Modul 1 - Intro To Network Security
Modul 1 - Intro To Network Security
Network Security
Politeknik Elektronika Negeri Surabaya
2007
PENS-ITS
Network Security
Introduction
Penilaian
Tugas
UAS
UTS
Kehadiran
25%
40%
30%
5%
Network Security
Overview
PENS-ITS
Network Services
Network Security
CISCO Router
Using acl , block malware
from outside
ROUTER
GTW
PROXY (Squid )
All access to Internet
must through Proxy
DMZ
INTERNET
-
-IDS
FIREWALLFIREWALL
Linux bridge , iptables
shorewall , snort ,
portsentry , acidlab
MULTILAYER
SWITCH
L3 Switch
Block malware on
physical port from inside
network
DOMAIN
WWW
E-Mail server
HTTPS , SPAM
(Spamassassin ), Virus
Scanner (ClamAV )
Managable Switchs
Block unwanted user from port ,
manage from WEB
PROXY
LECTURER
,
EMPLOYEE
NOC
Traffic Monitoring
CACTI
Http://noc .eepis-its.edu
EEPISHOTSPOT
Access from wifi , signal
only in EEPIS campus
Authentication from
Proxy
FILESERVER
STUDENTS
PENS-ITS
EEPISHOTSPOT
EIS
Internal Server
EEPIS -INFORMATION SYSTEM
(EIS http ://eis.eepis -its.edu )
Http://fileserver .eepis -its .edu
Network Security
External
attacker
Corporate Assets
Virus
Incorrect
permissions
Network Security
Integrity
Decrease possible problems caused by corruption
of data
Availability
Make information always available
PENS-ITS
Network Security
Exploits (1)
What is an Exploit?
Types of attacks
Local
Remote
PENS-ITS
Network Security
http://www.sans.org/top20/
PENS-ITS
Network Security
2,134
1998:
1999:
Network Security
Attack Targets
SecurityFocus
31 million Windows-specific attacks
22 million UNIX/LINUX attacks
7 million Cisco IOS attacks
All operating systems are attacked!
PENS-ITS
Network Security
Hackers Vs Crackers
Ethical Hackers vs. Crackers
PENS-ITS
Network Security
Pengelompokan Attack
PENS-ITS
Network Security
Pengelompokan Attacks
Attacks
Social Engineering
Physical Access
-Attacks
Opening Attachments
-Dialog Attacks
Password Theft
Wiretapping/menyadap
-Information Theft
Server Hacking
Eavesdropping
Penetration
Vandalism/perusakan
(Mendengar yg tdk boleh)
Attacks
Impersonation
(Usaha menembus)
(meniru)
Malware
Message Alteration
-Denial
of
Merubah message
Viruses
Break-in
Service
Scanning
Worms
(Probing)
PENS-ITS
Network Security
Social Engineering
Definisi Social enginering
seni dan ilmu memaksa orang untuk memenuhi harapan anda ( Bernz ),
Suatu pemanfaatan trik-trik psikologis hacker luar pada seorang user
legitimate dari sebuah sistem komputer (Palumbo)
Mendapatkan informasi yang diperlukan (misalnya sebuah password) dari
seseorang daripada merusak sebuah sistem (Berg).
Network Security
Diving Dumpster
Sejumlah informasi yang sangat besar bisa dikumpulkan melalui company
Dumpster.
Persuasi
Sasaran utamanya adalah untuk meyakinkan orang untuk memberikan
informasi yang sensitif
Network Security
Port scanner
Network enumeration
Gaining & keeping root / administrator access
Using access and/or information gained
Leaving backdoor
Attack
Network Security
Probe Packets to
172.16.99.1, 172.16.99.2, etc.
Internet
Attacker
No Host
172.16.99.2
Results
172.16.99.1 is reachable
172.16.99.2 is not reachable
No Reply
Corporate Network
PENS-ITS
Network Security
Network Scanning
PENS-ITS
Network Security
Denial-of-Service (DoS)
Flooding Attack
Message Flood
Server
Overloaded By
Message Flood
Attacker
PENS-ITS
Network Security
DoS By Example
PENS-ITS
Network Security
Dialog Attack
Eavesdropping, biasa disebut dengan spoofing,
cara penanganan dengan Encryption
Impersonation dan message alteration
ditangani dengan gabungan enkripsi dan
autentikasi
PENS-ITS
Network Security
Eavesdropping on a Dialog
Dialog
Hello
Client PC
Bob
Server
Alice
Hello
Attacker (Eve) intercepts
and reads messages
PENS-ITS
Network Security
PENS-ITS
Network Security
Sniffing By Example
PENS-ITS
Network Security
KeyLogger
PENS-ITS
Network Security
Message Alteration
Dialog
Balance =
$1
Client PC
Bob
Balance =
$1,000,000
Balance =
$1
Balance =
$1,000,000
Attacker (Eve) intercepts
and alters messages
PENS-ITS
Server
Alice
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
Attack
Packet
Internet
Attacker
Dropped
Packet
Hardened
Server
Log File
Internal
Corporate
Network
PENS-ITS
Network Security
Intrusion
Detection
System
2. Suspicious
Packet Passed
1.
Suspicious
Packet
Internet
Attacker
3. Log
Packet
Hardened
Server
Log File
Corporate Network
PENS-ITS
Network Security
Client PC
Bob
Server
Alice
100100110001
Original
Message
Hello
PENS-ITS
Decrypted
Message
Hello
Impersonation and
Authentication
Network Security
Im Bob
Client PC
Bob
Attacker
(Eve)
Prove it!
(Authenticate Yourself)
PENS-ITS
Server
Alice
Network Security
Client PC
Automatically Handles
Bob
Negation of Security Options
Authentication
Encryption
Integrity
Server
Alice
Attacker cannot
read messages, alter
messages, or impersonate
PENS-ITS
Network Security
PENS-ITS
Network Security
Physical security
Secure installation and configuration
Fix known vulnerabilities
Turn off unnecessary services (applications)
Harden all remaining applications (Chapter 9)
(more on next page)
PENS-ITS
Network Security
PENS-ITS
Network Security
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
Network Security
Network Security
Network Security
Network Security
Network Security
Network Security
Managing Permissions
Principle of Least Permissions: Give Users
the Minimum Permissions Needed for Their
Job
More feasible to add permissions selectively than
to start with many, reduce for security
PENS-ITS
Network Security
Backup
File Encryption
File Integrity Checker
PENS-ITS