+ All Categories
Home > Documents > Introduction to Security

Introduction to Security

Date post: 10-Feb-2016
Category:
Upload: daniel-arif
View: 217 times
Download: 1 times
Share this document with a friend
Description:
Introduction to Security
Popular Tags:
58
NETWORK VULNERABILITY ASSESSMENT NTC 1062 Chapter 1 Introduction to Security Last Update 9/5/2011
Transcript
Page 1: Introduction to Security

NETWORK VULNERABILITY ASSESSMENT

NTC 1062

Chapter 1Introduction to Security

Last Update 9/5/2011

Page 2: Introduction to Security

WHO AM IMs Noormelah Binti Shamsul

Anuar019-2767570TT0 room-L11 Room [email protected] /

[email protected] Syllabus.Books.Coursework 2

Page 3: Introduction to Security

SYLLABUS CHAPTER 1 – Network Security Assessment CHAPTER 2– Internet Host & Network Reconnaissance CHAPTER 3 – Goggle Hacking CHAPTER 4– Network Scanning CHAPTER 5– Gaining Access CHAPTER 6– Accessing Web Server & Application CHAPTER 7– Assessment Methodology

3

Page 4: Introduction to Security

BOOKS

4

Page 5: Introduction to Security

COURSEWORKASSESSMENT MARKSFINAL EXAMINATION 30%

PBL ( Reconnaissance) - softcopy

20%

THEORY TEST 10%

Assignments-Lab Manual (10%) -

softcopy- Mini Project – Kali Linux tools(20%) – hardcopy &

Softcopy

30%

KQ 10% 5

Page 6: Introduction to Security

MINI PROJECT (KALI LINUX TOOLS) – 20%

http://tools.kali.org/tools-listing Information Gathering Sniffing & Spoofing Vulnerability Analysis Exploitation Tools Password Attacks Wireless Attacks Forensics Tools Maintaining Access Hardware Hacking Web Applications

(Compulsary) Stress Testing

Reverse Engineering Reporting Tools Metasploit

Group of 2 Choose 5 tools from

different categories listed above.

Report (Introduction, Installation screen shot)– Hardcopy & softcopy

Presentation with live demo. Video 6

Page 7: Introduction to Security

OBJECTIVES

Describe the challenges of securing information Define information security and explain why it is

important Identify the types of attackers that are common

today List the basic steps of an attack Describe the five steps in a defense Explain the different types of information security

careers7

Page 8: Introduction to Security

IT TAKES TIME TO BECOME A HACKER

This class alone won’t make you a hacker, or an expert It might make you a script kiddies

It usually takes years of study and experience to earn respect in the hacker community

It’s a hobby, a lifestyle, and an attitude A drive to figure out how things workWe’re not here to teach you how to

hack.… 8

Page 9: Introduction to Security

A QUOTE FROM ONE OF HISTORY’S GREATEST HACKERS

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.

If you know neither the enemy nor yourself, you will succumb in every battle.

—Sun Tzu, The Art of War9

Page 10: Introduction to Security

WHAT IS VULNERABILITY

Weakness in a system that allows the system to be maliciously exploited and used outside of the way it was designed to be used and/or open to a threat increasing the risk of operational corruption or disaster

10

Page 11: Introduction to Security

CLASSES OF VULNERABILITIES

1) Hard vulnerabilities

Mistakes made by the company that wrote the software and has left open a hole for potential exploit.

Types of hard vulnerabilities bugs fixed by service pack and hotfixes system complexity

11

Page 12: Introduction to Security

CLASSES OF VULNERABILITIES

2) Soft vulnerabilities

Misconfigurations by network and security administrators

Type of soft vulnerabilities: A lack of general security policies General security policies go against industry best

practices A lack of security system procedures A lack of configuration or change management Logging not enabled Log files ignored or deleted frequently 12

Page 13: Introduction to Security

ASSESSMENT METHODOLOGY

13

Reconnaissance• preparatory phase

where an attacker gathers as much information as possible about the target prior to launching the attack.

