CNT4406/5412 Network Security Introduction
|
|
|
- Douglas Charles
- 10 years ago
- Views:
Transcription
1 CNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
2 Introduction What is Security? Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
3 Introduction Integrity Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity e.g., data integrity, code integrity Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
4 Introduction Confidentiality Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information e.g., secrecy, privacy Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
5 Introduction Availability Ensuring timely and reliable access to and use of information Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
6 Introduction Security and CIA Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
7 VS. Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
8 Who is Anonymous Anonymous is a loosely associated hacktivist group originated on the imageboard 4chan in 2003 associated with collaborative hacktivism since 2008 responsible for many high-profile attacks: DDOS attacks against IFPI, MPAA for file sharing site closure, VISA, MasterCard and PayPal to support WikiLeaks named by Time as one of the most influential people in 2012 Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
9 Who is HBGary HBGary is a security company founded by Greg Hoglund (rootkit.com) in 2003 it had two firms, HBGary and HBGary Federal HBF was led by Aaron Barr focusing on the U.S federal government Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
10 Who is HBGary HBGary is a security company founded by Greg Hoglund (rootkit.com) in 2003 it had two firms, HBGary and HBGary Federal HBF was led by Aaron Barr focusing on the U.S federal government HBGary was sold to ManTech after being hacked Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
11 What Happened Anonymous poses serious security threats Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
12 What Happened Anonymous poses serious security threats Aaron claimed to have unmasked Anonymous members by correlating social media in early 2011 proposed a talk titled who needs NSA when we have social media? at the B-Sides conference to sell his idea intended to sell his list to FBI Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
13 What Happened Anonymous poses serious security threats Aaron claimed to have unmasked Anonymous members by correlating social media in early 2011 proposed a talk titled who needs NSA when we have social media? at the B-Sides conference to sell his idea intended to sell his list to FBI Anonymous compromised the HBGary in Feb 2011 compromised the websites posted lots of documents and s online usurped Aaron s Twitter Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
14 Steps of an Attack Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
15 Steps of an Attack Reconnoiter to identify vulnerabilities Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
16 Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
17 Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
18 Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems SQL injection, buffer overflow, format string vulnerability... Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
19 Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems SQL injection, buffer overflow, format string vulnerability... Harvest information, install malware/backdoors document, design, ... Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
20 Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems SQL injection, buffer overflow, format string vulnerability... Harvest information, install malware/backdoors document, design, ... Cover it up: files, logs... Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
21 The HBGary Hacking: Reconnaissance Hbgaryfederal.com was powered by a third-party CMS with SQL injection vulnerabilities an example of the SQL inject vulnerability: statement = SELECT * FROM users WHERE name = + username + ; username = or 1 = SELECT * FROM users WHERE name = OR 1 = ; Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
22 The HBGary Hacking: Reconnaissance Hbgaryfederal.com was powered by a third-party CMS with SQL injection vulnerabilities an example of the SQL inject vulnerability: statement = SELECT * FROM users WHERE name = + username + ; username = or 1 = SELECT * FROM users WHERE name = OR 1 = ; The vulnerable URL is: Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
23 The HBGary Hacking: Reconnaissance Hbgaryfederal.com was powered by a third-party CMS with SQL injection vulnerabilities an example of the SQL inject vulnerability: statement = SELECT * FROM users WHERE name = + username + ; username = or 1 = SELECT * FROM users WHERE name = OR 1 = ; The vulnerable URL is: User database was retrieved from CMS: CMS admins usernames, addresses, and password hashes Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
24 The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
25 The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) weak collision resistance: given m 1, it s infeasible to find m 2 with H(m 1 ) = H(m 2 ) Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
26 The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) weak collision resistance: given m 1, it s infeasible to find m 2 with H(m 1 ) = H(m 2 ) strong collision resistance: it s infeasible to find m 1 and m 2 with H(m 1 ) = H(m 2 ) Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
27 The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) weak collision resistance: given m 1, it s infeasible to find m 2 with H(m 1 ) = H(m 2 ) strong collision resistance: it s infeasible to find m 1 and m 2 with H(m 1 ) = H(m 2 ) Brutal force is the main method to guess passwords Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
28 The HBGary Hacking: Password Cracking Brute-forcing passwords has never been easier more than 100 million real-world passwords are leaked real-world passwords instead of words in a dictionary patterns in password construction Rainbow tables, pre-computed hashes, are widely available super computing power is cheap and available: cloud, GPGPU Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
29 The HBGary Hacking: Password Insecurity Weak passwords CEO and COO of HBF uses weak passwords in a rainbow table Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
30 The HBGary Hacking: Password Insecurity Weak passwords CEO and COO of HBF uses weak passwords in a rainbow table Password reuse average web user has 25 accounts, but uses just 6.5 passwords both CEO and COO reuse the passwords across their accounts Aaron (CEO) is the Google Apps ( ) administrator access to anyone s , including Greg Hoglund Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
31 The HBGary Hacking: Password Insecurity Weak passwords CEO and COO of HBF uses weak passwords in a rainbow table Password reuse average web user has 25 accounts, but uses just 6.5 passwords both CEO and COO reuse the passwords across their accounts Aaron (CEO) is the Google Apps ( ) administrator access to anyone s , including Greg Hoglund Public key authentication is not used for SSH by Aaron Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
32 The HBGary Hacking: Host Insecurity Privilege-escalation vulnerabilities the attacker owned an unprivileged account by a reused password he then owned the system by exploiting such a vulnerability: GNU dynamic linker expands $ORIGIN in library search path for setuid applications Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
