Unit-1 Nis
Unit-1 Nis
on
Network And Information
Security
(22620)
By
Ms.Pritee H. Raut
(Assistance Professor)
Availability:
The principle of availability states that the resources will be available to authorize party at
all times. Information will not be useful if it is not available to be accessed. Systems should
have sufficient availability of information to satisfy the user request.
Risk And Thread Analysis
What’s an asset?
Examples of Vulnerabilities
A weakness in a firewall that can lead to malicious hackers getting into a computer
network
Lack of security cameras
What is risk?(2m)
Risk is defined as the potential for loss or damage when a threat exploits a
vulnerability. Examples of risk include:
Financial losses
Loss of privacy
Damage to your reputation
Legal implications
Even loss of life
Risk can also be defined as:
Computer virus has the tendency to make its duplicate copies , and also spread it
across every folder and damage the data of your computer system.
This type of viruses has ability to hide in boot sector. The viruses will load
into memory when there is booting system and trying to read from hard
disk. Boot sector viruses are more spread since old time when floppy disk
was popular. But now we hardly seen them since many of them only can
spread through floppy disk.
Companion Viruse
Companion Viruses is create a new program instead of modifying an
existing file
Macro Virus
These viruses are not executable, it affect Microsoft word like documents.
They can spread through email.
Parasitic Virus
it attached itself to executable code and replicates itself. When the infected code is
executed, it will find other executable code or program to infect
Resident Viruses
Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate
module and installing malicious code into computer memory (RAM). The viruses are commonly
classified into two main categories: Fast Infectors and Slow Infectors.
Nonresident Viruses
This type of virus executes itself and terminated or destroyed after specific time
Polymorphic Viruses:
Polymorphic Virus is similar to encrypted viruses; polymorphic viruses encrypt their codes and use
different encryption keys every time. Some polymorphic viruses are hardly to detect by antivirus
software using virus signature based, because it do not remain any identical after replication.
A particularly infamous polymorphic backdoor trojan – the Storm Worm discovered in 2007 – could
alter its identity every 10 to 30 minutes. The speed of the change made it a headache for cyber-
security experts trying to stamp out the threat.
Example: Pseudonym, 1260
Stealth Viruses
Stealth Viruses is some sort of viruses which has ability to hide itself from some
antivirus software programs. Therefore, some antivirus program cannot detect them.
Metamorphic virus
This type of virus keeps rewrite itself every time . It may change their behavior as well as
appearance code.
Email virus
Virus gets executed when email attachment is open by recipient . Virus sends itself to everyone on
the mailing list of sender
Overwriting Virus
an overwrite virus is a computer virus that overwrites a file with its own code, helping spread the
virus to other files and computers. An overwrite virus deletes user data - documents, pictures,
videos etc ..in such a way that they cannot be recovered.
Phases of virus/Lifecycle
What(6m)
are typical phases of operation of a virus or worm?
Dormant phase: The virus is idle. but during this stage, the virus does not take any
action. The virus will eventually be activated by some event
Propagation stage: The virus places an identical copy of itself into other programs or
into certain system areas on the disk. Each infected program will now contain a clone of
the virus, which will itself enter a propagation phase.
Triggering phase: The virus is activated to perform the function for which it was
intended. condition may be a particular date, time, size on disk exceeding a
threshold, or opening a specific file.
The main objective of virus is to modify The main objective of worms to eat the
the information. system resources.
Trojans can be found in MP3 songs that the user may have downloaded, or
downloading games from an unsecured website, or the advertisement that
pops up when the user is browsing the page.
Some features of the Trojan horse are as follows :
It steals information like a password and more.
It can be used to allow remote access to a computer.
It can be used to delete data and more on the user’s computers.
How to prevent this virus:
• Do not download anything like the images, audios from an unsecured website.
• Do not click on the ads that pop up on the page with some advertisements for online games.
• Do not open any attachment that has been sent from an unknown use.
The user has to install the anti-virus program. This anti-virus program has the capacity to detect
those files which are affected by a virus.
