0% found this document useful (0 votes)
53 views28 pages

Chapter 1 - Introduction To Computer Security

Uploaded by

12- Nhật Huy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views28 pages

Chapter 1 - Introduction To Computer Security

Uploaded by

12- Nhật Huy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Chapter 1

Introduction to Computer Security


Reading Chapter 1:
Chuck Easttom, [2016], Computer
Security Fundamentals, Third Edition,
Pearson Education.
Introduction to computer security
8/10/22 1
504088 - Introduction
Chapter 1 Objectives

• Identify top threats to a computer network


• Assess the likelihood of an attack
• Define key terms like cracker, sneaker, firewall,
and authentication
• Compare and contrast perimeter and layered
approaches to network security
• Use online resources

Introduction to computer security


8/10/22
2
504088 - Introduction
Introduction

• Computer systems and networks are all


around us.
– Online banking
– Automated supermarket checkouts
– Online classes
– Online shopping
– Online travel resources

Introduction to computer security


8/10/22
3
504088 - Introduction
Introduction

Introduction to computer security


8/10/22
4
504088 - Introduction
Introduction (cont.)

• How is personal information safeguarded?


• What are the vulnerabilities?
• What secures these systems?
• Who can access my information?

Introduction to computer security


8/10/22
5
504088 - Introduction
Identifying Types of Threats

• Malware: MALicious softWARE (virus attacks,


worms, adware, Trojan horses, and spyware)
• Security Breaches: This group of attacks includes
any attempt to gain unauthorized access to your
system. This includes cracking passwords, elevating
privileges, breaking into a server...all the things you
probably associate with the term hacking.

Introduction to computer security


8/10/22
7
504088 - Introduction
Identifying Types of Threats

• DoS (Denial of Service attacks): These are


designed to prevent legitimate access to your
system.
• Web Attacks: This is any attack that attempts to
breach your website. Two of the most common such
attacks are SQL injection and cross-site scripting.
• Session Hijacking: These attacks are rather
advanced and involve an attacker attempting to take
over a session.

Introduction to computer security


8/10/22
8
504088 - Introduction
Identifying Types of Threats

• Insider threats: These are breaches based on


someone who has access to your network
misusing his access to steal data or
compromise security.
• DNS poisoning: This type of attack seeks to
compromise a DNS server so that users can be
redirected to malicious websites, including phishing
websites.
• There are other attacks, such as social engineering.
Introduction to computer security
8/10/22
9
504088 - Introduction
Malware

• Software with a malicious purpose


– Virus
– Trojan horse
– Spyware
– Logic Bomb

Introduction to computer security


8/10/22
10
504088 - Introduction
Malware (cont.)

Virus
– One of the two most common types
– Usually spreads through e-mail
– Uses system resources, causing slowdown or
stoppage
According to Symantec (makers of Norton antivirus and
other software products), a virus is “a small program
that replicates and hides itself inside other programs,
usually without your knowledge”
Introduction to computer security
8/10/22
11
504088 - Introduction
Malware (cont.)

Trojan Horse
– The other most
common kind of
malware
– Named after the
wooden horse of
ancient history

Introduction to computer security


8/10/22
12
504088 - Introduction
Malware (cont.)

Spyware
– The most rapidly growing types of malware
• Cookies
• Key logger

Introduction to computer security


8/10/22
13
504088 - Introduction
Malware (cont.)

Logic Bomb
– Lays dormant until some logical condition is met,
often a specific date.

Introduction to computer security


8/10/22
14
504088 - Introduction
Compromising System Security

Intrusions
– Attacks that break through
system resources
• Hackers
• Crackers
• Social engineering
• War-driving

Introduction to computer security


8/10/22
15
504088 - Introduction
Denial of Service Attacks

• The attacker does not


intrude into the system
but just blocks access by
authorized users.

• Cannon Ion Cannon Low


(LOIC).

Introduction to computer security


8/10/22
16
504088 - Introduction
Web Attacks

• The attacker attempts to


breach a web
application.
• Common attacks of this
type are SQL injection
and Cross Site Scripting.

Introduction to computer security


8/10/22
17
504088 - Introduction
Web Attacks

• SQL injection
SELECT * FROM tblUsers WHERE USERNAME = ’ " + txtUsername.Text +' AND
PASSWORD = ’ " + txtPassword.Text +” '

SELECT * FROM tblUsers WHERE USERNAME = ’ ' or '1' = '1' AND PASSWORD = ’ '
or '1' = '1'

• Cross-site scripting
<script> window.location = "http://www.fakesite.com"; </script>

Introduction to computer security


8/10/22 18
504088 - Introduction
Session Hijacking

• This is a complex attack


that involves actually
taking over an
authenticated session.

Introduction to computer security


8/10/22
19
504088 - Introduction
Insider Threats

• An insider threat is simply


when someone inside your
organization either misuses
his access to data or
accesses data he is not
authorized to access.

Introduction to computer security


8/10/22
20
504088 - Introduction
DNS Poisoning

• This involves altering


DNS records on a DNS
server to redirect client
traffic to malicious
websites, usually for
identity theft.

Introduction to computer security


8/10/22
21
504088 - Introduction
Assessing the Likelihood of an
Attack on Your Network
• Viruses
– Catch up on new and refurbished viruses
• Unauthorized use of systems
– DoS attacks
– Intrusions
– Employee misuse

Introduction to computer security


8/10/22
22
504088 - Introduction
Basic Security Terminology

People:
– Hackers
• White hats
• Black hats
• Gray hats
– Script kiddies
– Sneakers (penetration tester = pentester)
– Ethical hackers

Introduction to computer security


8/10/22
23
504088 - Introduction
Basic Security Terminology
(cont.)

Devices
– Firewall
• Filters network traffic
– Proxy server
• Disguises IP address of internal host
– Intrusion Detection System
• Monitors traffic, looking for attempted attacks

Introduction to computer security


8/10/22
24
504088 - Introduction
Basic Security Terminology
(cont.)
Activities
– Authentication
– Auditing

Introduction to computer security


8/10/22
25
504088 - Introduction
How Do Legal Issues Impact Network
Security?

• The Computer Security Act of 1987


• OMB Circular A-130
• See www.alw.nih.gov/Security/FIRST/papers/
legal/statelaw.txt for state computer laws
• Health Insurance Portability and
Accountability Act of 1996, HIPAA

Introduction to computer security


8/10/22
27
504088 - Introduction
Online Security Resources

• CERT
– www.cert.org
• Microsoft Security Advisor
– www.microsoft.com/security/default.mspx
• F-Secure
– www.f-secure.com
• SANS
– www.sans.org

Introduction to computer security


8/10/22
28
504088 - Introduction
Summary

• Network security is a constantly changing


field.
• You need three levels of knowledge.
– Take the courses necessary to learn the basic
techniques.
– Learn your enterprise system intimately, with all
its strengths and vulnerabilities.
– Keep current in the ever-changing world of threats
and exploits.

Introduction to computer security


8/10/22
29
504088 - Introduction
Summary

• What is malware?
• What is a penetration tester?
• What is spyware?
• What is a computer virus?
• What is war-driving?
• What is the most common threat on the Internet?
• Hacker Terminology ?

Introduction to computer security


8/10/22
30
504088 - Introduction

You might also like