Is Unit V PDF
Is Unit V PDF
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
trap continuously until it receives an Inform message. facilitates remote configuration of the SNMP entities.
It is same as trap but adds an acknowledgement that It is defined by RFC 1905, RFC 1906, RFC 3411,
trap doesn’t provide. RFC 3412, RFC 3414, RFC 3415.
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
knowledge of some other user’s password, an intruder unrelated to its advertised purpose, and without
can log in to a system and all information available on the user's knowledge.
system. • For example, the user may think that the program
Intruder attacks range from the benign to the serious. is a game. While it is printing messages about
At the benign end of the scale, there are many people initializing databases and asking questions like
who simply wish to explore internets and see what is "What do you want to name your player?" and
out there. At the serious end are individuals who are "What level of difficulty do you want to play?" the
attempting to read privileged data, perform program may actually be deleting files,
unauthorized modifications to data, or disrupt the reformatting a disk, or otherwise altering
system information.
There are three classes of intruders:
Masquerader: An individual who is not authorized to Viruses and related threats:
use the computer and who penetrates a system’s A virus is a piece of software that can “infect” other
access controls to exploit a legitimate user’s account. programs by modifying them.
The masquerader is likely to be an outsider. The modification includes a copy of the virus
Misfeasor: A legitimate user who accesses data, program, which then can go to infect other programs.
programs, or resources for which such access is not A virus can do anything that other programs do. The
authorized, or who is authorized for such access but only difference is that it attaches itself to another
misuses his or her privileges. The misfeasor generally program and executes secretly when the host program
is an insider. is run.
Clandestine user: An individual who seizes Once a virus is executing, it can perform any function
supervisory control of the system and uses this control such as erasing files and programs.
to evade auditing and access controls or to suppress Most viruses carry out their work in a manner that is
audit collection. The clandestine user can be either an specific to a particular operating system and in some
outsider or an insider. cases specific to a particular hardware platform. Thus
Following are some examples of intrusion: they are designed to take advantage of the details and
Performing a remote root compromise of an e-mail weaknesses of particular systems.
server A virus can be prepended or post pended to an
Defacing a Web server executable program, or it can be embedded in some
Guessing and cracking passwords other fashion. The key to its operation is that the
Copying a database containing credit card numbers infected program, when invoked, will first execute the
Viewing sensitive data, including payroll records and virus code and then execute the original code of the
medical information, without authorization program.
1) Logic Bombs During its lifetime a typical virus goes through
• Logic bombs are programmed threats that lie following 4 phases:
dormant in commonly used software for an Dominant Phase: The virus is idle. The virus will
extended period of time until they are triggered; at eventually be activated by some event, such as a date,
this point, they perform a function that is not the the presence of another program or file, or the
intended function of the program in which they are capacity of the disk exceeding some limit.
contained. Propagation Phase: The virus places an identical
• Logic bombs usually are embedded in programs copy of itself into other programs or into certain
by software developers who have legitimate system areas on the disk.
access to the system. Triggering Phase: The virus is activated to perform
• Conditions required to trigger a logic bomb the function for which it was intended.
include the presence or absence of certain files, a Execution Phase: The function is performed. The
particular day of the week, or a particular user function may be harmless of damaging.
running the application.
2) Trojan Horses
• Trojan horses resemble a program that the user
wishes to run - a game, a spreadsheet, or an editor.
While the program appears to be doing what the
user wants, it actually is doing something else Types of viruses:
This study source was downloaded by 100000861573692 from CourseHero.com on 12-09-2024 23:50:14 GMT -06:00
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
Parasitic Virus: The traditional and still most • Network worm programs use network connections
common form of virus. A parasitic virus attaches itself to spread from system to system. Once active
to executable and replicates when the infected within a system, a network worm can behave as a
program is executed. computer virus or bacteria, or it could implant
Memory resident Virus: Lodges in main memory as Trojan horse programs or perform any number of
part of a resident system program. From that point on, disruptive or destructive actions.
the virus infects every program that executes.
Boot-Sector Virus: Infects a master boot record or Firewall:
boot record and spreads when a system is booted from Firewall is a security barrier between two networks
the disk containing the virus. that screens traffic coming in and out of the gate of
Stealth Virus: A form of virus explicitly designed to one network to accept or reject connections and
hide itself from detection by antivirus software. services according to a set of rules.
Polymorphic Virus: A virus that mutates with every A firewall is like a secretary for a network which
infection, making detection by the “signature” of the examines requests for access to the network. It
virus impossible. decides whether they pass a reasonableness test. If
Metamorphic Virus: A metamorphic virus mutates they pass it they are allowed through and if not they
with every infection. The difference is that a are refused.
metamorphic virus rewrites itself completely at each 1. There are essentially three types of firewalls.
iteration, increasing the difficulty of detection. Each type of firewall filters packets by
Metamorphic viruses may change their behaviour as examining the data up to a particular layer of
well as their appearance. the network protocol stack.
Macro Virus The firewalls are:
Macro viruses infect files that are created using i. A packet filter is a firewall that operates at the
certain applications or programs that contain macros. network layer.
These mini-programs make it possible to automate
series of operations so that they are performed as a
single action, thereby saving the user from having to
carry them out one by one.
Examples of macro viruses: Relax, Melissa.A,
Bablas, O97M/Y2K.
