotely controlled machines. Defence David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Training! If your staff are not trained properly it will be easy to compromise your organization. Need to promote a culture of security in which everyone is aware of its importance. Staff should challenge people without id badges. Staff should never disclose their usernames or passwords to anyone. Updating Software manufacturers frequently release fixes for vulnerabilities in their code. Windows, Mac OS X and Linux, for example, all need to be updated regularly. Machines will be much more vulnerable without regular updating. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

11 Privileges Mac OS X and UNIX / Linux are more secure than Windows XP because the standard user lacks certain privileges. The user has a much more limited ability to change the system than a superuser or root user. Attacks generally compromise just the user space, not the whole computer. Privileges This approach can be implemented in XP (in the IUA lab the Student account has reduced privileges). However, most users of Windows run with administrator privileges. Windows Vista makes a more secure approach to privileges standard for all users. Delicate balance between security requirements and enabling users to efficiently carry out tasks. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Secure Passwords Many people and network administrators have insecure passwords or fail to change them from their default. Example of Herbless hacker who broke into hundreds of websites using the default Microsoft SQL administrator password. This password should have been changed on day 1 when they set up the server! Secure Coding Patching is used to fix sloppy coding on commercial software. Training and a culture of security is the only way to reduce security vulnerabilities in software written by your own company. Bad design, bad checking of inputs and insecure libraries are the major ways in which software security is compromised. All can be minimised by careful and responsible coding. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Operating Systems Linux and Mac OS X are more secure than Windows XP. This is largely because Windows is more popular, so more attackers target Windows Windows Vista has introduced a number of improvements to its security: Address space randomization. More sophisticated privileges Network access protection Better firewall Security Software Many different software applications exist to help to protect organisations against threats. Regular updates to this software especially to the intrusion detector and virus checker is essential to success. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

12 Signature Detection Most defences work by looking at the signature of the malicious code. This is accurate and has a low false positive rate. This means that it is unlikely that the software will report a virus when there is no virus. Signature Detection However, signature scanning offers no defence against a new virus. People have to wait for a signature to be written and tested by the anti-virus vendors. Possibility of viruses that change their signature. Does not work with encryption. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Anomaly Detection Another alternative is to monitor the normal state of the system and look for deviations from this normal state. This is called anomaly detection. Anomaly detection is an active research area. So far few products have made it to the market. Anomaly Detection Main problem is false positives the system reports an attack when there is no attack. This behaviour is unacceptable for consumer applications, but may be ok in a corporate environment where there are a large number of false alarms from other sources. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Anti-virus Software Based on signature detection. Deployed as standard on most Windows PCs. Should be deployed on the machines in the IUA lab! Scans files and s looking for the signature of a particular virus. Alerts the user when one is found. File Integrity Checkers A form of anomaly detection. A checksum is carried out on key system files. If this checksum changes an alarm is raised. For example: Tripwire: Afick: David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

13 Firewalls IPv4 Datagram Hardware or software that filters out packets directed to specific ports and other types of traffic. Critical method of defence for a computer and organization. Can block DDos attacks, but only if applied at the right place in the network. Should filter incoming and outgoing traffic. Windows XP firewall only blocks incoming David traffic. Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn TCP Header Firewall David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn DDos Attack Intrusion Detection Systems Scan packets sent through the network looking for viruses etc. Alert network administrator when problem is found. Need to know the signature of the malicious code. Can generate a lot of false alarms for example, when an employee is browsing security-related information. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

14 Penetration Testing Security professional attempts to break into system. Different amounts of information may be provided to the tester. Provide a report on the computer security to the company. Multi-level Security Nothing works perfectly! Pursue a multi-level approach that maximises security in each area of the organization. So training+physical security+updated systems+virus checkers+firewalls etc etc. must all be done as well as possible. David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Costs Questions? Taken from: David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Resources - General Resources Business-oriented handbook on computer security (PDF file): Online book on computer security: y Guide to home computer security: ecurity/ High quality articles and news on securityrelated issues: David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

