SlideShare uma empresa Scribd logo
1 de 24
Introduction To Computer SecurityIntroduction To Computer Security
• By :- Vibrant Technologies &
Computers
• In 1983, Kevin Mitnick did an intrusion on a Pentagon’s
computer
• Robert Tappan Morris created the first worm and sent it from
MIT to the web and caused $50,000 of damages
• In 1994, Vladimir Levin intruded in an American bank
computer and stole 10 millions dollars
• Jonathan James “c0mrade”, 16 years old, infiltrated a NASA
computer in 1999 and had access to data worth 1,7 millions
dollars
• Today (CSI Report, 2007):
o 46% of companies have admitted to suffering financial losses due to security
incidences. The reported loss amounted to a total of approximately
$66,930,000.
o 39% of companies have been unable (or unwilling) to estimate the cost of
their losses.
• Financial Losses, Personal losses, Privacy losses, Data
Losses, Computer Malfunction and more…..
Computer Security
Computer SecurityComputer Security
• Computer and Network security was not at all
well known, even about 12 years ago
• Today, it is something everyone is aware of the
need, but not sure what is really means
• Interesting topic of threats, countermeasures,
risks, stories, events and paranoia
o With some mathematics, algorithms, designs and software issues
mixed in
o Yet, not enough people, even security specialists understand the
issues and implications
Media StoriesMedia Stories
• Consumers are
bombarded with media
reports narrating dangers
of the online world
o Identity Theft
o Embezzlement and fraud
o Credit card
theft
o Corporate
Loss
• Just “fear
mongering”?
Security? What is that?Security? What is that?
• Lock the doors and windows and you are secure
o NOT
• Call the police when you feel insecure
o Really?
• Computers are powerful, programmable machines
o Whoever programs them controls them (and not you)
• Networks are ubiquitous
o Carries genuine as well as malicious traffic
• End result: Complete computer security is unattainable, it is
a cat and mouse game
o Similar to crime vs. law enforcement
Goals of Computer SecurityGoals of Computer Security
• Integrity:
o Guarantee that the data is what we expect
• Confidentiality
o The information must just be accessible to the authorized people
• Reliability
o Computers should work without having unexpected problems
• Authentication
o Guarantee that only authorized persons can access to the resources
Security BasicsSecurity Basics
• What does it mean to be secure?
o “Include protection of information from theft or corruption, or
the preservation of availability, as defined in the security policy.”
- The Wikipedia
• Types of Security
o Network Security
o System and software security
o Physical Security
• Very little in computing is inherently secure, you must
protect yourself!
o Software cannot protect software (maybe hardware can)
o Networks can be protected better than software
Some Types of AttacksSome Types of Attacks
• What are some common attacks?
o Network Attacks
• Packet sniffing, man-in-the-middle, DNS hacking
o Web attacks
• Phishing, SQL Injection, Cross Site Scripting
o OS, applications and software attacks
• Virus, Trojan, Worms, Rootkits, Buffer Overflow
o Social Engineering
• (NOT social networking)
• Not all hackers are evil wrongdoers trying to
steal your info
o Ethical Hackers, Consultants, Penetration testers,
Researchers
Need to know:
Networking,
Web
Programming,
Operating
Systems,
Programming
languages and
compilers.
Network AttacksNetwork Attacks
• Packet Sniffing
o Internet traffic consists of data “packets”, and
these can be “sniffed”
o Leads to other attacks such as
password sniffing, cookie
stealing session hijacking,
information stealing
• Man in the Middle
o Insert a router in the path between client and
server, and change the packets as they pass
through
• DNS hijacking
o Insert malicious routes into DNS tables to send
traffic for genuine sites to malicious sites
Need to know:
Networking
protocols,
routing, TCP-IP
Web AttacksWeb Attacks
• Phishing
o An evil website pretends to be a trusted website
o Example:
• You type, by mistake, “mibank.com” instead of “mybank.com”
• mibank.com designs the site to look like mybank.com so the user
types in their info as usual
• BAD! Now an evil person has your info!
• SQL Injection
o Interesting Video showing an example
• Cross Site Scripting
o Writing a complex Javascript program that steals data left by
other sites that you have visited in same browsing session
Need to know:
Web
Programming,
Javascript,
SQL
VirusVirus
• Definition
o Piece of code that automatically reproduces itself.
It’s attached to other programs or files, but requires
user intervention to propagate.
• Infection (targets/carriers)
o Executable files
o Boot sectors
o Documents (macros), scripts (web pages), etc.
• Propagation
is made by the user. The mechanisms are storage
elements, mails, downloaded files or shared folders
Infection
Propagation
Payload
WormWorm
• Definition
o Piece of code that automatically reproduces
