Unit 1 Introduction and Security Threats
Unit 1 Introduction and Security Threats
1
Introduction and Security threats
CONTENT
1.1 Threats to Security
1.2 Avenues of Attack
2
INTRODUCTION AND SECURITY
THREATS
Basics of Security
Types of Attack
3
1.1 THREATS TO SECURITY
Viruses and Worms
Intruders, Insiders
Criminal organizations
Terrorists
Information warfare
4
VIRUS
A computer virus attaches itself to a program or
file enabling it to spread from one computer to
another, leaving infections as it travels. Like a
human virus.
Almost all viruses are attached to an executable
file, which means the virus may exist on your
computer but it actually cannot infect your
computer unless you run or open the malicious
program.
It is important to note that a virus cannot be
spread without a human action(such as running
an infected program). 5
WORMS
worm is similar to a virus by design and is
considered to be a sub-class of a virus.
Worms spread from computer to computer, but
unlike a virus, it has the capability to travel
without any human action.
A worm takes advantage of file or information
transport features on your system, which is what
allows it to travel unaided.
6
INTRUDERS
One of the two most publicized threats to security is the
intruder (the other is viruses), often referred to as a hacker
or cracker.
Intruders can be classified in three Classes:
Masquerader:
10
CRIMINAL ORGANIZATION
Organized crime is a category of transnational,
national, or local groupings of highly centralized
enterprises run by criminals who intend to
engage in illegal activity, most commonly for
money and profit.
Some criminal organizations, such as
terrorist groups, are politically motivated.
11
1.2 AVENUE OF ATTACK/STEPS IN ATTACK
Two reasons for attack:
1)Specifically targeted by the attacker
2)Opportunistic target
12
STEPS IN ATTACK
13
1.3 SECURITY BASICS
Confidentiality
Integrity
Availability
14
DATA CONFIDENTIALITY
When we talk about confidentiality of
information, we are talking about protecting the
information from disclosure to unauthorized
parties (wrong Person).
Information has value, especially in today’s
world. Bank account statements, personal
information, credit card numbers, trade secrets,
government documents.
Everyone has information they wish to keep a
secret. Protecting such information is a very
major part of information security.
15
INTEGRITY
Integrity of information refers to protecting
information from being modified by unauthorized
parties.
Information only has value if it is correct.
Information that has been tampered with could
prove costly.
For example,
17
1.4 TYPES OF ATTACK
Denial of service (DOS),
backdoors and trapdoors,
sniffing,
spoofing,
TCP/IP Hacking,
Phishing attacks,
Distributed DOS,
SQL Injection
21
DDOS ATTACKS
In a typical DDoS attack, the army of the attacker
consists of master zombies and slave zombies.
The hosts of both categories are compromised
machines that have arisen during the scanning
process and are infected by malicious code.
The attacker coordinates and orders master zombies
and they, in turn, coordinate and trigger slave
zombies.
The attacker sends an attack command to master
zombies and activates all attack processes on those
machines, which are in hibernation, waiting for the
appropriate command to wake up and start attacking.
Then, master zombies, through those processes, send
attack commands to slave zombies, ordering them to22
mount a DDoS attack against the victim.
CONTINUE…
25
NETWORK SNIFFING (PACKET SNIFFING)
A sniffer is an application that can capture
network packets.
Sniffers are also known as network protocol
analyzers.
While protocol analyzers are really network
troubleshooting tools, they are also used by
hackers for hacking network.
26
CONTINUE…
27
SPOOFING ATTACK
In a spoof attack, the hacker modifies the source
address of the packets he or she is sending so that
they appear to be coming from someone else. This
may be an attempt to bypass your firewall rules.
Any internet connected device necessarily sends IP
datagram into the network. Such internet data
packets carry the sender's IP address as well as
data.
If the attacker obtains control over the software
running on a network device, they can then easily
modify the device's protocols to place an arbitrary
IP address into the data packet's source address
field. This is known as IP spoofing. 28
CONTINUE…
29
MAN-IN-THE-MIDDLE ATTACK
As the name indicates, a man-in-the-middle attack
occurs when someone between you and the person with
whom you are communicating is actively monitoring,
capturing, and controlling your communication
transparently.
This type of attack is also an access attack, but it can
be used as the starting point of a modification attack.
This involves placing a software between a server and
the user that neither the server administrators nor the
user are aware of.
This software intercepts data and then send the
information to the server as if nothing is wrong.
The server responds back to the software, thinking it's
communicating with the legitimate client. 30
31
MESSAGE REPLAY
Message replay involves the re-use of captured
data at a later time than originally intended in
order to repeat some action of benefit to the
attacker.
for example,
32
TCP/IP HACKING
Take control of one side of a TCP connection
Combination of sniffing and spoofing
Alice telnet
Bob
Alice
Attacker 33
SESSION HIJACKING: THE DETAILS
Attacker is on segment where traffic passes from Alice
to Bob
Attacker sniffs packets
Sees TCP packets between Bob and Alice and their
sequence numbers
Attacker jumps in, sending TCP packets to Bob; source
IP address = Alice’s IP address
Bob now obeys commands sent by attacker, thinking
they were sent by Alice
Principal defense: encyrption
35
PHISHING ATTACK
In phishing attack the hacker creates a fake web
site that looks exactly like a popular site such as
the SBI bank or paypal.
The phishing part of the attack is that the hacker
then sends an e-mail message trying to trick the
user into clicking a link that leads to the fake
site.
When the user attempts to log on with their
account information, the hacker records the
username and password and then tries that
information on the real site.
36
CONTINUE…
A
2
Experiment:
2
1
B
A1 eBay
5
37
4 credentials
SQL INJECTION
SQL injection is a technique where malicious
users can inject SQL commands into an SQL
statement, via web page input.
Injected SQL commands can alter SQL statement
and compromise the security of a web
application.
When SQL is used to display data on a web page,
it is common to let web users input their own
search values.
Since SQL statements are text only, it is easy,
with a little piece of computer code, to
dynamically change SQL statements to provide
the user with selected data: 38
CONTINUE…
Server Code
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE
UserId = " + txtUserId;
The example above, creates a select statement by
adding a variable (txtUserId) to a select string.
The variable is fetched from the user input
(Request) to the page.
39
SIMPLE SQL INJECTION ATTACK
FIGURE
40
LOGIC BOMB