Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
33 views
20 pages
Is 1
Uploaded by
Thanos
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save IS-1 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
33 views
20 pages
Is 1
Uploaded by
Thanos
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save IS-1 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 20
Search
Fullscreen
UNIT The Internet Protocol (IP) is the principal communications protocol in the Internet_protocol uite for relaying datagrams across network boundaries. Its routing function enables internetworking, and ssentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the [P idresses in the packetheaders. For this purpose, IP defines packet structures that encapsulate the data to delivered. It also defines addressing methods that are used to label the datagram with source and lestination information. istorically, IP was the connectionless datagram service in the original Transmission Control rogram introduced by Vint_Cerf andBob__Kahnin 1974; the other being the connection- riented Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as ‘CPAP. first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the Internet. its successor is Internet Protocol Version 6 (IPv6). What is Internet Protocol (IP)? (short for Internet Protocol) specifies the technical format ofpackets and the addressing scheme for computers to communicate over a network. Most networks combine IP with a higher-level protocol led Transmission Control Protocol (TCP), which establishes a virtual connection between a destination asource. by itself can be compared to something like the postal system. It allows you to address a package and ‘op it in the system, but there's no direct link between you and the recipient. TCP/IP, on the other hand, lishes a connection between two hosts so that they can send messages back and forth for a period of ime. TCP/ Me hort for Transmission Control ProtocoV/Internet Protocol, TCP/IP is a set of rules (protocols) soverning communications among all computers on the Internet. More specifically, TCP/IP dictates how formation should be packaged (turned into bundles of information called packets), sent, and received, as J] as how to get to its destination, TCP/IP was developed in 1978 and driven by Bob Kahn and Vint rf. @”TCP/IP Packet 32 bits How does TCP/IP work? jAs the name implies, TCP/IP is a combination of two separate protocols: Transmission Control Protocol LCP) and Internet Protocol (IP). The Intemet Protocol standard dictates the logistics of packets sent out ver networks; it tells packets where to go and how to get there. IP has a method that lets any computer on the Internet forward packet to another computer that is one or more intervals closer to the packet's fecipient. You can think of it like workers ina line passing boulders from a quarry to a mining cart, [The Transmission Control Protocol is responsible for ensuring the reliable transmission of data across Intemet-connected networks. TCP checks packets for errors and submits requests for re-transmissions if yy are found. three of the most common TCP/IP protocols + HTTP. Used between a web client and a web server, for non-secure data transmissions, A. web client (i.e. Internet browser on a computer) sends a request to a web server to view a web page. The Web server receives that request and sends the web page information back to the web client. + HTTPS - Used between a web client and a web server, for secure data transmissions. Often used for sending credit eard transaction data or other private data from a web client (i.e. Intemet browser on a computer) to a web server. + FIP Used between two or more computers. One computer sends data to or receives data from another computer directly [Domain names and TCP/IP addresses [The TCP/P address for a website or web server is typically not easy to remember. To re in a medy this issue, Pidomain_name is used instead. For example, 45.79.151.23 is the IP address for the Computer Hopename. Using this method, instead of a set o to remember Computer Hope's web address. Internet Protocol Versions There are currently two version of Internet Protocol (IP): JPv4 and a new version called IPv6. IPv6 is an volutionary upgrade to the Internet Protocol. IPV6 will coexist with the older IPv4 for some time. What is IPv4 -- Internet Protocol Version 4? v4 (Internet Protocol Version 4) i the fourth revision of the Internet Protocol (IP) used to to identify devices on anetwork through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks (see RFC:791). Pv4 is the most widely deployed Internet protocol used to connect devices to the Internet, IPv4 uses a 32- itaddress scheme allowing for a total of 2°32 addresses (just over 4 billion addresses). With the growth f thelnternet it is expected that the number of unused IPv4 addresses will eventually run out because very device - including computers, smartphones and game consoles -- that connects to the Internet