33 The HBGary Hacking: Social Engineering Authentic information was used to bypass authentication Grey Hoglund is the creator of rootkit.com Grey s is compromised, which allows to impersonate him His compromised leaked two pieces of information: the hashes of the root password in rootkit.com Jussi at Nokia has root access to rootkit.com Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
34 The HBGary Hacking: Social Engineering Authentic information was used to bypass authentication Grey Hoglund is the creator of rootkit.com Grey s is compromised, which allows to impersonate him His compromised leaked two pieces of information: the hashes of the root password in rootkit.com Jussi at Nokia has root access to rootkit.com Jussi was convinced and handed over Grey s account he authenticated Grey by shared secret Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
35 The HBGary Hacking: Social Engineering Authentic information was used to bypass authentication Grey Hoglund is the creator of rootkit.com Grey s is compromised, which allows to impersonate him His compromised leaked two pieces of information: the hashes of the root password in rootkit.com Jussi at Nokia has root access to rootkit.com Jussi was convinced and handed over Grey s account he authenticated Grey by shared secret the attack was claimed to be executed by a teenage girl Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
36 More Security Incidents Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
37 Surveillance State Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
38 Course Mechanisms In This Course Explore fundamental issues that cause this insecurity from both network and systems POV Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
39 Course Mechanisms In This Course Explore fundamental issues that cause this insecurity from both network and systems POV Explain defense mechanisms that mitigate these issues Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
40 Course Mechanisms In This Course Explore fundamental issues that cause this insecurity from both network and systems POV Explain defense mechanisms that mitigate these issues Cover the topics of: cryptography, hashes and message digests, public key cryptography, important standards such as PKI, SSL, SSH, and IPSec, operating system security Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
41 Course Mechanisms You Should Know TCP/IP networking Operating systems architecture and design e.g., virtual memory, file systems, networking,... Discrete mathematics Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
42 Course Mechanisms Course Materials Course website: zwang/cnt5412.html course schedules, assignments, slides, Course textbook Kaufman, C., Perlman, R., and Speciner, M., Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall 2002 Office hour: Monday 2:30-4:30pm, or by appointment come to the office hour for help! Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
43 Course Mechanisms Grading item percentage homework 30% project 30% midterm 30% quizzes 10% Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
44 Course Mechanisms Course Policy Academic honor policy: zero-tolerance for cheating Ethics: act responsibly in security practices Disabilities: contact the instructor for accommodation Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
45 A Primer on Networking OSI Reference Model Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
46 A Primer on Networking Network Security Layers Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
47 A Primer on Networking Data Encapsulation/Fragmentation Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
48 A Primer on Networking IP Header Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
49 A Primer on Networking TCP Header Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
50 A Primer on Networking TCP State Machine Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
51 A Primer on Networking Active and Passive Attack Passive attack: intruder eavesdrops, but does not modify the message unencrypted messages, side channel attacks (tax, health) Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
52 A Primer on Networking Active and Passive Attack Passive attack: intruder eavesdrops, but does not modify the message unencrypted messages, side channel attacks (tax, health) Active attack: intruder may transmit, replay, modify, delete messages man-in-the-middle, Denial-of-service Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
53 A Primer on Networking Denial-of-Service (DOS) Attack Exploit legitimate behavior or vulnerabilities with crafted packets bomb: sending auto-generated s to victim smurf: sending ICMP echo (ping) traffic to IP broadcast address with a spoofed source address of a victim tear drop: overlapping (fragmented) packets SYN flood: sending lots of TCP SYN packets Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
54 A Primer on Networking Denial-of-Service (DOS) Attack Exploit legitimate behavior or vulnerabilities with crafted packets bomb: sending auto-generated s to victim smurf: sending ICMP echo (ping) traffic to IP broadcast address with a spoofed source address of a victim tear drop: overlapping (fragmented) packets SYN flood: sending lots of TCP SYN packets Launch Distributed DOS (DDOS) with botnets Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
55 A Primer on Networking Personae Alice: Bob, Carol, Dave: Eve: Trudy: first participant second, third, fourth participant eavesdropper malicious active attacker Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
56 A Primer on Networking Secure Communication Secrecy: Alice can send a message to Bob only he can read Authentication: Bob knows for sure that Alice sent it Nonrepudiation : Alice can t deny she sent the message Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
57 A Primer on Networking Summary What is security Real-world attacks Course mechanisms A primer of networking Next lecture: Introduction to cryptography Zhi Wang (FSU) CNT4406/5412 Network Security Fall / 35
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
The Anonymous attack on HBGary. Jarib Rahman March 19 th, 2012
The Anonymous attack on HBGary Jarib Rahman March 19 th, 2012 Backg round December 2010: Anonymous takes down corporate websites of Bank of America, MasterCard, Visa, Paypal and others. This is retaliation
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
CSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning [email protected] (919)513-4457 Office: Room
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: [email protected]
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CIS 6930/4930 Computer and Network Security. Dr. Yao Liu
CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: [email protected] URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan
CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan ([email protected]) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: [email protected]
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Security: Attack and Defense
Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
CSCI 4541/6541: NETWORK SECURITY
1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10
True False questions (25 points + 5 points extra credit)
Student Name: ISA 656: Network Security Midterm Examination GENERAL INSTRUCTIONS The midterm is worth 110 points (including 10 extra credit points): 25 points of True/False and 75 points of short answer.