E-Mail viruses:
A more recent development in malicious software is
the e-mail virus. The first rapidly spreading e-mail
viruses such as Melissa, made use of a Microsoft word
ii. A stateful packet filter is a firewall that lives at the
macro embedded in an attachment. If the recipient
transport layer.
opens the e-mail attachment, the word macro is
iii. An application proxy is a firewall that operates at
activated. Then,
the application layer where it functions as a proxy.
• The e-mail virus sends itself to everyone on the
mailing list in the user’s email package.
• The virus does local damage.
Worms:
• A worm is a program that can replicate itself and
send copies from computer to computer across
network connections. Upon arrival, the worm may
be activated to replicate and propagate again.
• In addition to propagation, the worm usually
performs some unwanted function. An e-mail Circuit-levelgateway:
virus has some of the characteristics, of a worm, A circuit-level gateway is a firewall that provides
because it propagates itself from system to system. User Datagram Protocol (UDP) and Transmission
A worm actively seeks out more machines Control Protocol (TCP) connection security, and
launching pad for attacks on other machines. works between an Open Systems Interconnection
This study source was downloaded by 100000861573692 from CourseHero.com on 12-09-2024 23:50:14 GMT -06:00
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
(OSI) network model’s transport and application may support a modern pool that provides dial-in
layers such as the session layer. Unlike application capability for traveling employees and telecommuters.
gateways, circuit-level gateways monitor TCP data ii. The firewall does not protect against internal
packet handshaking and session fulfillment of firewall threats, such as a disgruntled employee or an
rules and policies. employee who unwittingly cooperates with an
external attacker.
iii. The firewall cannot protect against the transfer of
virus-infected programs or files. Because of the
variety of operating systems and applications
supported inside the perimeter it would be impractical
and impossible for the firewall to scan all incoming
files for viruses.
Limitations of Firewalls:
i. The firewall cannot protect against attacks that
bypass the firewall. Internal systems may have dial-
out capability to connect to an ISP. An internal LAN
This study source was downloaded by 100000861573692 from CourseHero.com on 12-09-2024 23:50:14 GMT -06:00
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
Intrusion detection systems (IDS): Weaknesses: Host-based systems require installation
Intrusion Detection System (IDS) defined as a Device on the particular device that you wish to protect.
or software application which monitors the network or Hybrid Intrusion Detection System: - combines one
system activities and finds if there is any malicious or more approaches. Host agent data is combined with
activity occur. Outstanding growth and usage of network information to form a comprehensive view of
internet raises concerns about how to communicate the network. An example of a Hybrid IDS is Prelude.
and protect the digital information safely.
In a number of cases, absolute protection is not
feasible, but it is practical to detect security attacks. INTRUDERS
For example, there are intrusion detection systems
designed to detect the presence of unauthorized One of the most publicized attacks to security is the
individuals logged onto a system.An IDS is a set of intruder, generally referred to as hacker or cracker.
automated tools designed to detect unauthorized Three classes of intruders are as follows:
access to a host system and Will be notified abnormal
traffic if detected. Masquerader – an individual who is not authorized to
use the computer and who penetrates a system’s access
controls to exploit a legitimate user’s account.
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
Firewall Design Principles prohibits vulnerability and provides protection from
spoofing and routing attacks.
• Firewall is a security barrier between two ii. A firewall provides a location for monitoring
networks that screens traffic coming in and out security-related events. Audits and alarms can be
of the gate of one network to accept or reject implemented on the firewall system.
connections and services according to a set of
rules. iii. A firewall is a convenient platform for several
• For a firewall to be effective the design of the internet functions that are not security related which
firewalls should be efficient. The various include network address translator and a network
principles that should be adopted while management function.
designing a firewall are as follows: iv. A firewall can serve as the platform for IPsec.
Using the tunnel mode capability, the firewall can be
Firewall Characteristics: used to implement virtual private networks.
i. All traffic from inside to outside and vice versa
must pass through the firewall. This is achieved by Limitations of Firewalls:
physically blocking all access to the local network i. The firewall cannot protect against attacks that
except via the firewall. bypass the firewall. Internal systems may have dial-
ii. Only authorized traffic as defined by the local out capability to connect to an ISP. An internal LAN
security policy will be allowed to pass. Various types may support a modern pool that provides dial-in
of firewalls that can be used are Packet-Filters, capability for traveling employees and telecommuters.
Stateful Filters and Application Proxy Filters. ii. The firewall does not protect against internal
iii. The firewall itself is immune to penetration. This threats, such as a disgruntled employee or an
implies that use of a trusted system with a secure employee who unwittingly cooperates with an
operating system. external attacker.
iii. The firewall cannot protect against the transfer of
Techniques for Control: virus-infected programs or files. Because of the
Four general techniques that firewalls use to control variety of operating systems and applications
access and enforce security policy are as follows supported inside the perimeter it would be impractical
and impossible for the firewall to scan all incoming
i. Service Control- This determines the types of files for viruses.
internet services that can be accessed inbound or
outbound.
ii. Direction Control: This determines the direction in
which particular service requests may be initiated and
allowed to flow through the firewall.
iii. User Control: Control access to a service
according to which user is attempting to access it.
This feature is typically applied to users inside the
firewall perimeter.
iv. Behaviour Control: Controls how particular
services are used.
https://www.coursehero.com/file/144231838/IS-UNIT-Vpdf/
Powered by TCPDF (www.tcpdf.org)