uires an address. [NW Intemet addressing system Intemet Protocol version 6 (IPv6) is being deployed to fulfil the need for more Internet addresses. ‘hat is IPY6 -- Internet Protocol Version 6? Pv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and it is the fet version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the ‘urrent version of IPv4 (Internet Protocol Version 4). Pv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an evolutionary upgrade to be Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPV6 is designed to allow Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data fic transmitted, PV6 is often referred to as the "next generation” Internet standard and has been under development now pines the mid-1990s. IPv6 was bom out of concem that the demand for IP addresses would exceed the Wailable supply. [While increasing the pool of addresses is one of the most often-talked about benefit of IPv6, there are other important technological changes in IPv6 that will improve the IP protocol: No more NAT (Network Address Translation) Auto-configuration ‘No more private address collisions Better multicast routing Simpler header format Simplified, more efficient routing True quality of service (QoS), also called "flow labeling" Built-in authentication and privacy support Flexible options and extensions Easier administration (say good-bye to DHCP) [The following table lists the important differences between IPv4 and IPV6.IPy4 addresses are 32 bit length 1PV6 adidresses are 128 bit length. [WPv4 addresses are binary _numbers represented in a 1PV6 addresses are binary numbers represented in hexadecimals, iecimals. |LPSec support is only optional. Inbuilt IPSee support |Fragmentation is forwardins is done by sender and forwarding ‘ragmentation is done only by sender. routers. Fretmentation Packet flow identification is available within the IPv6 INo packet f iticati Ee et header using the Flow Label field. hecksum field is available in IPv4 header No checksum field in IPv6 header. (Options fields are available in IPv4 header. ‘No option fields, but IPv6 Extension headers are available, Adc Resolution Protocol (ARP) is available to Address Resolution Protocol (ARP) is replaced with a function ImapIPv4 addresses to MAC addresses. ofNeighbor Discovery Protocol (NDP). i linternet Group Management Protocol (IGMP) is used to IGMP is replaced with Multicast Listener Discovery (MLD) Imanage multicast group membership. messages Broadcast messages are not available. Instead a link-local scope [Broadcast messages are available. “All nodes” multicast IPv6 address (FFO2::1) is used for broadcast similar functionality. [Manual configuration (Static) of IPv4 addresses or IDHCP (Dynamic configuration) is required to Auto-configuration of addresses is available. [configure IPv4 addresses. Connecting Devices - Hub, Repeater, Switch, Bridge, Router, Gateway # LECT cordess Nea ones computer POS TaN € ay FON FONUSE CLAN Power TH x s a}
which lead in loss of data. Hence, in order to pr led signal. In addition, it has all the and the Hubs are that only one @ particular time. If multiple devices transmit data Switch The term intelligent refers to the decision ik layer, it has knowledge of the MAC Fig 4: Switch tence, in the Fig 1, if data has to be set ., the data is transferred to the Computer B only, and not to any other computers eonnecte » it establishes a ink between the sender and the recei - This also means that when data is ‘ing sent from A to B, ‘Computer C can es tablish a link with Computer D and communication can take lace between them. So, simultaneous data transfer is possible in a switch, Also, Hub. wut a Switch does not. t is also to be noted that estinations, and also c i sends information only to the desired in be implemented in the Switches, revent this, the |CIBri A bridge is also a device which works in the Data Link Layer, but is more primitive when compared to a ‘witch. Initial bridges were used to connect only 2 LAN’s, but the most recent ones perform similar operation as the switches. It also works on the principle of transfer of information using the MAC addresses of the ports Fig 5: Bridge i can be noted is that the normal ADSL modem can be connected via bridging also. The only difference is that, when bridging is used, each time the device has to be connected to the internet, it has to dial to the internet and establish a connection. Also, a bridge alone cannot be used to connect to the internet, because, J) fhe bridge works in the Data Link Layer, and has no knowledge of the IP Addresses, which are used in the internet, [Router (Any computer can be connected to the internet [DEModulation operations. But, MODEM, which performs the MODulation and the when there are more than one computer at home or in an organization, and ‘ou have a single intemet connection, you need a Router. Router is a device which is used when multiple levices need to connect to the Internet using the same IP. {Any Internet Service