CIT 315 PDF Note
CIT 315 PDF Note
CIT 315 PDF Note
Unit 1
INTRODUCTION
➢ Internet
➢ Security in Computing
➢ Components of Security
➢ Taxonomies of Information Security
➢ Key Concepts in Information Security
➢ Internet Security
➢ Security Policy
➢ Ethics of Computer Security
WHAT IS SECURITY
Security means safety, as well as the measures taken to be safe or protected.
... Often this word is used in compounds such as a security measure, security
check or security guard. The security department in a business is sometimes
just called security.
Security means safety, as well as the measures taken to be safe or protected.
Often this word is used in compounds such as a security measure, security
check or security guard. The security department in a business is sometimes
just called security.
Security is freedom from, or resilience against, potential harm caused by
others. Beneficiaries (technically referents) of security may be of persons and
Security is defined as being free from danger, or feeling safe. An example of
security is when you are at home with the doors locked and you feel safe. ...
An organization or department whose task is protection or safety, esp. a
private police force hired to patrol or guard a building, park, or other area.
Security refers to all the measures that are taken to protect a place, or to
ensure that only people with permission enter it or leave it.
1.1: Internet
➢ Provides wealth of information and services
Communication: video calls, emails, instant messaging
✓ Transaction: shopping, financial services
✓ Entertainment: music film
✓ Many others
✓ Communications and transactions are private and secure
✓ Credit card details
✓ Secret communication
✓ Serious security risks
✓ Fraud
1
✓ Cyber bullying
✓ Terrorism
✓ Identity theft
✓ Espionage
2
1.5 Key Concepts in Security
Access: A subject or object’s ability to use, manipulate, modify, or affect another subject or
object. (Authorized users and hackers).
Asset: The organizational resource that is being protected: software, hardware or people.
Attack: An intentional or unintentional act that can cause damage to or otherwise
compromise information and/or the systems that support it.
✓ Active or passive
✓ Intentional or unintentional
✓ Direct or indirect
3
1.6 What Does Internet Security Mean?
➢ Internet security is a catch-all term for a very broad issue covering security for
transactions made over the Internet:
✓ Browser security
✓ the security of data entered through a Web form
✓ Overall authentication
✓ protection of data sent via Internet Protocol
➢ Internet security relies on specific resources and standards for protecting data
that gets sent or received through the Internet:
✓ encryption such as Pretty Good Privacy (PGP)
✓ firewalls, which block unwanted traffic
✓
anti-malware, anti-spyware and anti-virus programs that work from
specific networks
✓ devices to monitor Internet traffic for dangerous attachments.
4
▪ point of contact for different IT infrastructures
▪ How to implementing the policy
✓ Sections within a policy
i. Overview – Background information of issue addressed by the policy.
ii. Purpose – Why the policy is created.
iii. Scope – To what areas this policy covers.
iv. Targeted Audience – Tells to whom the policy is applicable.
v. Policy – A good description of the policy.
vi. Definitions – A brief introduction of the technical jargon used inside the
policy.
vii. Version – A version number to control the changes made to the document.
✓ Implement the Policy
▪ security experts implement the technical aspect of the policy
▪ user awareness and education
▪ all concerned employees should adhere to policy. E.g.
❖ sending email
❖ accessing VOIP
❖ browsing the Internet
❖ accessing confidential data in a system
✓ Monitor policy
▪ solutions to monitor and report violators
▪ For fair of raising violators use automated reporter
▪ violators should be dealt with
✓ Review the Policy
▪ organization change
▪ security incidence
▪ lifecycle of security policy starts all over
5
▪ globalization
1.10 Security Threats and Levels
➢ Assignment
Assignment: Discuss security threats and levels.
6
➢ Phishing Attacks Type 1: Tab Nabbing –
✓ Hackers often send fake web links (cloned website) via emails for
victims to update their profiles.
✓ Hackers extract username and password through cloned site.
2.2 BUGS
➢ A bug is an error or defect in software or hardware that causes a program to
malfunction.
➢ Causes
✓ oversight during programming
✓ error in programming language
✓ mistake in language in translator (compiler or interpreter)
✓ conflicts in software when applications try to run in tandem
➢ Prevention
✓ a well-designed program developed using a well-controlled
process.
✓ search for and correct it during program development phase using
debugging tools and techniques.
✓ patch or update is given out to fix bug after deployment.
➢ Danger
✓ gain unauthorized access to IT resources
✓ disrupt the smooth usage of IT product
2.3 Backdoor
➢ Backdoors are used in computer programs to bypass normal authentication
and other security mechanisms.
➢ used by developers as a legitimate way of accessing an application
7
➢ Hackers would use existing backdoors to make changes to IT resources.