Scanning• uses the details

gathered during reconnaissance to identify specific vulnerabilities

Gaining Access• Exploits

Maintaining Access• further use the system

as a launch pad to scan and exploit other systems

Covering Tracks• destroy evidence of

his/her presence and activities for various reasons

Page 14: Introduction to Security

SECURITY VULNERABILITIES FOR SALE

Anyone can buy attack tools to take over computers See links 1a, 1b

14

Page 15: Introduction to Security

CHALLENGES OF SECURING INFORMATION

There is no simple solution to securing information

This can be seen through the different types of attacks that users face today As well as the difficulties in defending against these

attacks

15

Page 16: Introduction to Security

TODAY’S SECURITY ATTACKS

A new worm disables Microsoft Windows Automatic Updating and the Task Manager (link Ch 1d)

Apple has issued an update to address 25 security flaws in its operating system OS X

16

Page 17: Introduction to Security

TODAY’S SECURITY ATTACKS

TJX Companies, Inc. had 45 million customer credit card and debit card numbers stolen because they used poor wireless security (WEP)

Ch 1f

17

Page 18: Introduction to Security

DIFFICULTIES IN DEFENDING AGAINST ATTACKS

18

Page 19: Introduction to Security

19

Page 20: Introduction to Security

20

Page 21: Introduction to Security

WHAT IS INFORMATION SECURITY?

21

Page 22: Introduction to Security

DEFINING INFORMATION SECURITY

Information security

The tasks of guarding information that is in a digital format

Ensures that protective measures are properly implemented

Cannot completely prevent attacks or guarantee that a system is totally secure

22

Page 23: Introduction to Security

DEFINING INFORMATION SECURITY

Information security protects information that has value, protecting security element “CIA”:

CONFIDENTIALITYMake sure that the data

is sent to the right person

AVAILABILITYServices are

always available to authorized

users whenever needed

INTEGRITYData cannot be

altered by unauthorized user

23

Page 24: Introduction to Security

HOW WOULD YOU ATTACK ?

24

Page 25: Introduction to Security

25

Page 26: Introduction to Security

INFORMATION SECURITY LAYERS

26

Page 27: Introduction to Security

FORMAL DEFINITION OF INFORMATION SECURITY

Information Security

protects the confidentiality, integrity, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures

27

Page 28: Introduction to Security

INFORMATION SECURITY TERMINOLOGY

Asset Something that has a value

Threat An event or object that may defeat the security

measures in place and result in a loss

Threat agent A person or thing that has the power to carry out a

threat28

Page 29: Introduction to Security

INFORMATION SECURITY TERMINOLOGY

Vulnerability Weakness that allows a threat agent to bypass

security

Exploit Takes advantage of a vulnerability

Risk The likelihood that a threat agent will exploit a

vulnerability Realistically, risk cannot ever be entirely eliminated 29

Page 30: Introduction to Security

INFORMATION SECURITY TERMINOLOGY (CONTINUED)

30

Page 31: Introduction to Security

INFORMATION SECURITY TERMINOLOGY (CONTINUED)

31

Page 32: Introduction to Security

UNDERSTANDING THE IMPORTANCE OF INFORMATION SECURITY

32

Page 33: Introduction to Security

DATA THEFT AND IDENTITY THEFT

Preventing data theft The theft of data is one of the largest causes of

financial loss due to an attack

Thwarting identity theft Identity theft involves using someone’s personal

information to establish bank or credit card accounts Cards are then left unpaid, leaving the victim with the debts

and ruining their credit rating

33

Page 34: Introduction to Security

THE NSA HACKER Gary McKinnon hacked

into NASA and the US Military

He was looking for evidence about UFOs

Link Ch 1g

34

Page 35: Introduction to Security

WHO ARE THE ATTACKERS? The types of people behind computer attacks are

generally divided into several categories

Hackers Script kiddies Spies Employees

35

Page 36: Introduction to Security

HACKERS Hacker

Anyone who illegally breaks into or attempts to break into a computer system

Although breaking into another person’s computer system is illegal Some hackers believe it is ethical as long as they do

not commit theft, vandalism, or breach any confidentiality

Ethical Hacker Has permission from the owner to test security of

computers by attacking them36

Page 37: Introduction to Security

SCRIPT KIDDIES

Unskilled users Download automated hacking software (scripts)

