0% found this document useful (0 votes)
15 views20 pages

Chapter 10.0 - Cyber Security

The document discusses network security, focusing on cyber crime, its categorization, and types such as hacking and denial of service attacks. It outlines methods for assessing network security, including footprinting and various scanning techniques, while emphasizing the importance of protective measures like antivirus software and firewalls. Additionally, it highlights the need for risk assessment and management strategies to mitigate potential cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views20 pages

Chapter 10.0 - Cyber Security

The document discusses network security, focusing on cyber crime, its categorization, and types such as hacking and denial of service attacks. It outlines methods for assessing network security, including footprinting and various scanning techniques, while emphasizing the importance of protective measures like antivirus software and firewalls. Additionally, it highlights the need for risk assessment and management strategies to mitigate potential cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

04/11/2022

 

Lecturer: Nguyễn Thị Thanh Vân – FIT - HCMUTE

 Understand the network security

04/11/2022 2

1
04/11/2022

04/11/2022 3

04/11/2022 4

2
04/11/2022

 Crime committed using a computer and the internet to


steal data or information.
Illegal imports.
Malicious programs

04/11/2022 5

 Categorization of cyber crime


• The Computer as a Target
• The computer as a weapon

 Types of cyber crime


• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Violence
• Software Piracy

 Fields

04/11/2022 6

3
04/11/2022

 SirCam: 2.3 million computers affected


–Clean-up: $460 million
–Lost productivity: $757 million
 Code Red: 1 million computers affected
–Clean-up: $1.1 billion
–Lost productivity: $1.5 billion
 Love Bug: 50 variants, 40 million
computers affected
–$8.7 billion for clean-up and lost productivity
 Nimda

Nimda (note the garbage


in the subject)

Sircam
(note the “personal” text)
Both emails have executable
attachments with the virus
payload.

4
04/11/2022

Trojan Horse is
activated when the
software or
attachment is
executed.

Trojan Horse releases


virus, monitors
computer activity,
Trojan Horse arrives
installs backdoor, or
via email or software
transmits information to
like free games.
hacker.

a hacker compromises a system and uses that system to attack the target
computer, flooding it with more requests for services than the target can
handle.
hundreds of computers (known as a zombies) are compromised, loaded
with DOS attack software and then remotely activated by the hacker.

5
04/11/2022

• Sending out e-mail messages in bulk. It’s electronic “junk mail.”


• Spamming can leave the information system vulnerable to overload.
• Less destructive, used extensively for e-marketing purposes.

 • Use antivirus software’s.


• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen
name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.

04/11/2022 12

6
04/11/2022

 Network security Assessment: (goal)


o to identify and categorize your risks.
o is an integral part of any security life cycle
o understand the security techniques of the network, to execute
security policy and incident response procedures.
o To protect networks and data from determined attacks,

04/11/2022 13

04/11/2022 14

7
04/11/2022

Footprinting Scanning Networks Report

o whois, o Nmap
o dig, o Nessus
o traceroute, o Commercial Network
o nslookup o Web Application
Testing
04/11/2022 15

 Footprinting generally needs the following steps to


ensure proper information retrieval:

1. Collect information about a target: host and network

2. Determine the OS of web server and web application data.

3. Query such as Whois, DNS, network, and organizational

4. Locate existing or potential vulnerabilities or exploits that exist


in the current infrastructure
=> helpful to launching later attacks.

04/11/2022 16

8
04/11/2022

 Whois
 NSLookup,
 Search engines,
 Social Networking Site
 ARIN
 Neo Trace
 VisualRoute Trace
 SmartWhois
 eMailTrackerPro
 Website watcher
 Google Earth
 GEO Spider
 HTTrack Web Copier
 E-mail Spider

04/11/2022 17

 To detect the live systems running on the network


 To discover which ports are active/running
 To discover the operating system running on the target
system (fingerprinting)
 To discover the services running/listening on the target
system
 To discover the IP address of the target system

04/11/2022 18

9
04/11/2022

 Port Scanning
o A series of messages sent by someone
attempting to break into a computer to learn
about the computer’s network services

 Network Scanning
o A procedure for identifying active hosts on a
network

 Vulnerability Scanning
o The automated process of proactively
identifying vulnerabilities of computing
systems present in a network
04/11/2022 19

 Some common ways to perform these types of scans


are:
■ Pinging (ICMP Scanning)
■ Port scanning

04/11/2022 20

10
04/11/2022

 it is found out which hosts are up in a network by pinging


them all
 It can be run parallel so that it can run fast
 It can also be helpful to tweak the ping timeout value
with the –t option
 Tools:
o Ping <target> [option]
o Angry IP: for Windows
o Hping2
o Ping Sweep
o

04/11/2022 21

 Three Way Handshake, TCP flags


 Types of Scans
o Full Open Scan
o Stealth Scan, or Half-open Scan
o Xmas Tree Scan
o FIN Scan
o NULL Scan
o ACK Scanning
o UDP Scanning

04/11/2022 22

11
04/11/2022

04/11/2022 23

 the systems involved initiated and completed the three-


way handshake.
 The advantage
o you have positive feedback that the host is
up and the connection is complete.
 Downside (disadvantage):
o since you complete the three-way handshake you have
confirmed that you as the scanning party are there.