itself over the network. It doesn’t need the user
intervention to propagate (autonomous).
• Infection
o Via buffer overflow, file sharing, configuration
errors and other vulnerabilities.
• Target selection algorithm
o Email addresses, DNS, IP, network
neighborhood
• Payload
o Malicious programs
o Backdoor, DDoS agent, etc.
infection
Propagation
engine
Payload
Target
Selection
algorithm
Scanning
engine
Backdoor, trojan, rootkitsBackdoor, trojan, rootkits
• Goal
o The goal of backdoor, Trojan and rootkits is to take possession of a machine
subsequently through an infection made via a backdoor.
• Backdoor
o A backdoor is a program placed by a black-hacker that allows him to access a system.
A backdoor have many functionalities such as keyboard-sniffer, display spying, etc.
• Trojan
o A Trojan is a software that seems useful or benign, but is actually hiding a malicious
functionality.
• Rootkits (the ultimate virus)
o Rootkits operate like backdoor and Trojan, but also modify existing programs in the
operating system. That allows a black-hacker to control the system without being
detected. A rootkit can be in user-mode or in kernel-mode.
Social EngineeringSocial Engineering
Social EngineeringSocial Engineering
• Why is this social engineering?
o Manipulating a person or persons into divulging
confidential information
• I am not dumb, so does this really apply to me?
o YES! Attackers are ALSO not dumb.
o Social Engineers are coming up with much better
and much more elaborate schemes to attack users.
o Even corporate executives can be tricked into
revealing VERY secret info
• What can I do to protect myself?
o NEVER give out your password to ANYBODY.
o Any system administrator should have the ability to
change your password without having to know an
old password
Need to know:
How to win friends
(victims) and influence
(scam) people (not
CS).
Password AttacksPassword Attacks
• Password Guessing
o Ineffective except in targeted cases
• Dictionary Attacks
o Password are stored in computers as hashes, and these hashes can
sometimes get exposed
o Check all known words with the stored hashes
• Rainbow Tables
o Trade off storage and computation – uses a large number of pre-
computed hashes without having a dictionary
o Innovative algorithm, that can find passwords fast!
• e.g. 14 character alphanumeric passwords are found in about 4-
10 minutes of computing using a 1GB rainbow table
Computer Security IssuesComputer Security Issues
• Vulnerability is a point where a system is susceptible to
attack.
• A threat is a possible danger to the system. The danger might
be a person (a system cracker or a spy), a thing (a faulty
piece of equipment), or an event (a fire or a flood) that might
exploit a vulnerability of the system.
• Countermeasures are techniques for protecting your system
Vulnerabilities in SystemsVulnerabilities in Systems
• How do viruses, rootkits enter a system?
o Even without the user doing something “stupid”
• There are vulnerabilities in most software systems.
o Buffer Overflow is the most dangerous and common one
• How does it work?
o All programs run from memory.
o Some programs allow access to reserved memory locations when
given incorrect input.
o Hackers find out where to place incorrect input and take control.
o Easy to abuse by hackers, allows a hacker complete access to all
resources
How can you achieve security?How can you achieve security?
• Many techniques exist for ensuring computer and network security
o Cryptography
o Secure networks
o Antivirus software
o Firewalls
• In addition, users have to practice “safe computing”
o Not downloading from unsafe websites
o Not opening attachments
o Not trusting what you see on websites
o Avoiding Scams
CryptographyCryptography
• Simply – secret codes
• Encryption
o Converting data to unreadable codes to prevent anyone form
accessing this information
o Need a “key” to find the original data – keys take a few million-
trillion years to guess
• Public keys
o An ingenious system of proving you know your password without
disclosing your password. Also used for digital signatures
o Used heavily in SSL connections
• Hashing
o Creating fingerprints of documents
Cryptographic ProtocolsCryptographic Protocols
Symmetric encryption
Authentication
Asymmetric encryption
Public Key Infrastructure
Why Care?Why Care?
• Online banking, trading, purchasing may be insecure
o Credit card and identity theft
• Personal files could be corrupted
o All school work, music, videos, etc. may be lost
• Computer may become too slow to run
o If you aren't part of the solution you are part of the problem
• Pwn2Own contest - 2008
o Mac (Leopard) fell first via Safari, Vista took time but was hacked
via Flash Player, Ubuntu stood ground.
• Upon discovery, vulnerabilities can be used against many computers
connected to the internet.
ThankThank You !!!You !!!
For More Information click below link:
Follow Us on:
http://vibranttechnologies.co.in/ethical-hacking-classes-in-
mumbai.html