Provider (ISP) provides a single IP, and especially for personal use, the IP address is igned dynamically. This is done because, suppose, an ISP has 1000 IP addresses, it does not mean that t has 1000 customers. An ISP assumes that not all devices will be connected to the internet at the same ime. Hence, when a user wants to access the internet, any IP address from the pool of IP addresses from the ISP will be assigned to connect the user to the internet, ig 6: Router lence, the router does the job of connecting multi iple devices in a LAN to the intemet using the same IP ress, Since the router works in the Network Layer, it does forwarding on the basis of IP addresses, [The WiFi routers that are commonly used now are the IE] : ‘BE 802.11 big standard router, which is explained below.WEEE 802.11 EEE 802.11 is a standard for WiFi, There are several different technologies/ generations that have been implemented. As mentioned, the recent modems are TEER, 802.11 b/g modems. The word b/g has the meaning as follows: 0 TEBE 802.11 b standard uses 2.4GHz band and has a maximum transfer rate of 11 Mbps, while the HEEI F 802.11 g standard uses 2.4 GHz band and has maximum transfer rate of 54 Mbps. ‘Thus the b/g modem refers to a dual bandwidth modem, which is compatible with both the b and g standards, The Yandards are mainly differentiated based on the distance and speed of data trans The more recent IEE 802.11 N standard has the capability to provide speeds of over 100 Mbps, It ay uses multiple wireless signals and antennas, and has increased signal intensity in order to be able n Provide network for greater distances, It employs MIMO technology, wherein spatial encoding is used, The spatial pre-coding is done at the transmitter and the post-coding is done at the receiver, Recently, [Reliance Communications was in news for implementing MIMO technology to improve its 3G data nsfer speeds, Brouter PBrouter (Bridging Router) is a device which has two functions, Brouter acts as a router for known ae (known by the router and those on the network) and hence works in the network layer. For data kets with unknown protocols, it acts as a bridge by connecting two different networks which is the lunction of a bridge - and this works in the data-link layer. Jateway The Gateway devices work in the Transport I implemented. A gateway is necessary when ILAN’s which are to be connected together. layer and above, where the different network technologies are there are different technologies implemented by the ws Fig 7: Gateway function The Fig 7 shows the working of a gateway. Consider 2 networks, say in New York, and a network in [London. If data has to be sent from one place to another, we need to sure that the network technologies hat are being used by both the networks are the same, If not, we need to use a Gateway In the more common example, we use ieee technologies. The telephone networ ifferent technologies are being used telephone network and intern rk follows the ISDN, and In this case, the let networks, which works on the Internet follows the IP. Here, 2 router fails to work, since the router cannotjunderstand the functionalities of both the networks, Hence, we require a Gateway, which acts as a ranslator in communicating between the 2 networks. }Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues.# [Business Needs First Information security performs four important functions for an organization: 1. Protects the organization’s ability to function 2. Enables the safe operation of applications implemented on the organization’s IT systems. 3. Protects the data the organization collects and uses. 4. Safeguards the technology assets in use at the organization, 1. Protecting the fun nality of an organization * Decision makers in organizations must set policy and operate their organizations in compliance with the complex, shifting legislation that controls the use of technology. 2. Enabling the safe operation of applications * Organizations are under immense pressure to acquire and operate integrated, efficient, and capable applications * The modem organization needs to create an environment that safeguards applications using the organization's IT systems, particularly those applications that serve as important ‘elements of the infrastructure of the organization. 