15 Resources - General Cost of cyberattacks (PDF document): /CRS_Cyber_Attacks.pdf Sony rootkit: itymatters/2005/11/69601 Blaster worm: showpage&pid=159&page=1 Using Google to access sensitive information: Malicious websites: Resources Buffer Overflows Buffer overflow attacks: le.do?command=viewarticlebasic&articlei d=82920&intsrc=article_pots_side Buffer overflow attacks: y/6701 Defence against buffer overflow attacks: ecurity/boflo.html David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Resources Denial of Service Botnets: Wars-How-Botnets-Work.html Ping of death denial of service: Distributed denial of service attack (DDos): DDos extortion: ,00.htm Man arrested for DDos attacks: Resources - Attacks Poor password security: Keylogger scam: _scam.html Failed attempt to steal 220 million using keyloggers: ce Physical access: Stolen laptop contains sensitive information: theft/ David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn Resources - Cyberterrorism Roundtable discussion about the possibility of cyberterrorism: px?pack=rss.rtcyberterr Hackers target utility control systems: 0/18/206046/hackers-target-utilities-controlsystems.htm Slammer worm disables safety monitoring system at nuclear plant: Software Firefox web browser: Snort open source intrusion detection system: Ethereal sniffer: AVG free anti-virus software: Adaware anti-spyware: Spybot anti-spyware: David Gamez IUA Week 5 Autumn David Gamez IUA Week 5 Autumn

16 Software Windows rootkit revealer: nals/utilities/rootkitrevealer.mspx Afick file integrity checker: Top 100 Network security tools: David Gamez IUA Week 5 Autumn

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia Nenad.stojanovski@gmail.com 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

Threat Events: Software Attacks (cont.)

Threat Events: Software Attacks (cont.) ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Computer Networks & Computer Security

Computer Networks & Computer Security Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

Hackers: Detection and Prevention

Hackers: Detection and Prevention Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Countermeasures against Bots

Countermeasures against Bots Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology

More information

Securing small business. Firewalls Anti-virus Anti-spyware

Securing small business. Firewalls Anti-virus Anti-spyware Securing small business Firewalls Anti-virus Anti-spyware Introduction Due to the phenomenal growth of the Internet in the last decade companies and individuals find it hard to operate without a presence

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

How To Protect Your Network From Attack From A Hacker On A University Server

How To Protect Your Network From Attack From A Hacker On A University Server Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales Supinski@niksun.com Cell Phone 215-292-4473 www.niksun.com

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

Keyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL

Keyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL Keyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL Contents Abstract: Keyloggers... 3 Introduction... 3 History... 4 Security... 4 Implementation...

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs Network Security Ola Lundh ola.lundh@hh.se Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

ICTN 4040. Enterprise Database Security Issues and Solutions

ICTN 4040. Enterprise Database Security Issues and Solutions Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Hacking Database for Owning your Data

Hacking Database for Owning your Data Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money

More information

IBM Protocol Analysis Module

IBM Protocol Analysis Module IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Network Incident Report

Network Incident Report To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Paul Nguyen. 2014 CSG Interna0onal

Paul Nguyen. 2014 CSG Interna0onal Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around

More information

1 Introduction. Agenda Item: 7.23. Work Item:

1 Introduction. Agenda Item: 7.23. Work Item: 3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:

More information

ZNetLive Malware Monitoring

ZNetLive Malware Monitoring Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

Shellshock. Oz Elisyan & Maxim Zavodchik

Shellshock. Oz Elisyan & Maxim Zavodchik Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

TIME TO LIVE ON THE NETWORK

TIME TO LIVE ON THE NETWORK TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time

More information

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold The Essentials Series PCI Compliance sponsored by by Rebecca Herold Using PCI DSS Compliant Log Management to Identify Attacks from Outside the Enterprise...1 Outside Attacks Impact Business...1 PCI DSS

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out! INFO 1500 Information Technology Fundamentals Learning Objectives 9. Information Assurance and Security, Protecting Information Resources Alexander Nikov Explain why information systems are vulnerable

More information

Security threats and attackers are turning

Security threats and attackers are turning SECURITY Application Security: Countering The Professionals Robin Layland Robin Layland is president of Layland Consulting, a firm that specializes in network architecture and new technology. He has more

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005

More information

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information