Top Banner
System security and tools Subtopics covered : 1. System Vulnerability and Abuse 2. Techs. And Tools for Protecting Info Resources Group members are: 3. Karan Bhandari(39) 4. Gurshawn Singh(35) 5. Nishad Prabhu(3)
25

Basics of System Security and Tools

Jan 14, 2015

Download

Documents

Karan Bhandari

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Basics of System Security and Tools

System security and tools

Subtopics covered :1. System Vulnerability and Abuse2. Techs. And Tools for Protecting Info

Resources

Group members are:3. Karan Bhandari(39)4. Gurshawn Singh(35)

5. Nishad Prabhu(3)

Page 2: Basics of System Security and Tools

As we all know, Technology has

tremendously affected us and our way

of living.

Daily Mail is now Best as E-mail,

Newspapers are on Large screens,

Communication is highly globalized

and storage is within the size range of

our fingers.

But, All this does come with its

drawbacks… Viruses ! Trojans !

Introduction

Page 3: Basics of System Security and Tools

A set of things working together as parts of a mechanism or

an interconnecting network.

Due to storage of electronic data, Access points are Endless

The potential for unauthorized access, abuse or fraud is high

Why Systems are Vulnerable ?

Page 4: Basics of System Security and Tools

To gain access a user must be authorized and authenticated – established by using passwords

Passwords have their disadvantages

New technologies like tokens, smart cards, and biometric authentication

Access control

Page 5: Basics of System Security and Tools

Malicious software: Viruses, Worms, Trojan Horses and Spyware

Malicious software programs are referred to as

malware and include a variety of threats such

as computer viruses, worms and trojan horses.

COMPUTER VIRUS: a rogue software

program. viruses usually deliver a payload.

Page 6: Basics of System Security and Tools

WORMS: are independent computer programs

TROJAN HORSE: appears to be benign but then does something other than expected.

SPYWARE: install themselves on computer to monitor user activities

KEYLOGGERS: record every keystroke made on a computer.

Page 7: Basics of System Security and Tools
Page 8: Basics of System Security and Tools

Hackers and Computer Crime

A HACKER is an individual who intends to gain

unauthorized access to a computer system.

Hacker vs. cracker

hacker activities include theft, damage and cyber

vandalism.

Page 9: Basics of System Security and Tools

Spoofing and Sniffing

Hackers attempting to hide their true identities often

spoof, or misrepresent themselves

This is known as SPOOFING.

A SNIFFER is a type of eavesdropping program that

monitors information travelling over a network.

Page 10: Basics of System Security and Tools
Page 11: Basics of System Security and Tools

Denial of Service Attacks

In a DoS attack, hackers flood a network server or web

server with many thousands of false communications or

requests for services to crash the network

A Distributed denial-of-service (DDoS) attack uses

numerous computers from different launch points to

inundate and overwhelm the network.

Page 12: Basics of System Security and Tools

Computer Crime

Computer crime is defined by the U.S.

Department of Justice as “any violations of

criminal law that involve a knowledge of

computer technology for their perpetrations,

invesigation or prosecution.

Page 13: Basics of System Security and Tools
Page 14: Basics of System Security and Tools

Identity Theft

Identity Theft is a crime in which an imposter

obtains key pieces of personal information.

Popular tactic is a form of spoofing called PHISHING.

EVIL TWINS and PHARMING are harder to detect.

Page 15: Basics of System Security and Tools
Page 16: Basics of System Security and Tools

Click Fraud & Global Threat

CLICK FRAUD: occurs when an individual or

computer program fraudulently clicks on an online

ad without any intention of learning more about the

advertiser or making a purchase.

GLOBAL THREAT: Involves Cyber terrorism and

cyber warfare.

Page 17: Basics of System Security and Tools

Internet Threats: Employees

Malicious intruders seeking system access

sometimes trick employees into revealing

their passwords and other information.

This practice is called SOCIAL

ENGINEERING.

Page 18: Basics of System Security and Tools

Software Vulnerability

Software poses a constant threat to information

systems, causing untold losses in productivity.

There may be presence of hidden Bugs or Program

Code Defects.

Zero defects cannot be achieved in larger programs

Page 19: Basics of System Security and Tools

Technologies and tools for protecting information

resources

• Securing systems

• Ensuring system availability

• Ensuring software quality

Page 20: Basics of System Security and Tools

Firewalls

Combination of hardware and software that controls traffic

Acts as a gatekeeper

There are a no. of firewall screening technologies like

-Static packet filtering

-Stateful inspection

-Network address translation(NAT)

-Application proxy filtering

Page 21: Basics of System Security and Tools

Intrusion detection systems

Placed at the hotspots

Generates a alarm if it finds a suspicious or

anomalous event

Looks for known methods of computer attacks

Detects removal or modification of files

Examines events as they are happening

Page 22: Basics of System Security and Tools

Anti-Virus and Anti-spyware

Checks for presence of viruses

Most softwares are effective only against

known viruses

Available widely

Page 23: Basics of System Security and Tools

Encryption

Transforming plain text or data into cipher , using an

encryption key

Two methods to encrypt network traffic

- Secure socket layer

- Secure hypertext transfer protocol

Two alternate methods to encrypt

-Symmetric key encryption

-Public key encryption

Page 24: Basics of System Security and Tools

Ensuring system availability

Ensuring system and application availability is a

must for companies eg. Airline service

Fault tolerant systems use special software to

detect harware failures and automatically switch to

backup

Should not be confused with high availability

computing

Page 25: Basics of System Security and Tools