3. Protecting data that organizations collect & use © Protecting data in motion * Protecting data at rest © Both are critical aspects of information security. * The value of data motivates attackers to seal, sabotage, or corrupt it. * It is essential for the protection of integrity and value of the organization’s data 4. Safeguarding Technology assets in organizations + Must add secure infrastructure services based on the size and scope of the enterprise. * Organizational growth could lead to the need for public key infrastructure, PKI, an integrated system of software, encryption methodologies. Threats To protect an organization’s information, you must 1. Know yourself (ie) be familiar wit the information to be protected, and the process it. 2. Know the threats you face To make sound decisions about information security, various threats facing the organization, systems that store, transport and : management must be informed about the its application, data and information systems.A threat is an object, person, or other entity, that represents a constant danger to an asset. ‘Threats to Information Security Categories of threat Examples ts of human error or failure ~ Accidents, employee mistakes ‘ompromises to intellectual property Piracy, copyright infringement [Deliberate acts of espionage or trespass-- Unauthorized access and/or/data collection [Deliberate acts of information extortion Blackmail or information disclosure [Deliberate acts of sabotage or vandalism —- Destruction of systems or information Deliberate acts of thet ~~ _ Illegal confiscation of equipment or information [Deliberate software attacks - Viruses, worms, macros, denial-of-service Forces of nature Fire, flood, earthquake, lightning [Deviations in quality of service - ISP, power or WAN service providers [Technical hardware failures or errors -- Equipment failure [Technical software failures or errors - Bugs, code problems, unknown loopholes Technological obsolescence -- Antiquated or outdated technologies [Chreats 1. Acts of Human Error or Failure: ‘* Acts performed without intent or malicious purpose by an authorized user. * because of in experience ,improper training, © Making of incorrect assumptions. One of the greatest threats to an organization’s information security is the organization’s own employees. * Entry of erroneous data * accidental deletion or modification of data ‘+ storage of data in unprotected areas. * Failure to protect information an be prevented with Training Ongoing awareness activities Verification by a second party Many military applications have robust, dual- approval controls built in . 2. Compromises to Intellectual Property * is defined as the ownership of ideas and control over the tangible or virtual representation of those ideas. * Intellectual property includes trade secrets, copyrights, trademarks, and patents, © Once intellectual property has been defined and properly identified, breaches to IP constitute a threat to the security of this information. © Organization purchases or leases the IP of other organizations. * Most Common IP breach is the unlawful use or duplication of software based intellectual property more commonly known as software Piracy. © Software Piracy affects the world economy. © USS provides approximately 80% of world’s software.a A, a in addition to the laws surrounding software piracy, two watch dog organizations investigate allegations o! oftware abuse. a 1. Software and Information Industry Association (SILA) (.e)Software Publishers Association 2. Business Software Alliance (BSA) i as * Another effort to combat (take action against) piracy is the online registration process. B. Deliberate Acts of Espionage or Trespass * Electronic and human activities that can breach the confidentiality of information. * When an unauthorized individual’s gain access to the information an organization is trying to Protect is categorized as act of espionage or trespass. Attackers can use many different methods to access the information stored in an information system, Competitive Intelligencefuse web browser to get information from market research] . Industrial espionage(spying) 3. Shoulder Surfing(ATM) ne ‘Trespass Can lead to unauthorized real or virtual actions that enable information gatherers to enter Dremises or systems they have not been authorized to enter. Sound principles of authentication & authorization can help organizations protect valuable information and systems. © Hackers-> illegally” There are generally two skill levels among hackers, Expert Hackers> Masters of several operating systems. * Unskilled Hackers “People who use and create computer software to gain access to information Programming languages, networking protocols, and Damage the image of organization Cyber terrorism-Cyber terrorists hack systems to conduct terrorist activities throu, 7 ist act igh network of 6. Deliberate Acts of Theft {Megat taking of another's property isa constant problem, print an organization, property can be physica, electron, or intellectual, Physical theft can be controlled by installation of alan systems, Trained security professionals, : Electronic theft control is under research, [?