Mais conteúdo relacionado

Mais procurados

CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBarcamp Kerala
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksSam Bowne
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summaryudemy course
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Samwed Jain
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVEric Vanderburg
 

Mais procurados (19)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Threats
ThreatsThreats
Threats
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
Hacking
HackingHacking
Hacking
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Session Slide
Session SlideSession Slide
Session Slide
 
Hacking
HackingHacking
Hacking
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
 

Destaque

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Ethical Issues and Challenges
Ethical Issues and ChallengesEthical Issues and Challenges
Ethical Issues and ChallengesElijah Ezendu
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

Destaque (9)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical Issues and Challenges
Ethical Issues and ChallengesEthical Issues and Challenges
Ethical Issues and Challenges
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Semelhante a Introduction To Computer Security: A Guide to Threats, Vulnerabilities and Countermeasures

Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 

Semelhante a Introduction To Computer Security: A Guide to Threats, Vulnerabilities and Countermeasures (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Computer security
Computer securityComputer security
Computer security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Web security
Web securityWeb security
Web security
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
hacking
hackinghacking
hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 

Mais de Vibrant Technologies & Computers

Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.Vibrant Technologies & Computers
 

Mais de Vibrant Technologies & Computers (20)

Buisness analyst business analysis overview ppt 5
Buisness analyst business analysis overview ppt 5Buisness analyst business analysis overview ppt 5
Buisness analyst business analysis overview ppt 5
 
SQL Introduction to displaying data from multiple tables
SQL Introduction to displaying data from multiple tables  SQL Introduction to displaying data from multiple tables
SQL Introduction to displaying data from multiple tables
 
SQL- Introduction to MySQL
SQL- Introduction to MySQLSQL- Introduction to MySQL
SQL- Introduction to MySQL
 
SQL- Introduction to SQL database
SQL- Introduction to SQL database SQL- Introduction to SQL database
SQL- Introduction to SQL database
 
ITIL - introduction to ITIL
ITIL - introduction to ITILITIL - introduction to ITIL
ITIL - introduction to ITIL
 
Salesforce - Introduction to Security & Access
Salesforce -  Introduction to Security & Access Salesforce -  Introduction to Security & Access
Salesforce - Introduction to Security & Access
 
Data ware housing- Introduction to olap .
Data ware housing- Introduction to  olap .Data ware housing- Introduction to  olap .
Data ware housing- Introduction to olap .
 
Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.Data ware housing - Introduction to data ware housing process.
Data ware housing - Introduction to data ware housing process.
 
Data ware housing- Introduction to data ware housing
Data ware housing- Introduction to data ware housingData ware housing- Introduction to data ware housing
Data ware housing- Introduction to data ware housing
 
Salesforce - classification of cloud computing
Salesforce - classification of cloud computingSalesforce - classification of cloud computing
Salesforce - classification of cloud computing
 
Salesforce - cloud computing fundamental
Salesforce - cloud computing fundamentalSalesforce - cloud computing fundamental
Salesforce - cloud computing fundamental
 
SQL- Introduction to PL/SQL
SQL- Introduction to  PL/SQLSQL- Introduction to  PL/SQL
SQL- Introduction to PL/SQL
 
SQL- Introduction to advanced sql concepts
SQL- Introduction to  advanced sql conceptsSQL- Introduction to  advanced sql concepts
SQL- Introduction to advanced sql concepts
 
SQL Inteoduction to SQL manipulating of data
SQL Inteoduction to SQL manipulating of data   SQL Inteoduction to SQL manipulating of data
SQL Inteoduction to SQL manipulating of data
 
SQL- Introduction to SQL Set Operations
SQL- Introduction to SQL Set OperationsSQL- Introduction to SQL Set Operations
SQL- Introduction to SQL Set Operations
 
Sas - Introduction to designing the data mart
Sas - Introduction to designing the data martSas - Introduction to designing the data mart
Sas - Introduction to designing the data mart
 
Sas - Introduction to working under change management
Sas - Introduction to working under change managementSas - Introduction to working under change management
Sas - Introduction to working under change management
 
SAS - overview of SAS
SAS - overview of SASSAS - overview of SAS
SAS - overview of SAS
 
