EC301: Computer Network Fundamental: Chapter 6: Basic Security
EC301: Computer Network Fundamental: Chapter 6: Basic Security
CLO 4: you should be able to create a simple network connection using Wireless Local Area Network (WLAN) in accordance to IEEE 802.11 protocols. (P7)
note: C4 =P7=origination
Information theft Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes.
Identity theft A form of information theft where personal information is stolen for the purpose of taking over someone's identity.
External threats arise from individuals working outside of an organization They do not have authorized access to the computer systems or network.
Internal Threats
occur when someone has authorized access to the network through a user account or have physical access to the network equipment.
There are three hosts connected via a switch. A hacker working from inside the building is attempting to access the network, via the switch. A hacker is working from his home. The hacker connects to the server via the Internet, and performs an attack on the server, causing it to stop working, or become unavailable.
Social engineering
The ability of someone or something to influence behavior of a group of people. Used to deceive internal users to get confidential information. Hacker takes advantage of legitimate users
Phishing
typically contacted via email attacker pretends to represent legitimate organization
Vishing/Phone Phising
User sends a voice mail instructing them to call a number which appears to be legitimate Call intercepted by thief
10
Methods of Attack
Virus
runs or spreads by modifying other programs or files needs to be activitated cannot start by itself
Worms
similar to virus does not attach itself to an existing program no human activation needed
Trojan Horse
appears harmless deceives the victim into initiating the program
floods network with traffic disrupts connections between client and server
Types of DoS Attacks
SYN (synchronous) Flooding packets sent with invalid IP addresses server tries to respond Ping of Death larger packet size sent than allowed leads to system crashing
Spyware
Program that gathers personal information from your PC without permission Information sent to advertisers Usually installed unknowingly when downloading a file Can slow down performance of the PC
Spyware
Not always bad . Used to record information about the user when visiting web sites.
Adware
additional ads displayed when visiting a site pop-ups open in front of browser pop-under open behind browser
Spam
Unwanted bulk e-mail Information sent to as many end users as possible Can overload servers, ISPs, etc. Estimated every Internet user receives over 3000 email per year
Bersambung 20/9/2012
21
only authorized persons should have access to network and its resources (including access to physical devices)
Password Policies
Firewall
Used to control traffic between network Methods of a Firewall:
Packet filtering
based on IP or MAC address
Homework
1. Describe risks of network intrusion. 2. Describe Viruses, Worms and Trojan Horses. 3. Explain denial of service and brute force attacks. 4. Differentiate Spyware, Tracking, Cookies, Adware and Pop-Up.
*Submit today before 3.30 p.m
27