- Deliberate Software Attacks Because of malicious code or mal* These software components are designed to damage, destroy or deny service to the target system. * More common instances are Virus, Worms, Trojan horses, Logic bombs, Backdoors. * “The British Internet Service Provider Cloudnine” be the first business “hacked out of e) irus ‘* Segments of code that performs malicious actions. * Virus transmission is at the opening of Email attachment files. * Macro virus-> Embedded in automatically executing macrocode common in word processors, spreadsheets and database applications. * Boot Virus-> infects the key operating files located in the computer's boot sector. ‘orms * A wom is a malicious program that replicates itself constantly, without requiring another Program to provide a safe environment for replication. * Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. * Eg: MS-Blaster, MyDoom, Netsky, are multifaceted attack worms. © Once the worm has infected a computer , it can redistribute itself to all e-mail addresses found on the infected system. © Furthermore, a worm can deposit copies of itself onto all Web servers that the infected systems can reach, so that users who subsequently visit those sites become infected. [Trojan Horses © Are software programs that hide their true nature and reveal their designed behavior only when activated. Trojan horse releases Trojan horse Trojan horse is |___—._— its payload, monitors arrives via E- |__| activated when computer activity, mail or the software or installs back door, or software such attachment is transmits information as free games executed to hacker ‘Trojan horse Attack Back Door or Trap Door A Virus or Worm has a payload that installs a backdoor or trapdoor component in a system, which allows the attacker to access the system at will with special privileges. Eg: Back Orifice Polymorphism ‘© A Polymorphic threat is one that changes its apparent shape over time, making it undetectable by techniques that look for preconfigured signatures. These viruses and Worms actually evolve, changing their size, and appearance to elude detection by antivirus software programs.ry Virus kerver irus & Worm Hoaxes Peainst your wishes. ms Data Sending Trojans Proxy Trojans * FTP Trojans Security software disabler Trojans Denial of service attack Trojans(DOS) A program or piece of code that be loaded on to your computer, without your knowledge and run Worm A program or al gorithm that replicates itself over a computer network and usuall fmalicious actions. 3 ic [Projan Horse A destructive program that masquerade on beginning application, unlike viruses, Trojan horse do hot replicate themselves. Blended threat Blended threats combine the characteristics of virus, worm, Trojan horses & malicious code with and Internet Vulnerabilities. Antivirus Program A Utility that searches a hard disk for viruses and removes any that found. [Forces of Nature Fire: Structural fire that damages the building. Also encompasses smoke damage from a fire or ater damage from sprinkles systems. Flood: Can sometimes be mitigated with flood insurance and/or business interruption Insurance. Earthquake: Can sometimes be mitigated with specific causality insurance and/or business interruption insurance, but is usually a separate policy. Lightning: An Abrupt, discontinuous natural electric discharge in the atmosphere. Landslide/Mudslide: The downward sliding of a mass of earth & rocks directly damaging all parts sf the information systems. Tornado/Severe Windstorm: Huricane/typhoon: Tsunami fa Electrostatic Discharge (ESD): Dust Contamination:They must also prepare contin ecovery plans, business continui face of these threats, Deviations in Quality of Service A product or service is not delivered to the organization as expected. The Organization's information sy: interdependent support systems. It includes power grids, telecom networks, Janitorial staff & garbage haulers, This degradation of service is a form of availability disruption. [Internet Service Issues Internet service Provider(ISP) failures can considerably undermine the availability of information, |€ The web hosting services are usually arranged with an agreement providing minimum service levels known as a Service level Agreement (SLA). When a Service Provider fails to meet SL, by the client, but these wency plans for continued operations, such as disaster ity plans, and incident response plans, to limit losses in the stem depends on the successfil operation of many Parts suppliers, service vendors, and even the 'y services can affect the organizations are telephone, cable television, natural or propane gas, and custodial services. The loss of these services can i water, waste water, trash pickup, pair the ability of an organization to function, For an example, ifthe waste water system fails, an organization might be prevented from allowing employees into the building. This would stop normal business operations. Power Irregul ies * Fluctuations due to power excesses. ¢ ‘© Power shortages & © Power losses This can pose problems for organizations that provide inade information systems equipment. © When voltage levels spike (experience a momentary inerease),or su increase ), the extra voltage can severely damage or destroy equipment. + The more expensive uninterruptible power supply (UPS) can protect against spikes and surges. quately conditioned power for their irge ( experience prolonged (echnical Hardware Failures or Errors * Resulting in unreliable service or lack of availability ‘* Some errors are terminal, in that they result in unrecoverable loss of equipment. Some errors are intermittent, in that they resulting in faults that are not easily repeated. [Lechnical software failures or errorsMiwite called as TCP hijacking attack, Aan attacker Monitors Packets from it Sey fom the network, modifies * Spam is unsolicited commercial E-mail. * Ithas been used to make malicious code attacks more effective. 