Teradata - Architecture of Teradata
Teradata - Architecture of TeradataTeradata - Architecture of Teradata
Teradata - Architecture of Teradata
 
Teradata - Restoring Data
Teradata - Restoring Data Teradata - Restoring Data
Teradata - Restoring Data
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Introduction To Computer Security: A Guide to Threats, Vulnerabilities and Countermeasures

  • 1.
  • 2. Introduction To Computer SecurityIntroduction To Computer Security • By :- Vibrant Technologies & Computers
  • 3. • In 1983, Kevin Mitnick did an intrusion on a Pentagon’s computer • Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $50,000 of damages • In 1994, Vladimir Levin intruded in an American bank computer and stole 10 millions dollars • Jonathan James “c0mrade”, 16 years old, infiltrated a NASA computer in 1999 and had access to data worth 1,7 millions dollars • Today (CSI Report, 2007): o 46% of companies have admitted to suffering financial losses due to security incidences. The reported loss amounted to a total of approximately $66,930,000. o 39% of companies have been unable (or unwilling) to estimate the cost of their losses. • Financial Losses, Personal losses, Privacy losses, Data Losses, Computer Malfunction and more….. Computer Security
  • 4. Computer SecurityComputer Security • Computer and Network security was not at all well known, even about 12 years ago • Today, it is something everyone is aware of the need, but not sure what is really means • Interesting topic of threats, countermeasures, risks, stories, events and paranoia o With some mathematics, algorithms, designs and software issues mixed in o Yet, not enough people, even security specialists understand the issues and implications
  • 5. Media StoriesMedia Stories • Consumers are bombarded with media reports narrating dangers of the online world o Identity Theft o Embezzlement and fraud o Credit card theft o Corporate Loss • Just “fear mongering”?
  • 6. Security? What is that?Security? What is that? • Lock the doors and windows and you are secure o NOT • Call the police when you feel insecure o Really? • Computers are powerful, programmable machines o Whoever programs them controls them (and not you) • Networks are ubiquitous o Carries genuine as well as malicious traffic • End result: Complete computer security is unattainable, it is a cat and mouse game o Similar to crime vs. law enforcement
  • 7. Goals of Computer SecurityGoals of Computer Security • Integrity: o Guarantee that the data is what we expect • Confidentiality o The information must just be accessible to the authorized people • Reliability o Computers should work without having unexpected problems • Authentication o Guarantee that only authorized persons can access to the resources
  • 8. Security BasicsSecurity Basics • What does it mean to be secure? o “Include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.” - The Wikipedia • Types of Security o Network Security o System and software security o Physical Security • Very little in computing is inherently secure, you must protect yourself! o Software cannot protect software (maybe hardware can) o Networks can be protected better than software
  • 9. Some Types of AttacksSome Types of Attacks • What are some common attacks? o Network Attacks • Packet sniffing, man-in-the-middle, DNS hacking o Web attacks • Phishing, SQL Injection, Cross Site Scripting o OS, applications and software attacks • Virus, Trojan, Worms, Rootkits, Buffer Overflow o Social Engineering • (NOT social networking) • Not all hackers are evil wrongdoers trying to steal your info o Ethical Hackers, Consultants, Penetration testers, Researchers Need to know: Networking, Web Programming, Operating Systems, Programming languages and compilers.
  • 10. Network AttacksNetwork Attacks • Packet Sniffing o Internet traffic consists of data “packets”, and these can be “sniffed” o Leads to other attacks such as password sniffing, cookie stealing session hijacking, information stealing • Man in the Middle o Insert a router in the path between client and server, and change the packets as they pass through • DNS hijacking o Insert malicious routes into DNS tables to send traffic for genuine sites to malicious sites Need to know: Networking protocols, routing, TCP-IP
  • 11. Web AttacksWeb Attacks • Phishing o An evil website pretends to be a trusted website o Example: • You type, by mistake, “mibank.com” instead of “mybank.com” • mibank.com designs the site to look like mybank.com so the user types in their info as usual • BAD! Now an evil person has your info! • SQL Injection o Interesting Video showing an example • Cross Site Scripting o Writing a complex Javascript program that steals data left by other sites that you have visited in same browsing session Need to know: Web Programming, Javascript, SQL
  • 12. VirusVirus • Definition o Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate. • Infection (targets/carriers) o Executable files o Boot sectors o Documents (macros), scripts (web pages), etc. • Propagation is made by the user. The mechanisms are storage elements, mails, downloaded files or shared folders Infection Propagation Payload