Intruders: (4m)
An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to
disturb data on that system. In summary, this person attempts to violate Security by interfering with system
Availability, data Integrity or data Confidentiality.
i. Masquerader:
An individual who is not authorized to use the computer and who penetrates a system’s access controls to
exploit a legitimate user’s account
ii. Misfeasor:
A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is
authorized for such access but misuses his or her privileges
LegitImate user with no permission to access permission
An Insider threat is a malicious threat to an organization that comes from people within
the organization, such as employees, former employees, contractors or business
associates, who have inside information concerning the organization's security practices,
data and computer systems.
For example, a software engineer might have database access to customer information
and will steal it to sell to a competitor. This activity would be difficult to detect since the
software engineer has legitimate access to the database.
Types of Attack(4 or
6m)
Active attacks:
An Active attack attempts to alter system resources or effect their operations. Active
attack involve some modification of the data stream or creation of false statement.
Suppose Alice wants to request Bob to transfer $100 from his account to
hers. Alice will send an authentic message to Bob to make this request.
Since Bob trusts Alice, he transfers her the amount. Unfortunately, Alice’s
initial transfer request was intercepted by an attacker who resends the
message to Bob. Bob sees a message he thinks is from Alice, so he again
transfers the required amount. However, this time the money is transferred
to the attacker instead of Alice. This is one example of how replay attacks
can be used to meet an attacker’s malicious intent.
Denial of Service
It prevents normal use of communication facilities. This attack may
have a specific target. For example, an entity may suppress all
messages directed to a particular destination. Another form of service
denial is the disruption of an entire network by disabling the network or
by overloading it by messages so as to degrade performance.
Passive attacks:
A Passive attack are those, where attacker aims to obtain information that is in
transit. In passive attack, attacker does not involve any modification to the content
of original message. So, passive attack are4 hard to detect
Types of Passive
2. SYN flood – sends a request to connect to a server, but never completes the
handshake. Continues until all open ports are saturated with requests and
none are available for legitimate users to connect to.
Distributed Denial of Service (DDoS)
(4m)
A Distributed Denial of Service (DDoS) attack is an attempt to
make an online service or a website unavailable by overloading it
with huge floods of traffic generated from multiple sources.
Unlike a Denial of Service (DoS) attack, in which one computer
and one Internet connection is used to flood a targeted resource
with packets, a DDoS attack uses many computers and many
Internet connections, often distributed globally in what is referred
to as a botnet.
What are Botnets?
Attackers build a network of hacked machines which are known as botnets,
by spreading malicious piece of code through emails, websites, and social
media. Once these computers are infected, they can be controlled
remotely, without their owners' knowledge, and used like an army to launch
an attack against any target.
Backdoors and
Trapdoors(4m)
Backdoor is a term that refers to the access of the software or hardware of a computer
system without being detected. The backdoor can be created by the developer themselves
so that they can quickly and easily make changes to the code without the need to log in to
the system.
A back door in an operating system would provide access to all system functions in the
computer.
However, backdoors can be used by hackers in cyberattacks to steal personal information
and data.
As the name suggests, a backdoor attack is stealthy, and cybercriminals often slip in
undetected.
Sniffing(2m or 4m)
Encryption: Encryption is the process of converting plaintext into cipher text in order to
protect the message from attackers. Before leaving the network, the information should be
encrypted to protect it from hackers who sniff into networks. This is achieved through the
use of a virtual private network (VPN).
Network scanning and monitoring: Network administrators should scan and monitor
their networks to detect any suspicious traffic. This can be achieved by
bandwidth monitoring or device auditing.
Spoofing (6M)
when someone or something pretends to be something else in an attempt to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.
Spoofing is a type of attack on computer device in which the attacker tries to steal the
identity of the legitimate user and act as another person. This kind of attack is done to
breach the security of the system or to steal the information of the users.
Example:
Hackers normally change their IP addresses to hack a website so that the hacker can’t be
traced.
Website Spoofing: Website spoofing refers to when a website is designed to mimic an existing
site known and/or trusted by the user. Attackers use these sites to gain login and other personal
information from users.
IP Spoofing: Attackers may use IP (Internet Protocol) spoofing to disguise a
computer IP address, thereby hiding the identity of the sender or impersonating
another computer system. One purpose of IP address spoofing is to gain access
to a networks that authenticate users based on IP addresses.