88 trivial nuisance rather than an attack, Another form of E-mail attack that is also a DOS called a.m & Attacker routes large quantities of e-mail tothe target, * The target ofthe attack receives unmanageably large volumes of By sending large e-mails, attackers can take advantage Internet and trick them into sending many e-mails to an The target e-mail address is buried under thousands or e “unsolicited e-mail. of poorly configured e-mail systems on the address chosen by the attacker, -ven millions of unwanted e-mails, sniffers © A sniffer isa program or device that can monitor data traveling over a network, Unauthorized sniffers can be extremely dangerous to a network's security, because they are virtually impossible to detect and can be inserted almost anywhere, Sniffer often works on TCP/IP networks, where they are sometimes called * ‘packet Sniffers”, Social Engineering © It is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. * Anaattacker gets more information by calling others inthe company and asserting hisher authority by mentioning chiefs name. [Buffer Overflow© A buffer overflow is an application error that occurs when more data is sent to a buffer than it can handle. * Attacker can make the target system execute instructions, [Timing Attack * Works by exploring the contents of a web browser’s cache. + These attacks allow a Web designer to create a malicious form of cookie, that is stored on the client's system, * The cookie could allow the designer to collect information on how to access password- protected sites. \Attacks * Anattack is an act of or action that takes advantage of a vulnerability to compromise a controlled system. * It is accomplished by a threat agent that damages or steals an organization's information or physical asset. * Vulnerability is an identified weakness in a controlled system, where controls are not present or are no longer effective. ‘© Attacks exist when a specific act or action comes into play and may cause a potential loss. jous code © The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. © The state-of-the-art malicious code attack is the polymorphic or multivector, worm. © These attack programs use up to six known attack vectors to exploit a variety of vulnerabilities in commonly found information system devices. [Attack Replication Vectors IP scan & attack Web browsing Virus Unprotected shares Mass mail Simple Network Management Protocol(SNMP) ayaeye l1. IP scan & attack ‘The infected system scans a random or local range of IP addresses and targets any of several vulnerabilities known to hackers. 2. Web browsing If the infected system has write access to any Web pages, it makes all Web content files _html,.asp,.cgi & others) infectious, so that users who browse to those pages become infected. B. VirusEach infected machine infects certain common exec tutable or script files on all computers to which ft can write with virus code that can cause infection, #4. Unprotected shares Using vulnerabilities in file systems and the way many organizations configure them, the infected machine copies the viral component to all locations it can reach. 5. Mass Mail By sending E-mail infections to addresses found in the address book, the infected machine infects frany users, whose mail -reading programs also automatically run the program & infect other systems. f- Simple Network Management Protocol (SNMP) * By using the widely known and common passwords that were employed in early versions of this Protocol, the attacking program can gain control of the device. Most vendors have closed these Vulnerabilities with software upgrades. Hoaxes A more devious approach to attacking the computer systems is the transmission of a virus hoax with a real virus attached. Even though these users are trying to avoid infection, they end up sending the attack on to their co- workers. ackdoors * Using a known or previously unknown and newly discovered access mechanism, gain access to a system or network resource through a back door. * Sometimes these entries are left behind by system desi to as trap doors. A trap door is hard to detect, because very often the programmer who puts it in place also makes the access exempt from the usual audit logging features of the system. an attacker can igners or maintenance staff, and thus referred Password Crack ® © Attempting to reverse calculate a password is often called cracking, * A password can be hashed using the same algorithm and compared to the hashed results, If they are same, the