OR
➢ create a completely new application that would act as a backdoor:
✓ example Back Orifice, which enables a user to control a Windows
computer from a remote location.
✓ application is installed via remote access Trojan or RAT.
✓ some worms install backdoors on computers so that remote
spammers can send junk e-mail or attempt privilege escalation.
➢ Prevention: Unfortunately, there isn’t much that can be done about
backdoors
✓ patching the system infected
✓ keeping on top of updates.
✓ network administrators should inform the manufacturer of device
or application
✓ encrypt access to backdoor
➢ Backdoors attacks are less common nowadays because of prevention
mechanism and awareness.
8
2.5 Botnets and Zombies
➢ Malware is distributed on the Internet by a group of compromised computers,
known as a botnet, and controlled by a master computer (where the attacker
resides).
➢ Each compromised computer in the botnet is zombie.
➢ Zombies are unaware of the malware installed on them.
➢ Installation is automated by distribution of the malware from one zombie to
another.
➢ Zombie could have virus, logic bomb, DDoS, login IDs, credit card numbers etc.
➢ Botnet controller community features:
✓ constant and continuous struggle over most bots
✓ highest overall bandwidth
✓ most "high-quality" infected machines, like university, corporate, and even
government machines.
How it works
➢ A botnet operator sends out malware, infecting ordinary users' computers,
whose payload is a malicious application called the bot.
➢ The bot on the infected PC logs into a particular command and control server.
➢ A spammer purchases the services from botnet operator.
➢ The spammer provides the spam messages to the operator
➢ Operator instructs the compromised machines via the control panel on the
web server, to send spam messages.
9
➢ The session-establishing packets include a SYN field that identifies the
sequence in the message exchange.
➢ An attacker can send a number of connection requests very rapidly and then
fail to respond to the reply.
➢ Some operating systems allow network administrator to tune the size of the
buffer and the timeout period.
3. Teardrop Attack
➢ Exploits the way the Internet Protocol (IP) requires large data to be divided into
fragments
➢ The fragment packets are assembled using offset to the beginning of the first
packet
➢ In the teardrop attack, the attacker's IP puts a confusing offset value in the
second or later fragment
➢ If the receiving operating system does not have a plan for this situation then it
crashes
4. Smurf Attack
➢ Perpetrator sends IP ping (or "echo my message back to me") request to a
receiving site
➢ The ping packet specifies that it be broadcast to some hosts within the
receiving site's local network
➢ The packet also indicates that the request is from another site (Sending a
packet with someone else's return address in it is called spoofing the return
address)
➢ lots of ping replies will flood back to the innocent, spoofed host
➢ The spoofed host will no longer be able to receive or distinguish real traffic
5. Viruses
➢ Computer viruses which replicate across a network in various ways, can be
viewed as DoS attacks
➢ The victim is not usually specifically targeted but simply a host unlucky enough
to get the virus
➢ computer Depending on the particular virus, the DoS can be hardly noticeable
ranging all the way through disastrous
Characteristics of DoS
i. unusually slow network performance (opening files or accessing websites)
ii. unavailability of a particular website
iii. inability to access any website
iv. dramatic increase in the amount of spam you receive in your account
10
2.7 Authentication Failures
➢ Failed authentication packets are sent to the wireless client (mobile unit) with
a reason code of previous authentication failure
➢ While sending the packets, the source Media Access Control (MAC) is spoofed
to that of the wireless access point to which the client is associated, this makes
the client think that the authentication failure is sent by the original wireless
access point and as per the 802.11 standard the client removes itself from the
wireless local area network (WLAN).
➢ A slight variation to the above attack is to send invalid authentication request
frames to the Access point to by spoofing the MAC address of an associated
client
➢ In this case the Access point receives the invalid authentication requests, thinks
that those requests came from the associated client and aborts its wireless
service to that client.
11
2.9 Information Leakage
➢ Information leakage is an application weakness where an application reveals
sensitive data like:
✓ technical details of the web application
✓ environment variables
✓ user-specific data
➢ Sensitive data may be used by an attacker to exploit:
✓ Target web application
✓ Hosting network
✓ Web application users
➢ Leakage of sensitive data should be limited or prevented whenever possible
➢ Information leakage of web application is mostly as a result of one or more of
the following conditions:
1. A failure to scrub out HTML/Script comments containing sensitive information.
<TBODY>
<TR>
<!--If the image files fail to load, check/restart 192.168.0.110 -->
<TD bgColor="#ffffff" colSpan="5" height="17" width="587"> </TD>
</TR>
12
➢ Read more about slammer in course material
Example II
✓ Cross-site scripting (XSS) is perhaps the most well-known Web application
vulnerability that occurs when a Web page displays user input - via
JavaScript and VBScript - that isn’t properly validated.
