Internet security

29
Internet Security Prepared by : Mohammed Adnan Abu Ward 120081704

Transcript of Internet security

Page 1: Internet security

Internet Security

Prepared by :Mohammed Adnan Abu Ward 120081704

Page 2: Internet security

Main PointsIntroductionComputer Security AttributesStatisticsTypes of AttacksTechnology for Internet SecurityConclusionReferences

Page 3: Internet security

IntroductionThe public Internet is a worldwide collection ofconnected computer networks that are accessible byindividual variety of ways using a particular set ofcommunication protocols which is known as TCP/IP.

Today millions of end systems use the Internetregardless of national or geographic boundaries or time.

Page 4: Internet security

Computer Security AttributesUnderstanding the security attributes is

critical in order to conduct risk analysis and find the suitable control for each attribute.

There are four main computer security attributes :

Confidentiality : Unauthorized persons should not gain access to others data.

Integrity : involves accuracy of data.

Page 5: Internet security

Computer Security Attributes…

Privacy : the ability and/or right to protect your personal secrets.

Availability : computer assets should be available for and accessible to authorized persons when they need them and should not be interrupted

.

Page 6: Internet security

Numbers of Users of the InternetDATE

NUMBER OF USERS

% WORLDPOPULATION

June, 2010 1,966 millions 28.7 %

Sept, 2010 1,971 millions 28.8 %

Mar, 2011 2,095 millions 30.2 %

Jun, 2011 2,110 millions 30.4 %

Sept, 2011 2,180 millions 31.5 %

Dec, 2011 2,267 millions 32.7 %

Mar, 2012 2,336 millions 33.3 %

June, 2012 2,405 millions 34.3 %

Page 7: Internet security

Vulnerable applications targeted by malicious users

Page 8: Internet security

Distribution of Attack Techniques

Page 9: Internet security

Types of Attacks

Page 10: Internet security

1-VirusesViruses are self-replicating programs that

infect and propagate through files.Viruses often have additional properties,

beyond being an infector or macro virus, A virus may also be

multi-partite, stealth, encrypted or polymorphic.A virus using encryption will know how to

decrypt itself to run, As the bulk of the virus is encrypted, it is harder to detect and analyze.

Page 11: Internet security

2-System and Boot Record InfectorsSystem and Boot record infectors were the

most common type of virus until the mid 1990s.These types of viruses infect system areas of a

computer such as the Master Boot Record (MBR) on hard disks.

By installing itself into boot records, the virus can run itself every time the computer is booted up.

with the introduction of more modern operating systems, and virus checks being enabled in the Basic Input Output System (BIOS), The risk of these viruses disappear.

Page 12: Internet security

3-EavesdroppingEavesdropping involves interception or

gaining access to communications by unauthorized party. There are two types of Eavesdropping Passive : when an unauthorized person

listens secretly to the networked messages.Active : intruder not only listens to but also

injects something into the communication to distort or create bogus .

Page 13: Internet security

4-HackingHackers can be people who are career

criminal. They are competent and highly skilled at using computers.

Once they analyze and discover a leak point in the

target system, they will find ways to access and attack the system.

They can also break through Web servers to access or steal information.

Page 14: Internet security

5- WormsA worm is a self-replicating program that

propagates over a network in some way.

Unlike viruses, worms do not require an infected file to propagate.

Worms classified into two types : mass-mailing worms : Email worms.network-aware worms : SQL Slammer.

Page 15: Internet security

6- Trojans Name story

Today’s Trojans work in a very similar way. They will appear to be benign programs to the user, but will actually have some malicious purpose.

Page 16: Internet security

7-IP Spoofing AttacksThe basic protocol for sending data over the Internet

network and many other computer networks is the Internet Protocol 

The header of each IP packet contains, among other things, the numerical source and destination address of the packet.

By forging the header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine. The machine that receives spoofed packets will send a response back to the forged source address.

Page 17: Internet security

8-Denial of ServiceIs an attempt to make a machine or

network resource unavailable to its intended users.

It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Page 18: Internet security

9-Email Bombing and SpammingEmail bombing is the intentional sending of

large volumes of messages to a target address.

The overloading of the target email address can render it unusable and can even cause the mail server to crash.

Email Spamming : is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. 

Page 19: Internet security

10-Phishingphishing is the act of attempting to acquire

information such as usernames, passwords, and credit card details .

Phishing emails may contain links to websites that are infected with malware.

Phishing is typically carried out by e-mail spoofing or instant messaging,  and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Page 20: Internet security

Technology for Internet SecurityWith the rapid growth of interest in the

Internet, network security has become a major concern to companies throughout the world.

Internet security tools typically provide authentication, encryption, identify attacks, and block and filter packets

Page 21: Internet security

1-Cryptographic systemsCryptography originally denotes the art of keepinginformation secret by the use of codes and ciphers.

Page 22: Internet security

2- FirewallA firewall can either be software-based or

hardware-based and is used to help keep a network secure.

Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set.

Page 23: Internet security

3- Intrusion Detection SystemsAn intrusion detection system (IDS) is a

device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.

Everything from a simple port scan to a full attack against your Web server can be detected by the IDS system.

Page 24: Internet security

4- Anti-Malware Software and scanners

Viruses, worms and Trojan horses are all examples of malicious software, or Malware for short.

anti-Malware tools are used to detect them and cure an infected system.

The most common type of anti-Malware software is virus scanners. These tools often consist of two different but related parts• Scanner • Disinfector.

Page 25: Internet security

5-Internet Protocol Security (IPSec)Internet Protocol Security (IPsec) is a protocol

suite for securing Internet Protocol  communications by authenticating and encrypting each IP packet of a communication session.

IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).

Page 26: Internet security

Secure Socket Layer (SSL)The Secure Socket Layer (SSL) is a suite of

protocols that actually uses many different standards of key exchange, authentication and encryption.The server typically provides regular web

service http on port 80, and SSL-encrypted web traffic https over port 443.

SSL is a standard way to achieve a good level of security between a web browser and a website.

Page 27: Internet security

ConclusionInternet threats will continue to be a

major issue in the global world as long as information is accessible and transferred across the Internet.

Security is critical and must be ensured so that Internet users can have confidence engaging in activities on the Internet.

Page 29: Internet security

The End