0% found this document useful (0 votes)
945 views27 pages

EC301: Computer Network Fundamental: Chapter 6: Basic Security

This document discusses basic network security. It outlines various network threats like information theft, identity theft, and data loss that can arise from network intrusions by external or internal actors. Attack methods are described, including viruses, worms, Trojans, denial of service attacks, and brute force attacks. Social engineering techniques like pretexting and phishing are also discussed. The document recommends security policies and measures like strong passwords, firewalls, keeping software updated, and using antivirus software to help protect against these network threats.

Uploaded by

Ayu Wafa
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
945 views27 pages

EC301: Computer Network Fundamental: Chapter 6: Basic Security

This document discusses basic network security. It outlines various network threats like information theft, identity theft, and data loss that can arise from network intrusions by external or internal actors. Attack methods are described, including viruses, worms, Trojans, denial of service attacks, and brute force attacks. Social engineering techniques like pretexting and phishing are also discussed. The document recommends security policies and measures like strong passwords, firewalls, keeping software updated, and using antivirus software to help protect against these network threats.

Uploaded by

Ayu Wafa
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

EC301 : Computer Network Fundamental

Chapter 6: Basic Security


Noted prepared by: Pn. Wan Fazlini Idayu binti Wan Fakari
1

CLO 4: you should be able to create a simple network connection using Wireless Local Area Network (WLAN) in accordance to IEEE 802.11 protocols. (P7)
note: C4 =P7=origination

Chapter 6 will appear in: Lab (5) Quiz (5)


2

6.1 Network Threats

Risks of network intrusion


Once the hacker gains access to the network, four types of threat may arise:

Information theft Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes.

Identity theft A form of information theft where personal information is stolen for the purpose of taking over someone's identity.

Risks of network intrusion


Data loss / manipulation Breaking into a computer to destroy or alter data records.

Disruption of service Preventing legitimate users from accessing services.

Sources of network intrusion


External Threats

External threats arise from individuals working outside of an organization They do not have authorized access to the computer systems or network.
Internal Threats

occur when someone has authorized access to the network through a user account or have physical access to the network equipment.

Sources of network intrusion


Scenario

There are three hosts connected via a switch. A hacker working from inside the building is attempting to access the network, via the switch. A hacker is working from his home. The hacker connects to the server via the Internet, and performs an attack on the server, causing it to stop working, or become unavailable.

Social engineering
The ability of someone or something to influence behavior of a group of people. Used to deceive internal users to get confidential information. Hacker takes advantage of legitimate users

Forms of Social Engineering


Pretexting
Typically accomplished over the phone scenario used on the victim to get them to release confidential information gaining access to your social security number

Phishing
typically contacted via email attacker pretends to represent legitimate organization

Vishing/Phone Phising
User sends a voice mail instructing them to call a number which appears to be legitimate Call intercepted by thief

6.2 Methods of attacks

10

Methods of Attack
Virus
runs or spreads by modifying other programs or files needs to be activitated cannot start by itself

Worms
similar to virus does not attach itself to an existing program no human activation needed

Trojan Horse
appears harmless deceives the victim into initiating the program

DoS (Denial of Service) Attacks


Intended to deny services to users

floods network with traffic disrupts connections between client and server
Types of DoS Attacks

SYN (synchronous) Flooding packets sent with invalid IP addresses server tries to respond Ping of Death larger packet size sent than allowed leads to system crashing

DoS (Denial of Service) Attacks

DDoS (Distributed Denial of Service) Attack


more sophisticated than DoS overwhelms networks with useless data simultaneously

Brute Force Attack


Fast PC used to try and guess passwords or decipher data Attacker tries a large number of possibilities rapidly

Spyware
Program that gathers personal information from your PC without permission Information sent to advertisers Usually installed unknowingly when downloading a file Can slow down performance of the PC

Spyware

cookies, adware, and Pop-up


Cookies

Not always bad . Used to record information about the user when visiting web sites.
Adware

collects information based on sites visited useful for target advertising


Pop- Ups

additional ads displayed when visiting a site pop-ups open in front of browser pop-under open behind browser

cookies, adware, and Pop-up

Spam
Unwanted bulk e-mail Information sent to as many end users as possible Can overload servers, ISPs, etc. Estimated every Internet user receives over 3000 email per year

Bersambung 20/9/2012

6.3 Security Policy

21

Common security measures


Identification and Authentication Policies

only authorized persons should have access to network and its resources (including access to physical devices)
Password Policies

Must meet minimum requirements Change passwords regularly


Acceptable Use Policies

Determine which applications are acceptable


Remote Access Policies

Explanation of how remote users can access the network

Common security measures


Network Maintenance Procedures
Explanation of update procedures

Incident Handling Procedures


How incidents involving security will be handled

Update software patches


Use of updates and patches makes it harder for the hacker to gain access. Updates

Includes additional functionality


Patches

Small piece of code used to fix the problem

Antivirus latest patterns


Any device connected to a network is susceptible to viruses Warning signs of a virus:
computer acts abnormal sends out large quantities of email high CPU usage

Some Anti-virus programs


Email checking Dynamic scanning
checks files when accessed

Scheduled scans Automatic updates

Firewall
Used to control traffic between network Methods of a Firewall:

Packet filtering
based on IP or MAC address

Application/Web site filtering


based on the application or website being used

SPIC (Stateful Packet Inspection)


incoming packets must be legitimate responses to

requests from hosts

Homework
1. Describe risks of network intrusion. 2. Describe Viruses, Worms and Trojan Horses. 3. Explain denial of service and brute force attacks. 4. Differentiate Spyware, Tracking, Cookies, Adware and Pop-Up.
*Submit today before 3.30 p.m
27

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy