Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

74
Fundamentals of Networking Discovery 1, Chapter 8 Basic Security

Transcript of Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Page 1: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Fundamentals of NetworkingDiscovery 1, Chapter 8Basic Security

Page 2: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Objectives

• Identify & describe the various networking threats

• Identify different methods of attacks

•Describe security procedures and applications

•Describe the features of a firewall and how it can be used to protect against an attack

Page 3: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.
Page 4: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.
Page 5: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

What’s Ahead…

•Networking Threats

•Methods of Attack

•Security Policy

•Using Firewalls

Page 6: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Networking

Threats

Page 7: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Network Intrusion•Attacks can be devastating

▫Cost money, time, theft of files, etc

•HACKERS▫Intruders who gain access by

modifying software or exploiting software vulnerabilities

Page 8: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

4 Threats from Hacker• Information theft

• Identity theft

•Data loss / manipulation

•Disruption of service

Page 9: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

4 Threats from the Hacker

•Stealing Confidential Info▫Credit card #’s▫Private Company info

such as a project in development

▫Could be sold

Page 10: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

4 Threats from the Hacker

•Destroy or Alter Records▫Send a virus that

reformats HD▫Changing your grades▫Change store prices

Page 11: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

4 Threats from the Hacker

• Identity Theft▫Stealing info to take on

identity▫Applying for credit cards

& buying stuff▫Obtain DL’s

Page 12: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

4 Threats from the Hacker

•Disrupting Service▫Preventing user from

accessing services such as Internet

Page 13: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Activity

Page 14: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Activity

•What is a hacker?▫Handout

•Review posters and decide on the threat▫Handout

Page 15: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Where’d He Come From?

•External Threat▫Outside attacker▫Internet or Wireless

Page 16: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Where’d He Come From?• Internal Threat

▫Has authorized access Knows people & network Knows what info is valuable

▫OR someone may have just picked up a virus

•According to the FBI, internal access and misuse of computers systems account for approximately 70% of reported incidents of security breaches.

Page 17: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Discussion

•Who is the greatest threat?▫Internal or External

Page 18: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Social Engineering- The Trojan Horse

Page 19: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Social Engineering

•Easiest way to gain access…•Deceiving internal users into performing actions or

revealing confidential info▫Takes advantage of them▫Usually don’t meet them face-to-face

Page 21: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

3 Types of Social Engineering

• Pretexting, Phishing, and Vishing

Page 22: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Phishing

Page 23: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review

Page 25: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Methods of

Attack

Page 26: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Other Attacks

•Viruses, Worms and Trojan horses▫Malicious software put

on hosts▫Damage system, destroy

data, deny access▫They can forward data

to thieves▫Can replicate to other

hosts

Page 27: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

3 Evil Things

•Viruses, Worms and Trojan horses▫Go to 8.2.1.2

Page 28: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Simplified

Transmission Replication Behavior

Virus Attaches to a program

Can reproduce Causes havoc!

Worm Self-replicating Sends copies of itself to other comp. w/ security holes

Cause harm to network; ties up bandwidth

Trojan Horse

Computer program disguised

Does damage when run

Can’t replicate

Page 29: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Let’s See…

•GCIT

•Who wants to play…▫ID Theft Faceoff?▫Invasion of the Wireless Hackers?▫Phishing Scams?

•Quiz Time for all!▫http://www.sonicwall.com/phishing/

Page 30: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Activity

•Virus, Worm or Trojan Horse???

Page 31: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Homework

• Look up three current virus threats.▫Handout

Page 32: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Just Being Evil!

•Sometimes the goal is to shut a network down & disrupt the organization▫Can cost a business lots of money!!

Page 33: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Denial of Service (DoS)• In general, DoS attacks seek to:

▫Flood a system or network with traffic to prevent legitimate network traffic from flowing

▫Disrupt connections between a client and server to prevent access to a service

▫Some are not used much anymore, but can be

• SYN flooding• Ping of Death

Page 34: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

DoS- SYN Flooding

Page 35: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

DoS- Ping of Death!

•Sending SO MANY LARGE pings, the server can’t respond to anyone else!

Page 36: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

DDoS

•DDoS▫Attack by multiple systems infected with DDoS code▫Sends useless data to server▫Overwhelms system & it crashes

Page 37: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Brute Force

•Fast computer used to guess passwords or decipher encryption code

•Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts

•Try Activity on 8.2.2.3

Page 38: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review•Name 3 types of social engineering.

▫Pretexting, Phishing, Vishing•How are you targeted in a pretexting attack?

▫Over the phone•You click on a pop-up window to claim a “prize.” A

program was installed w/out you knowing & now an attacker has access to your system. What is this called?▫Trojan Horse

Page 39: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review

•Which attack doesn’t need activation and copies itself across the network?▫Worm

•A server is busy responding to a SYN with an invalid source IP address. What’s the attack?▫SYN Flooding

Page 40: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Other Threats

•Not all threats do damage▫Some collect info

•Collecting Info/Invading Privacy▫Spyware▫Tracking Cookies▫Adware▫Pop-ups

Page 41: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Spyware•Program that gathers personal info

w/out your permission▫Info sent to advertisers

•Usually installed unknowingly▫Downloaded, installing a program,

click on pop-up•Can slow computer down or make

settings changes•Can be difficult to remove

Toolbars

Keyloggers

Bundled Software

Page 42: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Tracking Cookies

•Form of spyware▫Not always bad

•Records info about user when they visit web sites▫Allows personalization▫Many sites require them

Page 43: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Adware

•Form of spyware•Records info about user when they visit web sites•For advertising purposes

▫Pop-ups & pop-ups of ads

Page 44: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Pop-Ups (and Pop-Unders)•Adware EXCEPT doesn’t collect any info

•Pop-ups▫Open in front of the current browser window

•Pop-unders▫Open behind the current browser window

Page 45: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

What’s This?