✓ A hacker can take advantage of the absence of input filtering and cause a
Web page to execute malicious code on any user’s computer that views
the page
If a window pops up that reads XSS, as shown below, when this script
<script>alert(‘XSS’)</script> is entered into input field then the application is vulnerable
➢ So when single XSS can transverse multiple domains and attack many different
sites instead of just one then exponential XSS attack is might be initiated.
➢ You can consult XSS Attacks: Cross Site Scripting Exploits and Defense By Seth
Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov
(In the context of information security) the use of deception to manipulate individuals into
divulging confidential or personal information that may be used for fraudulent purposes
"people with an online account should watch for phishing attacks and other forms of social
engineering"
Examples of social engineering range from phishing attacks where victims are
tricked into providing confidential information, vishing attacks where an urgent
and official sounding voice mail convinces victims to act quickly or suffer severe
consequences, or physical tailgating attacks that rely on trust to gain
• Baiting. Enticing victims into inadvertently compromising their security, for example
by offering free giveaways or distributing infected devices. ...
• Honey trap. ...
• Pretexting. ...
• Scareware. ...
• Vishing/voice phishing
13
Unit 3
ACTIVE ATTACKS
❑ Computer Virus, Worms and Trojan Horse
❑ Firewalls
❑ What can firewall do?
❑ Demilitarized zone and proxy
❑ Implementing policies
❑ Reasonable domain name services to filter
Many instances of malware fit into multiple categories: for instance, Stuxnet is a worm,
a virus and a rootkit.
A Trojan horse is not a virus. It is a destructive program that looks as a genuine application.
Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Computer worm
A computer worm is a type of malware that, once it infects a machine, can automatically
copy and extend itself to connected devices.
• You can avoid being infected by a worm using common anti-malware advice. Use
antivirus software, keep your computer up to date, and never open links or files
which you don't completely trust.
A virus cannot execute or reproduce unless the app it has infected is running. This
dependence on a host application makes viruses different from trojans, which require
users to download them, and worms, which do not use applications to execute. Worms
are stand-alone malicious programs that can self-replicate and propagate independently.
14
What is Malware?
Like any malware, a computer worm requires a human being to initiate the infection. The
primary vectors of infection are email and websites. A worm can be embedded in a
compromised email attachment or link within the message and often comes as part of a
phishing scheme , where the infected file is masquerading as something legitimate, like a
document or spreadsheet. Less commonly, worms can be installed if you visit a
compromised website and click a link that activates the worm.
After the worm has been installed on your computer, it goes to work making copies of itself.
Some are programmed to automatically infect any computer on the same local network.
Worms might also be able to infect any device that connects to that computer
automatically.
Once infected, you can try to remove it in the same way as any malware with antivirus or
anti-malware software. Likewise, you can avoid getting infected to begin with in the same
way: by taking common-sense precautions to avoid malware.
15
7. Regular Scan your Computer
8. Use a Firewall
9. Use SSL Certificate
10. Avoid Unsolicited Email
If your computer ports are open, then a malicious script can sent by an attacker and gain
unauthorized access. A windows firewall can acts as a simple defence by closing all ports.
Tips
• In Windows operating system, this can be found by navigating to:
o First, Choose Start→ Control Panel→ System and Security→ Windows
Firewall.
o Then, click the Turn Windows Firewall On or off link in the left pane of
the window.
o Select the Turn on Windows Firewall radio button for one or both of the
network locations.
o And Click OK.
• You also can use a web application Firewall to protect your software application form
cyber threats.
Secure Sockets Layer (SSL) is a global standard web security protocol which creates a secure
connection between a website and browser. SSL ensure that all data passed between a web
server and browser remains encrypted and secure. This encryption technique prevents from
hackers to stealing sensitive information such as credit card details, names and addresses.
In case, if a site is secure by SSL then a padlock is displayed or the address bar shows the URL
as HTTPS instead of HTTP.
16
How to Remove Computer Worms
To remove a computer worm, simply install antivirus software and run a scan for computer
virus and worms. Once viruses and worms are detected then it will be deleted by antivirus.
So your computer will be completely safe to use.
Finally, use antivirus software and keep updated in order to protect from computer worms.
We have discussed the important tips on how to prevent computer worms. Hope the article
will be helpful for you!.
A Trojan horse is not a virus. It is a destructive program that looks as a genuine application.
Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
How to protect yourself against Computer Viruses and Worms
It’s recommended that you install anti-malware software on all of your devices – including
PCs, laptops, Macs and smartphones – and that your anti-malware solution receives regular
updates, in order to protect against the latest threats. A good anti-malware software
product – such as Kaspersky Anti-Virus – will detect and prevent virus and worm infections
on your PC, while Kaspersky Internet Security for Android is an excellent choice for
protecting Android smartphones.