  • 13. WormWorm • Definition o Piece of code that automatically reproduces itself over the network. It doesn’t need the user intervention to propagate (autonomous). • Infection o Via buffer overflow, file sharing, configuration errors and other vulnerabilities. • Target selection algorithm o Email addresses, DNS, IP, network neighborhood • Payload o Malicious programs o Backdoor, DDoS agent, etc. infection Propagation engine Payload Target Selection algorithm Scanning engine
  • 14. Backdoor, trojan, rootkitsBackdoor, trojan, rootkits • Goal o The goal of backdoor, Trojan and rootkits is to take possession of a machine subsequently through an infection made via a backdoor. • Backdoor o A backdoor is a program placed by a black-hacker that allows him to access a system. A backdoor have many functionalities such as keyboard-sniffer, display spying, etc. • Trojan o A Trojan is a software that seems useful or benign, but is actually hiding a malicious functionality. • Rootkits (the ultimate virus) o Rootkits operate like backdoor and Trojan, but also modify existing programs in the operating system. That allows a black-hacker to control the system without being detected. A rootkit can be in user-mode or in kernel-mode.
  • 16. Social EngineeringSocial Engineering • Why is this social engineering? o Manipulating a person or persons into divulging confidential information • I am not dumb, so does this really apply to me? o YES! Attackers are ALSO not dumb. o Social Engineers are coming up with much better and much more elaborate schemes to attack users. o Even corporate executives can be tricked into revealing VERY secret info • What can I do to protect myself? o NEVER give out your password to ANYBODY. o Any system administrator should have the ability to change your password without having to know an old password Need to know: How to win friends (victims) and influence (scam) people (not CS).
  • 17. Password AttacksPassword Attacks • Password Guessing o Ineffective except in targeted cases • Dictionary Attacks o Password are stored in computers as hashes, and these hashes can sometimes get exposed o Check all known words with the stored hashes • Rainbow Tables o Trade off storage and computation – uses a large number of pre- computed hashes without having a dictionary o Innovative algorithm, that can find passwords fast! • e.g. 14 character alphanumeric passwords are found in about 4- 10 minutes of computing using a 1GB rainbow table
  • 18. Computer Security IssuesComputer Security Issues • Vulnerability is a point where a system is susceptible to attack. • A threat is a possible danger to the system. The danger might be a person (a system cracker or a spy), a thing (a faulty piece of equipment), or an event (a fire or a flood) that might exploit a vulnerability of the system. • Countermeasures are techniques for protecting your system
  • 19. Vulnerabilities in SystemsVulnerabilities in Systems • How do viruses, rootkits enter a system? o Even without the user doing something “stupid” • There are vulnerabilities in most software systems. o Buffer Overflow is the most dangerous and common one • How does it work? o All programs run from memory. o Some programs allow access to reserved memory locations when given incorrect input. o Hackers find out where to place incorrect input and take control. o Easy to abuse by hackers, allows a hacker complete access to all resources
  • 20. How can you achieve security?How can you achieve security? • Many techniques exist for ensuring computer and network security o Cryptography o Secure networks o Antivirus software o Firewalls • In addition, users have to practice “safe computing” o Not downloading from unsafe websites o Not opening attachments o Not trusting what you see on websites o Avoiding Scams
  • 21. CryptographyCryptography • Simply – secret codes • Encryption o Converting data to unreadable codes to prevent anyone form accessing this information o Need a “key” to find the original data – keys take a few million- trillion years to guess • Public keys o An ingenious system of proving you know your password without disclosing your password. Also used for digital signatures o Used heavily in SSL connections • Hashing o Creating fingerprints of documents
  • 22. Cryptographic ProtocolsCryptographic Protocols Symmetric encryption Authentication Asymmetric encryption Public Key Infrastructure
  • 23. Why Care?Why Care? • Online banking, trading, purchasing may be insecure o Credit card and identity theft • Personal files could be corrupted o All school work, music, videos, etc. may be lost • Computer may become too slow to run o If you aren't part of the solution you are part of the problem • Pwn2Own contest - 2008 o Mac (Leopard) fell first via Safari, Vista took time but was hacked via Flash Player, Ubuntu stood ground. • Upon discovery, vulnerabilities can be used against many computers connected to the internet.
  • 24. ThankThank You !!!You !!! For More Information click below link: Follow Us on: http://vibranttechnologies.co.in/ethical-hacking-classes-in- mumbai.html

Notas do Editor

  1. CS = Computer Security