It is a global collection of networks, both big and small, that connect together in many different ways to form the single entity that we know as

Similar documents
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Computer Security Policy

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Chapter 4. Network Security. Part I

A practical guide to IT security

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Copyright

Chapter 4 The Internet

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Intrusion Attempt Who's Knocking Your Door

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

McLaughlin Brunson Insurance Agency, LLP

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

SDR Guide to Complete the SDR

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Vulnerability Assessment. Detection. Aspects of Assessment. 1. Asset Identification. 1. Asset Identification. How Much Danger Am I In?

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Information Security Policy

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Elementary Computing CSC 100. M. Cheng, Computer Science

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

e-commerce Study Guide Test 2. Security Chapter 10

Chapter 2. Switch Concepts and Configuration. Part II

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Cybercrime Criminal Law Definitions and Concepts

Computer Security: Principles and Practice

II.C.4. Policy: Southeastern Technical College Computer Use

Network Integration Guide Planning

Raj Jain. Washington University in St. Louis

Internet of Things Toolkit for Small and Medium Businesses

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Comprehensive Database Security

Network Security and Cryptography. 2 September Marking Scheme

SECURING DEVICES IN THE INTERNET OF THINGS

Information System Security. Nguyen Ho Minh Duc, M.Sc

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

SECURING DEVICES IN THE INTERNET OF THINGS

3.5 SECURITY. How can you reduce the risk of getting a virus?

Home Computer and Internet User Security

Chapter 11: Networks

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Wireless Network Security Fundamentals and Technologies

Acceptable Use Policy

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

CyberArk Privileged Threat Analytics

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Denial of Service Attacks

2. INTRUDER DETECTION SYSTEMS

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

Industry 4.0 = Security 4.0?

Acceptable Use Policy

Define information security Define security as process, not point product.

Xerox Audio Documents App

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Cyber security tips and self-assessment for business

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

A (sample) computerized system for publishing the daily currency exchange rates

CYBERSECURITY RISK LOWERING CHECKLIST

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

Cybersecurity: Incident Response Short

Chapter 19 Security. Chapter 19 Security

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

5. Execute the attack and obtain unauthorized access to the system.

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

IT ACCEPTABLE USE POLICY

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

and the Forensic Science CC Spring 2007 Prof. Nehru

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Malware, , Database Security

Network Working Group Request for Comments: 1984 Category: Informational August 1996

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

SECURITY & PRIVACY DOCUMENTATION

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

CIRT: Requirements and implementation

19.1. Security must consider external environment of the system, and protect it from:

Security and Authentication

Cyber Criminal Methods & Prevention Techniques. By

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda

CTS2134 Introduction to Networking. Module 08: Network Security

Insurance Industry - PCI DSS

Acceptable Use Policy

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Transcription:

CBCN4103

It is a global collection of networks, both big and small, that connect together in many different ways to form the single entity that we know as "the Internet." Who owns it? The Internet Society, a non-profit group established in 1992, oversees the formation of the policies and protocols that define how we use and interact with the Internet.

The Internet is a gigantic collection of millions of computers, all linked together on a computer network. The network allows all of the computers to communicate with one another

When the Internet was in its infancy, you could only make connections by providing the IP (Internet Protocol) address of the computer you wanted to establish a link with. In 1983, the University of Wisconsin created the Domain Name System (DNS), which maps text names to IP addresses. This way you only need to remember www.villacollege.edu.mv, for example, instead of 202.1.x.y. The Domain Name System is a distributed database, but there are central name servers at the core of the system. Someone has to maintain these central name servers to avoid conflicts and duplication.

In 1993, the U.S. Department of Commerce, in conjunction with several public and private entities, created InterNIC to maintain a central database that contains all the registered domain names and the associated IP addresses in the U.S. (other countries maintain their own NICs (Network Information Centers). Network Solutions, a member of InterNIC, was chosen to administer and maintain the growing number of Internet domain names and IP addresses. This central database is copied to Top Level Domain (TLD) servers around the world and creates the primary routing tables used by every computer that connects to the Internet.

When you use the Web or send an e-mail message, you use a domain name to do it. For example, the URL "http://www.oum.edu.my" contains the domain name oum.edu.my. So does the e-mail address mymail@oum.edu.my. All of the machines use names called IP addresses to refer to one another. For example, the machine that humans refer to as "www.oum.edu.my" has the IP address 202.x.y.z. There are billions of DNS requests made every day.

Each host in the Internet is assigned to a specific and unique number for identification. This number is called the IP address of the specific host. This number is divided into 4 parts for improving the readability. The range of each number is between 0 and 255. E.g. 0.0.0.0 255.255.255.255 For example, the host www.villacollege.edu.mv has its IP address of 202.1.x.y These addresses are 32-bit numbers.

Every machine on the Internet has its own IP address. A server has a static IP address that does not change very often. A home machine that is dialing up through a modem often has an IP address that is assigned by the ISP when you dial in. That IP address is unique for your session and may be different the next time you dial in. In this way, an ISP only needs one IP address for each modem it supports, rather than for every customer.