Page 46: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Spam

•Unwanted bulk mail from advertisers•Spammer sends

▫Often sent through unsecured servers▫Can take control of computers▫Then sent from that computer to others

•On average, how many spam emails are sent to a person per year?▫3000

Page 47: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review

•You visit a web site and see this annoying advertising tactic that appears in a new window. What is it?▫Pop-up

•This type of advertising is sent to many, many people. The advertiser uses no marketing scheme.▫Spam

•This form of spyware is not always bad & can be used for personalization of a site.▫Cookies

Page 48: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Security

Policy

Page 49: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Security Measures

•You can’t eliminate security breaches▫You can minimize the risks

•Policy•Procedures•Tools & Applications

Page 50: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Security Policy•Formal statement of rules when using tech

▫Acceptable use policy▫Detailed handbook

•What should be included?

Page 52: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

More Security Procedures

•The procedures help implement the policies•Some of the security tools and applications used in

securing a network include:

Page 53: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Rut Roh!

•Computer starts acting abnormally•Program does not respond to mouse and keystrokes.•Programs starting or shutting down on their own. •Email program begins sending out large quantities of

email•CPU usage is very high •There are unidentifiable, or a large number of,

processes running. •Computer slows down significantly or crashes

Page 54: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Anti-Virus Software

•Preventive & Reactive tool•Features

▫Email checker▫Dynamic Scanning (checks files when accessed)▫Scheduled scans▫Auto update

•When a virus is known, they will update it

Page 55: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Anti-Spam

•Spam sends unwanted emails▫Code takes over PC to send more

•The software ID’s it & places it in junk folder or deletes it

•On PC or on email server▫ISP may have a spam filter

Page 56: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Other ways to prevent spam

•Keep anti-virus up to date•Don’t forward suspect emails• Ignore the virus warning email•Report spam to admin to be blocked•Don’t open attachment from people you don’t know

Page 57: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Anti-Spyware

•Spyware & Adware cause virus-like symptoms▫Use computer resources

•This software can detect & delete them

•Pop-Up Blockers

Page 58: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Activity

Page 59: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review

•This policy says what you can & can’t do on a network or computer.▫Acceptable use policy

•T or F. A-V companies like McAfee can protect you against every known virus & future viruses.▫False

•T or F. It is possible for legitimate emails to be marked as spam.▫True

Page 60: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review

•T or F. With A-V & anti-spyware installed, you need not worry about opening email attachments. You are completely safe!▫False…why?

•Other than on your PC, Google’s Gmail servers have this security software installed.▫Spam Filter

Page 61: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Firewalls

Page 62: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

What’s a firewall?•Controls traffic between networks & helps prevent

unauthorized access▫Permits or denies data

Page 63: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

4 Types of Firewalls

Page 64: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Firewall Decisions Based On•Packet Filtering

▫Based on IP or MAC addresses

•Application / Web Site Filtering▫Based on the application.▫Websites can be blocked by URL or keywords

•Stateful Packet Inspection (SPI) ▫Must be responses from internal host▫DoS saver

Page 65: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Firewall Placement & DMZ

Page 66: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

GCIT & DMZ

•Web Server (has GCIT web site)•Email Server (allows outside access)•File Server (allows file access from outside)•DRAW DMZ

Page 67: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Firewall & DMZ at home/ Port Forwarding/ Wireless AP internal• Let’s say you have a web server• It needs to handle web request while you still protect

you internal network•Create a DMZ with the Linksys

Page 68: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Lab 8.4.2.4

•DMZ Setup Lab▫Set up DMZ▫Set up port forwarding▫You can even set up time/day access (will not do in the

lab)

Page 69: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review• Which type of firewall…

▫ Is dedicated hardware & the best? Appliance

▫ Is on a single computer? Personal

• What is an area that is accessible to internal PC’s & outside PC’s?▫ DMZ

• What 3 security measures can be set up for a server on your network that needs public access?▫ DMZ, port forward, time/day

Page 70: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review

• How many firewalls would a big business use?▫ Two firewalls

• What of these can you setup in a wireless access point for security? ▫ Popup stopper, Change the default IP address, Update the

antivirus software, Tighten the cable between the AP and PC Change the AP default IP from 192.168.1.1 to 192.168.x.x

• Which process allows firewall entrance into the network ONLY IF it was requested from an internal PC?▫ SPI

Page 71: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Is Your Network Vulnerable?

•Tools to help identify where attacks can occur▫Number of hosts on a network▫The services hosts are offering▫The OS and update versions on hosts▫Packet filters and firewalls in use

• Lab 8.4.3.2?▫Vulnerability Analysis

Page 72: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Lab 8.4.3.2

•Vulnerability Analysis

Page 73: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

Review- 10 Questions

Page 74: Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.

8: Basic SecurityNetworking for Home & Small Business