Documente Academic
Documente Profesional
Documente Cultură
Chapter Objectives
Identify
Understand
Define
Lecture Outline
1/14/15
Networking 101
OSI
Reference Model
7 layers
TCP/IP
Model
4 layers
1/14/15
TRANSPORT LAYER
Overview
1/14/15
TCP vs UDP
10
UDP Header
11
TCP Header
12
1/14/15
13
14
NETWORK LAYER
15
1/14/15
IPv4 Header
IPv6 Header
17
LINK LAYER
18
1/14/15
19
20
End-to-End Communication
21
1/14/15
Sender
Receiver
Message
Message
1
Seg-n
Seg-2
Seg-n
Seg-1
Seg-2
Packet-2
Seg-1
Header
Seg-n
Packet-n
Packet-1
Header
Seg-1
Header
Seg-2
Packet-2
Header
Header
Header
Seg-n
Seg-1
Packet-n
Seg-2
Packet-1
3
1-22
23
24
1/14/15
25
26
Objective
27
1/14/15
ELEMENTS OF RISK
28
29
30
10
1/14/15
Terminology
Threat
any agent, circumstance, or situation that could cause
harm or loss to an IT asset.
Two broad classes- Human and Natural
Security Controls
1.
2.
3.
Preventive
Example: smartcard for auth. , encryption, etc.
Detective
Example: alarm bells for unauthorized access to a
physical location, alerts on unauthorized access to
resources, and audits.
Corrective
Example: is designed for swift recovery - backups
and restore options.
32
Security Controls
1.
2.
3.
Physical
Example: guards, lights, cameras, etc.
Technical
Example: encryption, smartcards, and access control
lists.
Administrative
Example: training, awareness, and policy.
33
11
1/14/15
Security Triad
34
Security Triad
C
Data & Services
I
35
36
12
1/14/15
Confidentiality
37
Confidentiality
38
Confidentiality
data-in-transit
data-at-rest
2. Biometrics
data-at-rest
3. Smart Cards
data-at-rest
39
13
1/14/15
Integrity
40
Integrity
Example:
Buying agent sends e-mail to customer with an offer
price of $300
Attacker alters offer price (in-transit) to $3,000
integrity breach (security failure)
41
Availability
42
14
1/14/15
Availability
43
Additional Concepts:
1.
2.
Accountability
Security goal that generates the requirement for
actions of an entity to be traced uniquely to that entity
Supports:
nonrepudiation, deterrence, fault isolation, IDS/IPS,
and recovery & legal action
45
15
1/14/15
ACCESS CONTROL
SYSTEMS
46
16
1/14/15
49
CC (cont.)
50
ACCESS CONTROL
IMPLEMENTATIONS
51
17
1/14/15
Example:
when an entity (process) attempts to access or alter an object
(files, ports, etc.), if appropriate security attributes are in place,
then action is allowed.
52
Example:
NTFS permissions in Windows machines and Unix use of users,
groups, and read-write-execute permissions.
53
Security Policies
1.
2.
3.
Password Policy
4.
E-mail Policy
5.
54
18
1/14/15
INTRODUCTION TO
ETHICAL HACKING
55
3. After-the-fact Requirement:
EC-Council Definition
57
19
1/14/15
Mark Abene
Eric Corley
Przemysaw Frasunek
Raphael Gray
Kevin Mitnick
Robert Tappan Morris
Kevin Poulsen
Source: https://en.wikipedia.org/wiki/White_hat_(computer_security)
58
Hacker Classification
White Gray
Black
59
Gray Hat:
Hackers that can flip-flop between back & white hat
Dont have owners approval at any point in time
Often feel a compelling social responsibility
60
20
1/14/15
Contract/Agreement
61
62
BIG BIG NO
63
21
1/14/15
Attack Types
64
65
22
1/14/15
67
Misconfiguration Attacks
23
1/14/15
70
RECONNAISSANCE
(RECON) PHASE 1
71
Overview
72
24
1/14/15
Passive reconnaissance
Active reconnaissance
gathering information about your
uses tools and techniques that
target without their knowledge.
may or may not be discovered.
Example:
puts your activities at greater risk
of discovery.
simply watch the outside of
Example:
the building to see what
physical security measures are
walk up to the entrance or
in place.
guard shack and try to open
Search information about the
the door (or gate).
target on the Internet.
Make DNS queries.
73
74
Example:
Can be as simple as running a ping sweep or a network
mapper to see what systems are on the network.
Can also be as complex as running a vulnerability
scanner to determine which ports may be open on a
particular system.
75
25
1/14/15
76
Example:
Can be as simple as accessing an open and non-secured
wireless AP and later manipulating it for other purpose
OR
Can be as complex as writing and delivering a buffer
overflow or SQL injection against a web application.
77
MAINTAINING ACCESS
PHASE 4
78
26
1/14/15
79
COVERING TRACKS
PHASE 5
80
81
27
1/14/15
82
Penetration Testing
84
28
1/14/15
1.
Preparation phase:
time period during which actual contract is
hammered out.
scope of the test, types of attacks allowed,
individuals assigned to perform the activity are all
agreed upon in this phase.
2.
Assessment phase:
aka the security evaluation phase
actual assaults on security controls happens during
this phase.
85
3.
86
Black Box
2.
White Box
3.
Grey Box
87
29
1/14/15
88
89
90
30
1/14/15
91
92
93
31
1/14/15
94
95
96
32
1/14/15
INTERNATIONAL
CYBER CRIME LAWS
97
98
99
33
1/14/15
100
Summary
In
101
Questions?
Floor open for discussions
102
34