The COM, EDU and UK portions of the domain names are called the top-level domain or first-level domain. There are several hundred top-level domain names, including COM, EDU, GOV, MIL, NET, ORG and INT, as well as unique two-letter combinations for every country. Every name in the COM top-level domain must be unique, but there can be duplication across domains. For example, oum.com and oum.org are completely different machines. In the case of bbc.co.uk, it is a third-level domain. Up to 127 levels are possible, although more than four is rare. The left-most word, such as www or Encarta, is the host name. It specifies the name of a specific machine (with a specific IP address) in a domain.

Registering a Domain Name The only way to register and start using a domain name is to use the services of a domain name registrar. The domain name industry is regulated and overseen by ICANN, the organisation that is responsible for certifying companies as domain name registrars. Only a domain name registrar is permitted to access and modify the master database of domain names maintained by InterNIC. ICANN-accredited registrars have the authority to assign domain names for the TLDs of.com,.biz..info,.name,.net, and.org. ICANN does not, however, specifically accredit registrars to provide registration services for country code TLDs.

World Wide Web: World Wide Web is a system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web.

The Difference between the Internet and the World Wide Web: Many people use the terms Internet and World Wide Web (a.k.a. the Web) interchangeably, but in fact the two terms are not synonymous. The Internet and the Web are two separate but related things. The Internet is a massive network of networks, a networking infrastructure. The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. The Internet, not the Web, is also used for e-mail, which relies on SMTP, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused.

E-mail is short for electronic mail, the transmission of messages over communications networks The messages can be notes entered from the keyboard or electronic files stored on disk. Sent messages are stored in electronic mailboxes until the recipient fetches them. All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems. Please read about SMTP, POP and IMAP

FTP is the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.

In the computer industry, security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorisation. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Along with the convenience and easy access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet.

Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorisation, and nonrepudiation. When information is read or copied by someone not authorised to do so, the result is known as loss of confidentiality. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity.

Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need. When a user cannot get access to the network or specific services provided on the network, they experience a denial of service. To make information available to those who need it and who can be trusted with it, organizations use authentication and authorization. Authentication is proving that a user is whom he or she claims to be. Authorization is the act of determining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading a file or running a program.

The consequences of a break-in cover a broad range of possibilities: a minor loss of time in recovering from the problem, a decrease in productivity, a significant loss of money or staff-hours, a devastating loss of credibility or market opportunity, a business no longer able to compete, legal liability, and the loss of life.

A network security incident is any networkrelated activity with negative security implications. This usually means that the activity violates an explicit or implicit security policy. Incidents come in all shapes and sizes. They can come from anywhere on the Internet, although some attacks must be launched from specific systems or networks and some require access to special accounts.

It is difficult to characterize the people who cause incidents. An intruder may be an adolescent who is curious about what he or she can do on the Internet, a college student who has created a new software tool, an individual seeking personal gain, or a paid spy seeking information for the economic advantage of a corporation or foreign country. An incident may also be caused by a disgruntled former employee or a consultant who gained network information while working with a company. An intruder may seek entertainment, intellectual challenge, a sense of power, political attention, or financial gain.

Incidents can be broadly classified into several kinds: the probe, scan, account compromise, root compromise, packet sniffer, denial of service, exploitation of trust, malicious code, and Internet infrastructure attacks. Probe A probe is characterized by unusual attempts to gain access to a system or to discover information about the system. One example is an attempt to log in to an unused account. Probing is the electronic equivalent of testing doorknobs to find an unlocked door for easy entry. Probes are sometimes followed by a more serious security event, but they are often the result of curiosity or confusion.

Scan A scan is simply a large number of probes done using an automated tool. Scans can sometimes be the result of a misconfiguration or other error, but they are often a prelude to a more directed attack on systems that the intruder has found to be vulnerable.

Account Compromise An account compromise is the unauthorized use of a computer account by someone other than the account owner, without involving systemlevel or root-level privileges (privileges a system administrator or network manager has). An account compromise might expose the victim to serious data loss, data theft, or theft of services. The lack of root-level access means that the damage can usually be contained, but a userlevel account is often an entry point for greater access to the system.

Root Compromise A root compromise is similar to an account compromise, except that the account that has been compromised has special privileges on the system. The term root is derived from an account on UNIX systems that typically has unlimited, or superuser, privileges. Intruders who succeed in a root compromise can do just about anything on the victim s system, including run their own programs, change how the system works, and hide traces of their intrusion.

Packet Sniffer A packet sniffer is a program that captures data from information packets as they travel over the network. That data may include user names, passwords, and proprietary information that travels over the network in clear text. With perhaps hundreds or thousands of passwords captured by the sniffer, intruders can launch widespread attacks on systems. Installing a packet sniffer does not necessarily require privileged access. For most multi-user systems, however, the presence of a packet sniffer implies there has been a root compromise.

Denial of Service The goal of denial-of-service attacks is not to gain unauthorized access to machines or data, but to prevent legitimate users of a service from using it. A denial-of-service attack can come in many forms. Attackers may flood a network with large volumes of data or deliberately consume a scarce or limited resource, such as process control blocks or pending network connections. They may also disrupt physical components of the network or manipulate data in transit, including encrypted data.