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media
IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Frequent Denial of Service Attacks
Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:[email protected] Abstract Denial of Service is a well known term in network security world as
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015
Network Security Introduction Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Objectives - Syllabus 2 Objectives Introduce the key aspects of applied network security,
Lecture 1 - Overview
Lecture 1 - Overview CMPSC 443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ From small vulnerabilities come... 2 People are part of
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course
EE 5723/EE4723 Computer & Network Security Classroom: EERC 508 Course Logistics Meeting time: MWF 12:05pm-12:5512:55 pm Office hours: MW 3:00pm-4:00pm Other time by appointment Instructor Office: EERC
Module 4 Protection of Information Systems Infrastructure and Information Assets. Chapter 6: Network Security
Module 4 Protection of Information Systems Infrastructure and Information Assets Chapter 6: Network Security 1 Introduction We have seen the use of networks for business communication and application hosting
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
CS 161 Computer Security Spring 2010 Paxson/Wagner MT2
CS 161 Computer Security Spring 2010 Paxson/Wagner MT2 PRINT your name:, (last) SIGN your name: (first) PRINT your class account login: cs161- Your T s name: Your section time: Name of the person sitting
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
SECURITY FLAWS IN INTERNET VOTING SYSTEM
SECURITY FLAWS IN INTERNET VOTING SYSTEM Sandeep Mudana Computer Science Department University of Auckland Email: [email protected] Abstract With the rapid growth in computer networks and internet,
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
How To Protect Your Data From Attack
Security in Communication Networks Lehrstuhl für Informatik 4 RWTH Aachen Prof. Dr. Otto Spaniol Dr. rer. nat. Dirk Thißen Page 1 Organization Lehrstuhl für Informatik 4 Lecture Lecture takes place on
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY Babul K Ladhe 1, Akshay R Jaisingpure 2, Pratik S Godbole 3, Dipti S Khode 4 1 B.E Third Year, Information Technology JDIET, Yavatmal [email protected]
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Network Security. Network Security Hierarchy. CISCO Security Curriculum
Network Security Network Security Hierarchy Material elaborat dupa: CISCO Security Curriculum Kenny Paterson s Lectures for: M.Sc. in Information Security, Royal Holloway, University of London 1 Objectives
12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028
Review Final Exam 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 IT443 Network Security Administration Instructor: Bo Sheng True/false Multiple choices Descriptive questions 1 2 Network Layers Application
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
CSC574 - Computer and Network Security Module: Introduction
CSC574 - Computer and Network Security Module: Introduction Prof. William Enck Spring 2013 1 Some bedtime stories 2 Some bedtime stories 2 Some bedtime stories 2 Some bedtime stories 2 This course We are
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Module: Introduction. Professor Trent Jaeger Fall 2010. CSE543 - Introduction to Computer and Network Security
CSE543 - Introduction to Computer and Network Security Module: Introduction Professor Trent Jaeger Fall 2010 1 Some bedtime stories 2 This course We are going to explore why these events are not isolated,
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science
Taxonomic Modeling of Security Threats in Software Defined Networking Jennia Hizver PhD in Computer Science SDN Adoption Rates SDN Attack Surface SDN Threat Model Attack Examples Threat Mitigation Agenda
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
CS 3251: Computer Networking 1 Security Protocols I
Georgia Tech CS 3251: Computer Networking 1 Security Protocols I Brad Reaves, PhD Student 11/21/13 (slides from Prof. Patrick Traynor) CS 3251 - Computer Networks I Last Time Trying to prove who you are
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Cloud Security Lecture
Lecture Click to add text Infrastructure Security Lead IBM Bluemix team Agenda 2 Overview of Cloud security Different security considerations across different types of cloud Differences against traditional
CSE343/443 Lehigh University Fall 2015. Course Overview. Presenter: Yinzhi Cao Lehigh University
CSE343/443 Lehigh University Fall 2015 Course Overview Presenter: Yinzhi Cao Lehigh University Who am I? Yinzhi Cao It is kinda like [yihn jee] [chow] If you feel that it is really difficult, call me Ian.
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
