1 / 11

Lecture 19 Hacking

Lecture 19 Hacking. WHAT IS NETWORK SECURITY?. Security is much larger than just packets, firewalls, and hackers. Security includes: Policies and procedures Liabilities and laws Human behavior patterns Corporate security programs and implementation

becca
Download Presentation

Lecture 19 Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 19Hacking

  2. WHAT IS NETWORK SECURITY? • Security is much larger than just packets, firewalls, and hackers. Security includes: • Policies and procedures • Liabilities and laws • Human behavior patterns • Corporate security programs and implementation • Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks • Understanding hacking tools and how attacks are carried out is only one piece of the puzzle.

  3. ATTACKS • THERE ARE MANY TYPES OF ATTACKS • SPOOFING ATTACK • TELNET BASED ATTACK • DOS (Daniel of service) ATTACK • PING OF DEATH • DISTRIBUTED DOS ATTACK • MAILBOMBS

  4. NEED FOR SECURITY • SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY • LIKE • TROJAN • FIREWALL

  5. TROJAN • WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY • TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM • THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER

  6. FIREWALL • FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK • TYPES OF FIREWALLS • PACKET FILTER • APPLICATION PROXY • PACKET INSPECTION

  7. Common Steps for Attackers • Reconnaissance • Intelligent work of obtaining information either actively or passively • Examples: • Passively: Sniffing Traffic, eavesdropping • Actively: Obtaining data from American Registry for Internet Numbers (ARIN), whois databases, web sites, social engineering

  8. Common Steps for Attackers • Scanning • Identifying systems that are running and services that are active on them • Examples: Ping sweeps and port scans

  9. Common Steps for Attackers • Gaining Access • Exploiting identified vulnerabilities to gain unauthorized access • Examples: Exploiting a buffer overflow or brute forcing a password and logging onto a system

  10. Common Steps for Attackers • Maintaining Access • Uploading malicious software to ensure re-entry is possible • Example: Installing a backdoor on a system

  11. Common Steps for Attackers • Covering Tracks • Carrying out activities to hide one’s malicious activities • Example: Deleting or modifying data in a system and its application logs

More Related