Exploitation of Trust Computers on networks often have trust relationships with one another. For example, before executing some commands, the computer checks a set of files that specify which other computers on the network are permitted to use those commands. If attackers can forge their identity, appearing to be using the trusted computer, they may be able to gain unauthorized access to other computers.

Malicious Code Malicious code is a general term for programs that, when executed, would cause undesired results on a system. Users of the system usually are not aware of the program until they discover the damage. Malicious code includes Trojan horses, viruses, and worms. Trojan horses and viruses are usually hidden in legitimate programs or files that attackers have altered to do more than what is expected. Worms are self-replicating programs that spread with no human intervention after they are started. Viruses are also self-replicating programs, but usually require some action on the part of the user to spread inadvertently to other programs or systems. These sorts of programs can lead to serious data loss, downtime, denial of service, and other types of security incidents.

Internet Infrastructure Attacks These rare but serious attacks involve key components of the Internet infrastructure rather than specific systems on the Internet. Examples are network name servers, network access providers, and large archive sites on which many users depend. Widespread automated attacks can also threaten the infrastructure. Infrastructure attacks affect a large portion of the Internet and can seriously hinder the day-to-day operation of many sites.

A vulnerability is a weakness that a person can exploit to accomplish something that is not authorized or intended as legitimate use of a network or system. When a vulnerability is exploited to compromise the security of systems or information on those systems, the result is a security incident. Vulnerabilities may be caused by engineering or design errors, or faulty implementation.

Several factors that make Internet vulnerable are as follows: The inherent openness of the Internet and the original design of the protocols make the Internet prone to attacks that are quick, easy, inexpensive, and may be hard to detect or trace. An attacker does not have to be physically present to carry out the attack. Many attacks can be launched readily from anywhere in the world - and the location of the attacker can easily be hidden.

Technology is constantly changing and intruders are constantly developing new tools and techniques, and as such existing solutions do not remain effective indefinitely. It is common for sites to be unaware of the risks or unconcerned about the amount of trust they place in the Internet. They may believe that their site will not be a target or that precautions they have taken are sufficient.

Much of the traffic on the Internet is not encrypted, and thus confidentiality and integrity are difficult to achieve. This situation undermines not only applications (such as financial applications that are network-based) but also more fundamental mechanisms such as authentication and nonrepudiation. As a result, sites may be affected by a security compromise at another site over which they have no control. An example of this is a packet sniffer that is installed at one site that allows the intruder to gather information about other domains on another site (possibly in other countries).

The rapid growth and use of the network, accompanied by rapid deployment of network services involving complex applications. Often, these services are not designed, configured, or maintained securely. In the rush to get new products to market, developers do not adequately ensure that they do not repeat previous mistakes or introduce new vulnerabilities.

Operating system security is rarely a purchase criterion. Commercial operating system vendors often report that sales are driven by customer demand for performance, price, ease of used, maintenance, and support. As a result, off-theshelf operating systems are shipped in an easyto-use but insecure configuration that allows sites to use the system soon after installation. These hosts/sites are often not fully configured from a security perspective before connecting. This lack of secure configuration makes them vulnerable to attacks, which sometimes occur within minutes of connection

The need for network security experts far exceeds the supply, and as such inexperienced people are called upon to secure systems, opening windows of opportunity for the intruder community. Nevertheless, the explosive growth of the Internet has put a high demand for welltrained and experienced people to engineer and manage the network in a secure manner.

Security Policy A policy is a documented high-level plan for organisation-wide computer and information security. It provides a framework for making specific decisions, such as which defense mechanisms to use and how to configure services, and is the basis for developing secure programming guidelines and procedures for users and system administrators to follow. Because a security policy is a long-term document, the contents avoid technology specific issues.

To create a baseline of your current security posture To set the framework for security implementation To define allowed and not allowed behaviors To help determine necessary tools and procedures To communicate consensus and define roles To define how to handle security incidents

Procedures are specific steps to follow that are based on the computer security policy. Procedures address such topics as retrieving programs from the network, connecting to the site's system from home or while traveling, using encryption, authentication for issuing accounts, configuration, and monitoring.

System administration practices play a key role in network security. Checklists and general advice on good security practices are readily available. Below are examples of commonly recommended practices: Ensure all accounts have a password and that the passwords are difficult to guess. A one-time password system is preferable. Use tools such as MD5 checksums (8), a strong cryptographic technique, to ensure the integrity of system software on a regular basis.

Use secure programming techniques when writing software. These can be found at security-related sites on the World Wide Web. Be vigilant in network use and configuration, making changes as vulnerabilities become known. Regularly check with vendors for the latest available fixes and keep systems current with upgrades and patches. Regularly check on-line security archives, such as those maintained by incident response teams, for security alerts and technical advice. Audit systems and networks, and regularly check logs. Many sites that suffer computer security incidents report that insufficient audit data is collected, so detecting and tracing an intrusion is difficult.