Sie sind auf Seite 1von 22

Vital Information Resource Under Seize

Sakshi Bansode Sanjul Chouriha

A virus is a malware, self replicating, piece of software whose intent is to harm the target system. VITAL INFORMATION RESOURCE UNDER SEIZE

exe files, .com, .dll, .htm, .asp, .jsp Cannot infect purely data files such as mp3, txt etc. Attached to the code of a file 90% of virus infections are a result of user igonrance. End user may unknowingly install malicious software on their system

Self Replicating Able to carry itself on a network Very Compact in File Size Contains piece of executable code Infects File-System

Use the best security software


Antivirus Anti Spam Anti Spyware Anti Malware Firewall

Avoid visiting suspicious websites Scan media properly Prevent running suspicious Programs

Reduced system performance Damage to System Hardware Reduced System Immunity Vulnerability towards vital information resource

What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures
Firewalls & Intrusion Detection Systems Denial of Service Attacks Social Problems

Dictionary.com says:
1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.

etc.

Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.

Provide authentication and access control for resources


Ex: AFS

Guarantee availability of resources


Ex: 5 9s (99.999% reliability)

10

Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK

11

12

ngress filtering, IDS

TCP hijacking
PSec

Packet sniffing
ncryption (SSH, SSL, HTTPS)

Social problems
ducation
13

These are security tools to impose restrictions on any part of network as desired. It basically segregates internal network of any organization from external network. Their implementation could be hard-wired or softwired. Example: Zone Alarm

14

Internet
Firewall

DMZ
Web server, email server, web proxy, etc

Firewall

Intranet

15

It is any hardware or software used to detect and prevent eavesdropping, masquerading, intrusion and encroachment into a network. It monitors all the activities on a network such as site access etc. Open Source IDS: Snort, www.snort.org

16

Example
IRIX vulnerability in webdist.cgi

17

We can run a dictionary attack on the passwords


The passwords in /etc/passwd are encrypted with the crypt(3) function (one-way hash) Can take a dictionary of words, crypt() them all, and compare with the hashed passwords

This is why your passwords should be meaningless random junk!


For example, sdfo839f is a good password
That is not my andrew password Please dont try it either

18

I C I C

M M

e c h o S e n t t o P e c h o

( s p o o f e d s o u r c e a d d r e I P b r o a d c a s t a d d r e s s r e p ly

I n t e r n e t

e r p e t r a t o r

ic t i m

19

People can be just as dangerous as unprotected computer systems


People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information Most humans will breakdown once they are at the harmed stage, unless they have been specially trained
Think government here

20

There arent always solutions to all of these problems


Humans will continue to be tricked into giving out information they shouldnt Educating them may help a little here, but, depending on how bad you want the information, there are a lot of bad things you can do to get it

So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information
But, this solution is still not perfect
21

The Internet works only because we implicitly trust one another It is very easy to exploit this trust The same holds true for software It is important to stay on top of the latest CERT security advisories to know how to patch any security holes

22