04/11/2022 24

12
04/11/2022

 it does not open a full TCP connection


 The key advantage is that fewer sites log this scan
04/11/2022 25

 Having all the flags set creates an illogical or illegal


combination, and the receiving system has to determine
what to do:
o Drop (old sys)
o Respond: port is open
o RST packet: port is closed
 NMAP: NMAP –sX –v <target IP>

26

13
04/11/2022

 The attacker sends frames to the victim with the FIN flag set.
 The victim’s response depends on whether the port is open
or closed.
o if an FIN is sent to an open port there is no response,
o but if the port is closed the victim returns an RST.

 NMAP: NMAP –sF <target IP address>

04/11/2022 27

 The attacker sends frames to the victim with no flag set.


 The victim’s response depends on whether the port is
open or closed:
o if an FIN is sent to an open port there is no response,
o if the port is closed the victim returns an RST

 NAMP: NMAP –sN <target IP address>

04/11/2022 28

14
04/11/2022

 Nmap
 IPSec
 NetScan
 SuperScan
 IPScanner
 MegaPing
 Global Network Inventory Scanner
 Net Tools Suite Pack
 Floppy Scan

04/11/2022 29

 Some of the scan methods used by Nmap:


o Xmas tree: The attacker checks for TCP services by sending
"Xmas-tree" packets
o SYN Stealth: It is referred to as "half open" scanning, as a full
TCP connection is not opened
o Null Scan: It’s an advanced scan that may be able to pass
through firewalls unmolested
o Windows scan: It is similar to the ACK scan and can also detect
open ports
o ACK Scan: Used to map out firewall rule set

04/11/2022 30

15
04/11/2022

 -sT (TcpConnect)
 -sR (RPC scan)
 -sS (SYN scan)
 -sL (List/Dns Scan)
 -sF (Fin Scan)
 -P0 (don’t ping)
 -sX (Xmas Scan)  -PT (TCP ping)
 -sN (Null Scan)  -PS (SYN ping)
 -sP (Ping Scan)  -PI (ICMP ping)
 -sU (UDP scans)  -PB (= PT + PI)
 -sO (Protocol Scan)  -PP (ICMP
 -sI (Idle Scan) timestamp)
 -sA (Ack Scan)  -PM (ICMP netmask)
 -sW (Window Scan)

04/11/2022 31

●What needs to be secured?


●Who is responsible for it?
●What technical/non-technical controls should be
deployed?
●How are people supported to do what they need to do?
●What if something goes wrong?
●Response and recovery
●Accountability and consequences

16
04/11/2022

●What Needs to be Secured?


●Hardware, software and services
• Servers, routers, switches, laptops and mobile
devices
• OS, databases, services and applications
• Data stored in databases or files
●From whom?
●Remote hackers?
●Insiders?

●Identity and access management (IAM)


●Credentialing, account creation and deletion
●Password policies
●Network and host defenses
●Firewalls, IDS, IPS
●Anti-virus
●VPN and BYOD
●Vulnerability patching
●User awareness and education
●Phishing attack awareness (Phishme)

17
04/11/2022

●High level articulation of security objectives and


goals
●Legal, business or regulatory rationale
●Do’s and don’ts for users
–Password length
–Web and email policies
–Response to security events
●Address prevention, detection, response and
remediation as it concerns/impacts users

●Investments in cyber security are


driven by risk and how certain
controls may reduce it

●Some risk will always remain

●How can risk be assessed?

18
04/11/2022

Risk exposure = Prob. [Adverse security


event] * Impact [ adverse event]

Risk leverage > 1 for the control to make sense

How do we assess and reduce cyber risk?


●Impact
●Expected loss (reputational,
recovery and response, legal, loss of business
etc.)
●Risk management
●Accept, transfer (insurance) and reduce
●Reduction via technology solutions, education
and awareness training

19
04/11/2022

 Prepare a small LAN: 1 server, 1 workstation


 Install and configure tools to assess network security
o Footprinting
o Scan ports using Nmap

04/11/2022 39

20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy