SlideShare uma empresa Scribd logo
1 de 20
SELÇUK ÜNİVERSİTESİ - Mühendislik Fakültesi
Bilgisayar Mühendisliği
BİLİŞİM TEKNOLOJİLERİ MÜHENDİSLİĞİ ANABİLİM DALI
BİLİŞİM GÜVENLİĞİ VE HUKUK DERSİ ÖDEV–1
24 Ekim 2016
DOÇ.DR. ŞAKİR TAŞDEMİR
Yük. Blig. Müh. Mustafa Aadel Mashjal
158229001009
2
What is network security?
(Ağ Güvenliği nedir?)
"Network security" refers to any activity designed to
protect the safety of your network and data. It
includes both hardware and software technologies.
Effective network security manages access to the
network. It targets a variety of threats and stops them
from entering on your network.
3
How does network security work?
Network security combines multiple layers of
defenses at the edge and in the network. Each
network security layer execute policies and
controls. Authorized users gain access to network
resources, but malicious actors are blocked from
carrying out threats.
4
How do I benefit from network security?
 protect proprietary information from attack.
- Trade secrets, medical records, etc.
 Provide authentication and access control for resources
- Ex: Andrew file system (AFS)
"is a distributed file system which uses a local cache to reduce
the workload and increase the performance of a distributed
computing environment".
 Guarantee availability of resources
- Ex: 5 9’s (99.999% reliability)
you get a total downtime “system is unavailable” of
approximately five minutes and nine seconds per year with
99.999% uptime “system is available” .
5
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Multinational companies
 ANYONE ON THE NETWORK
6
network access control (NAC)
it is a system that enables an authority to control
access based on a security policy.
Examples
PIN on an ATM cash machine
Password for logging in to a computer account
7
Common security attacks and their
countermeasures
 Finding a way into the network
– Firewalls
 Exploiting software bugs, buffer overflows
– Intrusion Detection Systems
 Denial of Service
– Ingress filtering, IDS
 TCP hijacking
– IPSec
 Packet sniffing
– Encryption (SSH, SSL, HTTPS)
8
firewall
-A firewall is a system that provides network security by
filtering incoming and outgoing network traffic based on a
set of user-defined rules.
- the purpose of a firewall is to reduce or eliminate the
occurrence of unwanted network communications while
allowing all legitimate communication to flow freely
9
firewall
.
 A firewall is like a castle with a
drawbridge
– Only one point of access into the network
– This can be good or bad
 Can be hardware or software
– Ex. Some routers come with firewall
functionality
– Windows XP and Mac OS X have built in
firewalls
10
Intranet
DMZInternet
Firewall
Firewall
Web server, email
server, web proxy,
etc
11
TCP Network Packets
TCP network traffic moves around a network in packets,
which are containers that consist of a packet header—this
contains control information such as source and destination
addresses, and packet sequence information—and the data
(also known as a payload). While the control information in
each packet helps to ensure that its associated data gets
delivered properly, the elements it contains also provides
firewalls a variety of ways to match packets against firewall
rules.
12
An intrusion prevention system
(IPS)
 Used to monitor for “suspicious activity”
on a network
– Can protect against known software
exploits, like buffer overflows
 Snort is an open-source, free and
lightweight network intrusion detection
system : www.snort.org
13
Denial of Service
 Purpose: Make a network service
unusable, usually by overloading the
server or network
 Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
– Mini Case Study: Code-Red
15-441 Networks Fall 2002
• SYN flooding usually executed by flooding the resource (site) with needless
requests in an attempt to overload systems and prevent legitimate requests.
A normal connection between a user (Alice) and a server.
The three-way handshake is correctly performed.
A normal connection between a user (Alice) and a server.
The three-way handshake is correctly performed.
SYN flooding
15-441 Networks Fall 2002
• ICMP is used by network administrator to exchange information about network
state, and also be used to ping other nodes to determine their operational status.
• The nodes which are operational return an echo message in response to a ping
message.
• In SMURF attack the Source IP address of a broadcast ping is forged
• Large number of machines respond back to victim, overloading it
SMURF
Internet
Perpetrator Victim
ICMP echo (spoofed source address of victim)
Sent to IP broadcast address
ICMP echo reply
15-441 Networks Fall 2002
• Distributed Denial of Service
– Same techniques as regular DoS, but on a much larger scale
– Example: Sub7Server Trojan and IRC bots
• Infect a large number of machines with a “zombie”
program
• zombie is a computer connected to the Internet that has
been compromised by a hacker, computer virus or trojan
horse program and can be used to perform malicious
tasks of one sort or another under remote direction.
Botnets of zombie computers are often used to spread e-
mail spam and launch denial-of-service attacks (DOS
attacks).
Distributed attacks
15-441 Networks Fall 2002
TCP reset attack, also known as "forged TCP resets",
"spoofed TCP reset packets" or "TCP reset attacks".
These terms refer to a method of tampering with
Internet communications. Sometimes, the tampering
is malicious; other times, it is beneficial.
TCP reset attack
15-441 Networks Fall 2002 18
Packet Sniffing
• How can we protect ourselves?
• SSH, not Telnet
– Many people at CMU still use Telnet and send their password in the
clear (use PuTTY instead!)
– Now that I have told you this, please do not exploit this information
– Packet sniffing is, by the way, prohibited by Computing Services
• HTTP over SSL
– Especially when making purchases with credit cards!
• SFTP, not FTP
– Unless you really don’t care about the password or data
– Can also use KerbFTP (download from MyAndrew)
• IPSec
– Provides network-layer confidentiality
TEŞEKKÜRLER.
24 Ekim 2016
20
Kaynakça
.
1. https://en.wikipedia.org/wiki/Information_security
2. http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm
3. https://en.wikipedia.org/wiki/Security_software
4. https://en.wikipedia.org/wiki/Network_security
5. https://en.wikipedia.org/wiki/Electronic_signature
6. https://en.wikipedia.org/wiki/E-commerce
7. https://en.wikipedia.org/wiki/E-government
8. http://whatis.techtarget.com/definition/Web-20-or-Web-2
9. http://whatis.techtarget.com/definition/ISO-27001
10. https://en.wikipedia.org/wiki/Cybercrime
11. http://www.cybercrimelaw.net/Turkey.html
12. http://portal.unesco.org/culture/es/files/39666/12517344053tk_copyri
ght_1951_2006_en.pdf/tk_copyright_1951_2006_en.pdf

