Week11 (2)
Week11 (2)
Risk is the potential for loss, damage, or destruction of an asset, as a result of a threat exploiting a vulnerability.
(Availability)
Confidentiality
Main types of threats
▪ Disclosure: unauthorized access to information, e.g.
eavesdropping
▪ Deception: modification, spoofing, repudiation of origin,
denial of receipt
▪ Disruption: corruption, e.g. Denial of Service (DoS)
▪ Usurpation: hijacking
Attacks (Insider & Outsider)
• Buffer overflow
• Brute force
• Replay
• Sniffing, man in the middle
• Session hijacking
• Denial of Service
• Phishing
• Malware
Buffer overflow
occurs when a program or process attempts to write
more data to a fixed length block of memory (a buffer),
than the buffer is allocated to hold
by sending crafted input to an application, an attacker
can cause the application to execute arbitrary code,
possibly taking over the machine
reading an IP address from a text file, assumption: IP
address, will never exceed 15 bytes
fake string will cause our program to overflow the
destination buffer
Proper: 255.255.255.255
Fake: 19222222222.16888888.0.1
Brute force
▪ An attempt to crack a password or username, find an
enc. key
▪ Trial and error approach, aim: making a correct guess
Replay attack
no need advanced skills to decrypt a message, could be successful simply by resending the whole thing
Alice Bob
Ev
e
Sniffing
▪ Social engineering
▪ Used to steal data
▪ Tricky email, instant message, or text message
▪ Recipient is then tricked into clicking a malicious link
Malware
Fail Safe, Fail Close, Fail Secure: Default Deny - Any packet not explicitly permitted is rejected
Fail Open: granting all access
Register
Public:
Potential Students Registrars Lab
Graduates Students &
Instructors
Public
Legend Web Staff Nurses
Public
Health
Private PoS
Services
Confidential
Determine Services
Service Source
(e.g., web, sales database) (e.g., home, world, local computer)
Authentication,
Joe Decrypt Non-repudiation Encrypt Key
Kpublic Kprivate owner
Digital
Signature
Plaintext = Decrypt(kPUB, Encrypt(kPRIV,Plaintext))
PK enc. is processor-intensive, and not useful for long term data communications sessions. Therefore, it is often used to change a Secret
key(session key) between two endpoints, and then Secret key is used to enc. data.
Confidentiality:
Remote Access Security
Firewall
Virtual Private Network (VPN): encrypted point-to-point path between two nodes, often
implemented with IPSec
Can authenticate and encrypt data through Internet (red line)
Easy to use and inexpensive
Difficult to troubleshoot
Susceptible to malicious software and unauthorized actions
Often router or firewall is the VPN endpoint
Integrity:
Hash Functions
Examples: SHA-2, SHA-3
Ensures the message was not modified during transmission
H = Hash Algorithm
H=Hashed Value
Non-Repudiation:
Digital Signature
Tom
Digital
Certificate
4. Sue sends User: Sue Certificate Authority
Tom message Public Key: (CA)
signed with 2456
Digital Signature 3. Send approved
Digital Certificates
Router
IDS
Firewall
NIDS:
Nasty
Virus
ALARM!!!
Attacks:
Nasty
Virus
BlastWor
Normal
m Statistical-Based:
The expected behavior of the system is
understood
If variations occur, they may be attacks
(or maybe not)
Signature-Based: Neural Networks:
Specific patterns are recognized as Statistical-Based with self-learning (or
attacks artificial intelligence)
Recognizes patterns
Hacking Defense:
WAF
SQL injection
Cross-site scripting
Local File Inclusion
Remote File Inclusion
Remote Code Execusion
PHP Code Inclusion
….
Hacking Defense:
Web Proxy (Web Gateway)
A forward proxy server: a web server that
acts as a gateway between a client
application (e.g. a browser), and the real
server.
Firewall
Border Router/
Firewall
The Internet
De-Militarized
Zone
Firewall
WLAN
Private Network
Protecting the Network
The Internet
De-Militarized
Zone
WLAN
Firewall
Private Network
End User Security Systems
Host FW
Host IPS
Anti Virus, Endpoint Security Systems
Endpoint Detection and Response (EDR)
DLP
Sandbox
Application Control
Encryption
…