from Web sites and use it to break into computers Image from ning.com

37

Page 38: Introduction to Security

SPIES Computer spy

A person who has been hired to break into a computer and steal information

Excellent computer skills

38

Page 39: Introduction to Security

EMPLOYEES

The largest information security threat Motives

An employee might want to show the company a weakness in their security

Disgruntled employees may be intent on retaliating against the company

Industrial espionage Blackmailing

39

Page 40: Introduction to Security

MAX BUTLER Took over the world’s market in

stolen credit cards in 2006 From a San Francisco

apartment in the Tenderloin Link Ch 1h

40

Page 41: Introduction to Security

WHAT YOU CAN DO LEGALLY

Laws involving technology change as rapidly as technology itself

Find what is legal for you locally Laws change from place to place

Be aware of what is allowed and what is not allowed

41

Page 42: Introduction to Security

WHAT YOU CANNOT DO LEGALLY?

Accessing a computer without permission is illegal

Other illegal actions Installing worms or viruses Denial of Service attacks Denying users access to network resources

Be careful your actions do not prevent customers from doing their jobs

42

Page 43: Introduction to Security

ATTACKS AND DEFENSES

43

Page 44: Introduction to Security

STEPS OF AN ATTACK The five steps that make up an attack

Probe for informationPenetrate any defensesModify security settingsCirculate to other systemsParalyze networks and devices

44

Page 45: Introduction to Security

45

Page 46: Introduction to Security

DEFENSES AGAINST ATTACKS

Although multiple defenses may be necessary to withstand an attack

These defenses should be based on five fundamental security principles:

LayeringLimitingDiversityObscuritySimplicity

46

Page 47: Introduction to Security

LAYERING

Information security must be created in layers One defense mechanism may be relatively easy

for an attacker to circumvent Instead, a security system must have layers, making

it unlikely that an attacker has the tools and skills to break through all the layers of defenses

A layered approach can also be useful in resisting a variety of attacks

Layered security provides the most comprehensive protection

47

Page 48: Introduction to Security

LIMITING

Limiting access to information reduces the threat against it

Only those who must use data should have access to it In addition, the amount of access granted to someone

should be limited to what that person needs to know Some ways to limit access are technology-based,

while others are procedural

48

Page 49: Introduction to Security

DIVERSITY Layers must be different (diverse)

If attackers penetrate one layer, they cannot use the same techniques to break through all other layers

Using diverse layers of defense means that breaching one security layer does not compromise the whole system

49

Page 50: Introduction to Security

OBSCURITY

An example of obscurity would be not revealing the type of computer, operating system, software, and network connection a computer uses An attacker who knows that information can more

easily determine the weaknesses of the system to attack it

Obscuring information can be an important way to protect information

50

Page 51: Introduction to Security

SIMPLICITY

Information security is by its very nature complex Complex security systems can be hard to

understand, troubleshoot, and feel secure about As much as possible, a secure system should be

simple for those on the inside to understand and use

Complex security schemes are often compromised to make them easier for trusted users to work with Keeping a system simple from the inside but complex

on the outside can sometimes be difficult but reaps a major benefit 51

Page 52: Introduction to Security

INFORMATION SECURITY CAREERS AND THE SECURITY CERTIFICATION

52

Page 53: Introduction to Security

TYPES OF INFORMATION SECURITY JOBS

Information assurance (IA) A superset of information security including security

issues that do not involve computers Covers a broader area than just basic technology

defense tools and tactics Also includes reliability, strategic risk management,

and corporate governance issues such as privacy, compliance, audits, business continuity, and disaster recovery

Is interdisciplinary; individuals who are employed in it may come from different fields of study

53

Page 54: Introduction to Security

TYPES OF INFORMATION SECURITY JOBS

Information security, also called computer security Involves the tools and tactics to defend against

computer attacks Does not include security issues that do not involve

computers

Two broad categories of information security positions Information security managerial position Information security technical position

54

Page 55: Introduction to Security

55

Page 56: Introduction to Security

ETHICAL HACKING IN A NUTSHELL

What it takes to be a security tester Knowledge of network and computer technology Ability to communicate with management and IT

personnel Understanding of the laws Ability to use necessary tools

56

Page 57: Introduction to Security

CERTIFICATION

57

Page 58: Introduction to Security

The End….

58


Recommended