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Basic Knowledge About Denial Of Service Or DoS
Basic Knowledge About Denial Of Service Or DoSBasic Knowledge About Denial Of Service Or DoS
Basic Knowledge About Denial Of Service Or DoS
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ga13
Ga13Ga13
Ga13
 
Firewalls
FirewallsFirewalls
Firewalls
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Firewall
FirewallFirewall
Firewall
 

Destaque

Carlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera versionCarlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera version
Pepa Priego
 

Destaque (18)

Twitter.
Twitter.Twitter.
Twitter.
 
Actividad la reina de los colores
Actividad la reina de los coloresActividad la reina de los colores
Actividad la reina de los colores
 
Agregacion familiar y cancer
Agregacion familiar y cancerAgregacion familiar y cancer
Agregacion familiar y cancer
 
кормушки для птиц
кормушки для птицкормушки для птиц
кормушки для птиц
 
Lasegundaguerramundial 140503074410-phpapp01
Lasegundaguerramundial 140503074410-phpapp01Lasegundaguerramundial 140503074410-phpapp01
Lasegundaguerramundial 140503074410-phpapp01
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Apostila de teoria geral da administração
Apostila de teoria geral da administraçãoApostila de teoria geral da administração
Apostila de teoria geral da administração
 
Esculturas clásicas griegas
Esculturas clásicas griegasEsculturas clásicas griegas
Esculturas clásicas griegas
 
Objetivos de aprendizaje
Objetivos de aprendizajeObjetivos de aprendizaje
Objetivos de aprendizaje
 
Miembro inferior
Miembro inferior Miembro inferior
Miembro inferior
 
Fracasa Rapido para Alcanzar Exito
Fracasa Rapido para Alcanzar ExitoFracasa Rapido para Alcanzar Exito
Fracasa Rapido para Alcanzar Exito
 
ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1
ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1
ΑΠΟΛΟΓΙΣΜΟΣ 1ης ΕΒΔΟΜΑΔΑΣ ΚΑ1
 
Carlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera versionCarlos castaneda libro pases magicos primera version
Carlos castaneda libro pases magicos primera version
 
Micropython el sílice y la serpiente
Micropython el sílice y la serpienteMicropython el sílice y la serpiente
Micropython el sílice y la serpiente
 
Arquitectura islamica
Arquitectura islamicaArquitectura islamica
Arquitectura islamica
 
Adam Phillip - Men's Clothing
Adam Phillip - Men's ClothingAdam Phillip - Men's Clothing
Adam Phillip - Men's Clothing
 
RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA
RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA
RESENHA - SERMÃO DE ACLAMAÇÃO FREI CANECA
 
P.a.
P.a.P.a.
P.a.
 

Semelhante a Network security

Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
Serious_SamSoul
 
write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
noreendchesterton753
 

Semelhante a Network security (20)

Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Securitych1
Securitych1Securitych1
Securitych1
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network security
Network security Network security
Network security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network security
Network securityNetwork security
Network security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 