password has been cracked. * The (SAM) Security Account Manager file contains the hashed representation of the user’s password. Brute Force ‘© The application of computing & network resources to a password is called a Brute force attack. © This is often an attempt to repeatedly guess passwords to commonh called a password attack. try every possible combination of options of ly used accounts, it is sometimes ictional * This is another form of the brute force attack noted above for guessing passwords,* The dictionary attack narrows the field by selecting specific accounts to attack and uses a list of ‘commonly used passwords instead of random combinations. nial —of- Services jervice(DD. ‘The atacker sends a large number of connection or information requests to a target. ‘his may result inthe system crashing, or simply becoming unable to perform ordinary functions, DDOS is an attack in which a coor dinated stream of requests is launched dagainst a target from ‘many locations at the same. spoofing It is a technique used to gain unauthorized access to computers, where in the intruder sends tants 10 a computer that has an IP address that indicates that the messages are coming from a ‘trusted host. : eh Data: Payload IP source: [1p destination: 192.168.0.25 | 100.0.0.75 Original IP packet C From hacker's system Data: Payload [IP source IP destination: 100.0.0.80 | 100.0.0.75 Dees) Spoofed (modified) IP packet Spoofed packet Sent to target Firewall allows packet in, mistaking it for : legitimate traftieCommunications Act of 2002 ommunications 1934 Regulates interstate and of 1934,updated by foreign Telecommunications. Telecommunications Deregulation & Competition Act Computer Fraud & | Threats to computers 1986 Defines and formalizes laws Abuse Act to counter threats from computer related acts and offenses. Computer Security | Federal Agency | 1987 Requires all federal computer Act of 1987 Information Security systems that —_contain classified information to have surety plans in place, and requires periodic security training for all individuals who operate, design, or manage such systems. Economie Espionage | Trade secrets. 1996 Designed to prevent abuse of Act of 1996 information gained by an individual working in one company and employed by another. Electronic Cryptography 1986 Also referred to as the Communications Federal Wiretapping Act; Privacy Act of 1986 regulates interception and disclosure of electronic information, Federal Privacy Act | Privacy 1974 Governs federal agency use of 1974 of personal information, Gramm-Leach-Bliley | Banking 1999 Focuses on __ facilitating Act of 1999 affiliation among banks, insurance and securities firms; it has significant impact on the privacy of personal information used by these industries, Health Insurance | Health care privacy 1996 Regulates collection, storage, Portability and and transmission of sensitive Accountability Act personal health care information, National Information | Criminal intent 1996 Categorized crimes based on Infrastructure defendant's authority to protection Act of access computer and criminal 1996 intent, Sarbanes-Oxley Act | Financial Reporting 2002 Affects how public organizations and accounting firms deal with corporate governance. “arise|| | disclosure, and the practice of public accounting. Security and | Use and sale of software | 1999 Clarifies use of encryption Freedom through | that uses or enables for people in the United Encryption Act of | encryption, states and permits all persons ene in the U.S, to buy or sell any encryption product and states that the government cannot require the use of any kind of key escrow system for encryption products. U.S.A, Patriot Act of 2001 Defi fer penalties for Or prosecution of terrorist crimes. K MANAGEMENT Definition: ‘The formal process of identifying and controlling the risks facing an organization is called risk management. It is the probability of an undesired event causing damage to an asset. There are three steps 1. Risk Identification. 2. Risk Assessment 3. Risk Control Risk Identification: It is the process of examining and documenting the security posture of an rganization’s information technology and the risk it faces. isk Assessment: It is the documentation of the results of risk identification. isk Control: It is the process of applying controls to reduce the risks to an organization's data and formation systems. ‘o keep up with the competition, organizations must design and create safe environments in which usiness process and procedures can function. [These environments must maintain Confidentiality & Privacy and assure the integrity of organizational \iata-objectives that are met through the application of the principles of risk management {Components of Risk Management Risk Management Risk Identification Risk Control Risk Assessment is the documented result of Selecting Strategy the risk identification process ft
You might also like
CN Unit - IV Full
PDF
No ratings yet
CN Unit - IV Full