3.2: Firewalls
17
➢ Circuit gateways
➢ MAC layer firewalls
➢ Hybrids
➢ Distributed Firewall
1. Static filtering:
➢ Requires that the filtering rules be developed and installed with the firewall.
➢ The rules are created and sequenced either by a person directly editing the rule
set or using a programmable interface.
➢ Changes to the rules require human intervention.
➢ It allows entire sets of one type of packet to enter in response to authorized
requests.
➢ This type of filtering is common in network routers and gateways.
2. Dynamic filtering:
➢ Reacts to an emergent events or factors and update or create rules to deal with
that event.
➢ It allows only a particular packet with a particular source, destination, and port
address to pass through.
➢ This reaction could be
✓ Positive (allow)
OR
✓ Negative (deny)due to a particular type of malformed
packet is detected.
18
✓ It is an intermediate form between traditional static packet
filters and application proxies
19
➢ The circuit gateway firewall operates at the transport layer.
➢ The firewalls prevent direct connections between one network and another.
➢ They accomplish this by creating tunnels connecting specific processes or
systems on each side of the firewall.
➢ Only authorized traffic such as a specific type of TCP connection for authorized
users utilize the tunnels.
➢ They are firewalls component often included in the category of application
firewall, but it is in fact a separate type of firewall.
20
➢ Another firewall problem is that of transitive trust. You have it whether you like
it or not. If A trusts B through its firewall, and B trusts C, then A trusts C,
whether it wants to or not (and whether it knows it or not).
➢ A firewall cannot prevent individual users with modems from dialing into or
out of the network, bypassing the firewall altogether.
➢ Firewall may have errors, or not work as expected. The best administration can
do nothing to counter a firewall that does not operate as advertised.
21
Unit 4
SECURITY CONTROLS
❑ Intrusion Detection and Prevention Systems
❑ Honeypots and Honeynet
❑ Padded Cell Systems
❑ Trap-and-Trace Systems
❑ Scanning and Analysis Tools
➢ Port Scanners
➢ Firewall Analysis Tools
➢ Detecting Operating System
❑ Biometric Access Controls
➢ Signature Recognition
➢ Voice Recognition
➢ Problem with Biometric
➢ Measuring Biometric Effectiveness
Host-based IDPSs
➢ Protects by monitoring the status of various files stored on those machines.
➢ Learns the configuration of the system, assigns priorities to various files depending
on their value
➢ Alerts the administrator of suspicious activity.
➢ Catalog of common attacks signatures
➢ Database of file attributes
Network-based IDPSs
➢ Looks at patterns of network traffic and attempt to detect unusual activity based on
previous baselines.
➢ Catalog of common attacks signatures
➢ Database of normal network activities
Example of network attack detection
✓ IP spoofing
✓ High volumes of traffic going to outside addresses (data theft)
✓ Traffic coming into the network (DDOS).
22
✓ Industry ➔ decoys, lures, and fly-traps
➢ Contains pseudo-services that emulate well-known services.
➢ It is configured in ways that make it look vulnerable to attacks.
➢ Lure potential attackers into committing an attack thereby revealing
themselves.
Purpose of Honeypot
➢ Divert an attacker from critical systems.
➢ Collect information about the attacker’s activity.
➢ Encourage the attacker to stay on the system long enough for administrators to:
✓ Document the event
✓ Perhaps respond
Instrument of Honeypot
✓ sensitive monitors
✓ event loggers
23
➢ The trap usually consists of a honeypot or padded cell and an alarm.
➢ The trace feature is an extension to the honeypot or padded cell approach.
➢ The trace (similar to caller ID) is a process by which the organization attempts to
identify an entity discovered in unauthorized:
✓ Internal intruder turn him or her over to internal authorities.
✓ External intruder leads to numerous legal issues arise.
For instance:
4.5.2 Firewall Analysis Tools
➢ Firewall administration is an important step for security administration
➢ They allow administrator to:
✓ know the location of firewall
✓ automate the remote discovery of firewall rules
✓ assist the user in analyzing the rules to determine exactly what they allow
and what they reject
24
4.5.3 Detecting Operating System
➢ Detecting a target computer’s operating system is very valuable to an attacker
➢ Once the OS is known, its vulnerabilities will be determined
➢ Xprobe uses Internet Control Message Protocol (ICMP) to determine the remote
OS
➢ XProbe sends many different ICMP queries to the target host
25
4.6.3. Problem with Biometric
➢ Some human characteristics can change over time, due to:
✓ normal development
✓ Injury
✓ Illness
Remedy:
System designers must create fallback or failsafe authentication mechanisms.
26