Último

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Network security

  • 1. SELÇUK ÜNİVERSİTESİ - Mühendislik Fakültesi Bilgisayar Mühendisliği BİLİŞİM TEKNOLOJİLERİ MÜHENDİSLİĞİ ANABİLİM DALI BİLİŞİM GÜVENLİĞİ VE HUKUK DERSİ ÖDEV–1 24 Ekim 2016 DOÇ.DR. ŞAKİR TAŞDEMİR Yük. Blig. Müh. Mustafa Aadel Mashjal 158229001009
  • 2. 2 What is network security? (Ağ Güvenliği nedir?) "Network security" refers to any activity designed to protect the safety of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering on your network.
  • 3. 3 How does network security work? Network security combines multiple layers of defenses at the edge and in the network. Each network security layer execute policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out threats.
  • 4. 4 How do I benefit from network security?  protect proprietary information from attack. - Trade secrets, medical records, etc.  Provide authentication and access control for resources - Ex: Andrew file system (AFS) "is a distributed file system which uses a local cache to reduce the workload and increase the performance of a distributed computing environment".  Guarantee availability of resources - Ex: 5 9’s (99.999% reliability) you get a total downtime “system is unavailable” of approximately five minutes and nine seconds per year with 99.999% uptime “system is available” .
  • 5. 5 Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Multinational companies  ANYONE ON THE NETWORK
  • 6. 6 network access control (NAC) it is a system that enables an authority to control access based on a security policy. Examples PIN on an ATM cash machine Password for logging in to a computer account
  • 7. 7 Common security attacks and their countermeasures  Finding a way into the network – Firewalls  Exploiting software bugs, buffer overflows – Intrusion Detection Systems  Denial of Service – Ingress filtering, IDS  TCP hijacking – IPSec  Packet sniffing – Encryption (SSH, SSL, HTTPS)
  • 8. 8 firewall -A firewall is a system that provides network security by filtering incoming and outgoing network traffic based on a set of user-defined rules. - the purpose of a firewall is to reduce or eliminate the occurrence of unwanted network communications while allowing all legitimate communication to flow freely
  • 9. 9 firewall .  A firewall is like a castle with a drawbridge – Only one point of access into the network – This can be good or bad  Can be hardware or software – Ex. Some routers come with firewall functionality – Windows XP and Mac OS X have built in firewalls
  • 11. 11 TCP Network Packets TCP network traffic moves around a network in packets, which are containers that consist of a packet header—this contains control information such as source and destination addresses, and packet sequence information—and the data (also known as a payload). While the control information in each packet helps to ensure that its associated data gets delivered properly, the elements it contains also provides firewalls a variety of ways to match packets against firewall rules.
  • 12. 12 An intrusion prevention system (IPS)  Used to monitor for “suspicious activity” on a network – Can protect against known software exploits, like buffer overflows  Snort is an open-source, free and lightweight network intrusion detection system : www.snort.org
  • 13. 13 Denial of Service  Purpose: Make a network service unusable, usually by overloading the server or network  Many different kinds of DoS attacks – SYN flooding – SMURF – Distributed attacks – Mini Case Study: Code-Red
  • 14. 15-441 Networks Fall 2002 • SYN flooding usually executed by flooding the resource (site) with needless requests in an attempt to overload systems and prevent legitimate requests. A normal connection between a user (Alice) and a server. The three-way handshake is correctly performed. A normal connection between a user (Alice) and a server. The three-way handshake is correctly performed. SYN flooding
  • 15. 15-441 Networks Fall 2002 • ICMP is used by network administrator to exchange information about network state, and also be used to ping other nodes to determine their operational status. • The nodes which are operational return an echo message in response to a ping message. • In SMURF attack the Source IP address of a broadcast ping is forged • Large number of machines respond back to victim, overloading it SMURF Internet Perpetrator Victim ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply
  • 16. 15-441 Networks Fall 2002 • Distributed Denial of Service – Same techniques as regular DoS, but on a much larger scale – Example: Sub7Server Trojan and IRC bots • Infect a large number of machines with a “zombie” program • zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e- mail spam and launch denial-of-service attacks (DOS attacks). Distributed attacks
  • 17. 15-441 Networks Fall 2002 TCP reset attack, also known as "forged TCP resets", "spoofed TCP reset packets" or "TCP reset attacks". These terms refer to a method of tampering with Internet communications. Sometimes, the tampering is malicious; other times, it is beneficial. TCP reset attack
  • 18. 15-441 Networks Fall 2002 18 Packet Sniffing • How can we protect ourselves? • SSH, not Telnet – Many people at CMU still use Telnet and send their password in the clear (use PuTTY instead!) – Now that I have told you this, please do not exploit this information – Packet sniffing is, by the way, prohibited by Computing Services • HTTP over SSL – Especially when making purchases with credit cards! • SFTP, not FTP – Unless you really don’t care about the password or data – Can also use KerbFTP (download from MyAndrew) • IPSec – Provides network-layer confidentiality
  • 20. 20 Kaynakça . 1. https://en.wikipedia.org/wiki/Information_security 2. http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm 3. https://en.wikipedia.org/wiki/Security_software 4. https://en.wikipedia.org/wiki/Network_security 5. https://en.wikipedia.org/wiki/Electronic_signature 6. https://en.wikipedia.org/wiki/E-commerce 7. https://en.wikipedia.org/wiki/E-government 8. http://whatis.techtarget.com/definition/Web-20-or-Web-2 9. http://whatis.techtarget.com/definition/ISO-27001 10. https://en.wikipedia.org/wiki/Cybercrime 11. http://www.cybercrimelaw.net/Turkey.html 12. http://portal.unesco.org/culture/es/files/39666/12517344053tk_copyri ght_1951_2006_en.pdf/tk_copyright_1951_2006_en.pdf