103 pages
Understanding TCP/IP
PDF
No ratings yet
Understanding TCP/IP
9 pages
2.1 Internet Principles
PDF
No ratings yet
2.1 Internet Principles
33 pages
UNIT III Basic Internetworking (IP, CIDR, ARP, RARP, DHCP, ICMP)
PDF
No ratings yet
UNIT III Basic Internetworking (IP, CIDR, ARP, RARP, DHCP, ICMP)
12 pages
CHAPTER 2 - Lesson 1-2
PDF
No ratings yet
CHAPTER 2 - Lesson 1-2
56 pages
Lecture 3 Fall 2017 It U
PDF
No ratings yet
Lecture 3 Fall 2017 It U
74 pages
CN Unit-4
PDF
No ratings yet
CN Unit-4
72 pages
CN Lec5
PDF
No ratings yet
CN Lec5
23 pages
Protocols and Switching
PDF
No ratings yet
Protocols and Switching
48 pages
How Does An IP Address Work
PDF
No ratings yet
How Does An IP Address Work
4 pages
Tema 3
PDF
No ratings yet
Tema 3
73 pages
Network Security Unit 2
PDF
No ratings yet
Network Security Unit 2
37 pages
Unit 4 Cyber Security
PDF
No ratings yet
Unit 4 Cyber Security
58 pages
Chapter 4 Part I
PDF
No ratings yet
Chapter 4 Part I
86 pages
Curs 4
PDF
No ratings yet
Curs 4
36 pages
Chapter 4 Part I - 220121001702
PDF
No ratings yet
Chapter 4 Part I - 220121001702
86 pages
Internet Protocol Version 6 (IPv6)
PDF
No ratings yet
Internet Protocol Version 6 (IPv6)
20 pages
Lesson5b Cable Raceway and IP Class
PDF
No ratings yet
Lesson5b Cable Raceway and IP Class
46 pages
8 Network Layer
PDF
No ratings yet
8 Network Layer
42 pages
Chapter 18
PDF
No ratings yet
Chapter 18
22 pages
Chapter Four
PDF
No ratings yet
Chapter Four
20 pages
Unit-I - AIN
PDF
No ratings yet
Unit-I - AIN
55 pages
ADA Unit-1 Notes
PDF
No ratings yet
ADA Unit-1 Notes
49 pages
Ip and Protocls
PDF
No ratings yet
Ip and Protocls
9 pages
Form6 U05019O6N0604241200007 PDF
PDF
No ratings yet
Form6 U05019O6N0604241200007 PDF
2 pages
Midterms - Chapter 8-10 Assignment
PDF
No ratings yet
Midterms - Chapter 8-10 Assignment
6 pages
Java Book
PDF
No ratings yet
Java Book
516 pages
The Network Protocol and TCP
PDF
No ratings yet
The Network Protocol and TCP
42 pages
Lec20 Protocols and Standards
PDF
No ratings yet
Lec20 Protocols and Standards
46 pages
Information Security
PDF
No ratings yet
Information Security
45 pages
Network Layer 4
PDF
No ratings yet
Network Layer 4
24 pages
Itp
PDF
No ratings yet
Itp
3 pages
CN Module 4
PDF
No ratings yet
CN Module 4
21 pages
BTCS (703) Network Pogramming Unit I
PDF
No ratings yet
BTCS (703) Network Pogramming Unit I
41 pages
I.P. Protocol AND Network Applications: Authors Mayur Patel Jitendra Shishangiya
PDF
No ratings yet
I.P. Protocol AND Network Applications: Authors Mayur Patel Jitendra Shishangiya
29 pages
Stqa Py
PDF
No ratings yet
Stqa Py
69 pages
Internet Protocol
PDF
No ratings yet
Internet Protocol
3 pages
Chapter 4
PDF
No ratings yet
Chapter 4
31 pages
IPv6Terminology BrianMcGehee
PDF
No ratings yet
IPv6Terminology BrianMcGehee
90 pages
Lecture 6 Computer Network
PDF
No ratings yet
Lecture 6 Computer Network
53 pages
CN Unit 4
PDF
No ratings yet
CN Unit 4
35 pages
MPMC Book
PDF
No ratings yet
MPMC Book
90 pages
Document On Cisco
PDF
No ratings yet
Document On Cisco
15 pages
Ip Protocol-1
PDF
No ratings yet
Ip Protocol-1
49 pages
Unit 4
PDF
No ratings yet
Unit 4
40 pages
PYHV
PDF
No ratings yet
PYHV
65 pages
Techopedia Explains Internet Protocol Version 4 (Ipv4) : Program Introduced by
PDF
No ratings yet
Techopedia Explains Internet Protocol Version 4 (Ipv4) : Program Introduced by
2 pages
Unit Ii
PDF
No ratings yet
Unit Ii
31 pages
ACN - Addressing Scheme
PDF
No ratings yet
ACN - Addressing Scheme
35 pages
Twisted Pair: Networking Devices, Media and Connector Common Network Cables 1
PDF
No ratings yet
Twisted Pair: Networking Devices, Media and Connector Common Network Cables 1
3 pages
Embedded Networks
PDF
No ratings yet
Embedded Networks
31 pages
Presentation1 (Autosaved)
PDF
No ratings yet
Presentation1 (Autosaved)
49 pages
Clase 3. IPv6 Addressing
PDF
No ratings yet
Clase 3. IPv6 Addressing
99 pages
Internet Protocols
PDF
No ratings yet
Internet Protocols
37 pages
WC Unit 1
PDF
No ratings yet
WC Unit 1
30 pages
Internet Protocol Version 6
PDF
No ratings yet
Internet Protocol Version 6
25 pages
Seminar On Ipv6: Presented By:-Pranay Prakhar B.Tech Sem-Vii Comp-Ii Roll No - 11 Under Guidance Of: - Mr. U.C.Patkar
PDF
No ratings yet
Seminar On Ipv6: Presented By:-Pranay Prakhar B.Tech Sem-Vii Comp-Ii Roll No - 11 Under Guidance Of: - Mr. U.C.Patkar
16 pages
CS 640: Introduction To Computer Networks: Aditya Akella Lecture 12 - IP-Foo
PDF
No ratings yet
CS 640: Introduction To Computer Networks: Aditya Akella Lecture 12 - IP-Foo
30 pages
Network Protocols
PDF
No ratings yet
Network Protocols
34 pages
Presentation On NEXT Generation Protocol: Presented by
PDF
No ratings yet
Presentation On NEXT Generation Protocol: Presented by
22 pages
Group Presentation Research
PDF
No ratings yet
Group Presentation Research
8 pages
IPv 6
PDF
No ratings yet
IPv 6
34 pages
Network and The Internet001
PDF
No ratings yet
Network and The Internet001
57 pages
Internet Protocols
PDF
No ratings yet
Internet Protocols
14 pages