DNS Server Spoofing: DNS (Domain Name System) servers resolve URLs
and email addresses to corresponding IP addresses. DNS spoofing allows
attackers to divert traffic to a different IP address, leading victims to sites that
spread malware.
b Explain in brief IT
How to protect against spoofing attacks
Example:
Suppose Alice wants to request Bob to transfer $100 from his account to hers. Alice will
send an authentic message to Bob to make this request. Since Bob trusts Alice, he transfers
her the amount. Unfortunately, Alice’s initial transfer request was intercepted by an
attacker who resends the message to Bob. Bob sees a message he thinks is from Alice, so
he again transfers the required amount. However, this time the money is transferred to the
attacker instead of Alice. This is one example of how replay attacks can be used to meet an
attacker’s malicious intent.
TCP/IP
Hijacking(4M)
TCP/IP Hijacking is when an authorized user gains access to a genuine network connection
of another user. It is done in order to bypass the password authentication which is
normally the start of a session.
Example
An attacker monitors the data transmission over a network and discovers the IP’s of two
devices that participate in a connection.
When the hacker discovers the IP of one of the users, he can put down the connection of
the other user by DoS attack and then resume communication by spoofing the IP of the
disconnected user.
TCP/IP hijacking is a type of man-in-the-middle attack. The intruder can determine the IP
addresses of the two session participants, make one of them inaccessible using a DoS
attack, and connect to the other by spoofing the network ID of the former.
1. Immediately
2. Without creating system downtimes or outages.
Patch - A patch is a program that makes changes to software installed on a computer. Software companies issue
patches to fix bugs in their programs, address security problems, or add functionality.Publicly released update to fix a
known bug/issue
Service Pack – Large Update that fixes many outstanding issues, normally includes all Patches, Hotfixes,
Maintenance releases that predate the service pack.
A service pack is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a
single installable package. Installing a service pack is easier and less error-prone than installing a high number of
patches individually, even more so when updating multiple computers over a network. Service packs are usually
Information classification (4M)
• Information classification is a process used in information security to categorize data based on
its level of sensitivity and importance. The purpose of classification is to protect sensitive
information by implementing appropriate security controls based on the level of risk
associated with that information.
• Information classification, also known as data classification, is how corporate information is
classified into specific significant categories so that critical data remains protected and safe.
In a business, vast data volumes are handled every day – invoice records, email lists,
customer information, user data, order history, etc. Obviously, all data is not equally
important, and some information will need higher protection than the other.
• They should be saved in different folders, and only individuals of a particular department
should be given access to the files so that they can work with the data. This
ensures information security and easy access to the files as and when needed.
Information Classification(4m
and6m)
Public: Information that is not sensitive and can be shared freely with anyone.
Internal: Information that is sensitive but not critical, and should only be shared within the
organization.
Confidential: Information that is sensitive and requires protection, and should only be shared with
authorized individuals or groups.
Secret: Information that is extremely sensitive and requires the highest level of protection, and
should only be shared with a select group of authorized individuals.
Top Secret: Information that if disclosed would cause exceptionally grave damage to the national
security and access to this information is restricted to a very small number of authorized
individuals with a need-to-know.
Information classification also includes a process of labeling the information with the appropriate
classification level and implementing access controls to ensure that only authorized individuals can
access the information. This is done through the use of security technologies such as firewalls,
intrusion detection systems, and encryption.
Criteria for Information
Classification
(4M
sample)
Value – the most frequently used criteria for classifying information is the value of
data. If the information is so valuable that their loss could create significant
organizational problems, it needs to be classified.
Age – if the value of certain information declines over time, the classification of the
information may be lowered.
Useful Life – if the information is available to make desired changes as and when
needed, it can be labeled ‘more useful’.
Personal Association – information that is linked to specific individuals or is
addressed by privacy law needs to be classified.
Summer-2024
{2M}
1.Define :
i. Confidentiality
ii. accountability
{4m}
4.define following terms:
I. Operating system
II. Hot fix
III. Patch
IV. Service pack
{6m}
(4m)
1. What is computer security and its need.
2. Explain security basics in detail (CIA).
3. Explain the term:
i. Assets
ii. Vulnerability
iii. Risks
iv. Threat
6m)