Top Banner
MADE BY- Aman Jain – 00511503115 Gaurav Sachdeva-01211503115 CYBER SECURIT Y Presentation by BVCOE Delhi
28

Cyber secure

Feb 09, 2017

Download

Technology

Gaurav Sachdeva
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber secure

MADE BY-Aman Jain – 00511503115Gaurav Sachdeva-01211503115

CYBER SECURITY

Presentation by BVCOE Delhi

Page 2: Cyber secure

CONTENTS• Introduction• Topics that matter• Hacker vs Cracker• Firewall• Shell• Case Study• Inferences

Page 3: Cyber secure

The internet in India is growing rapidly. It has given rise to new opportunities in every field we can

think of be it entertainment, business, sports or education.

There’re two sides to a coin. Internet also has it’s own disadvantages that is Cyber crime- Illegal activity

committed on the internet .

INTRODUCTION

Page 4: Cyber secure

Topics that matter…

Cyber Security

Internet Securityfocusing Firewall

Secure SHell Case Studies

Page 5: Cyber secure

Hacker vs Cracker

The general view is that, while hackers build things, crackers break things.

Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find

vulnerabilities in systems .

Page 6: Cyber secure

Types Of Hackers

A Black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security.

Gray hat hackers refers to a computer hacker or computer security expert whose ethical standards fall somewhere between purely altruistic and purely malicious.

Page 7: Cyber secure

White hat hacker refers to ethical computer hacker who specializes in penetration testing

and in other testing methodologies to ensure the security of an organization's information systems.

ANONYMOUS GROUP

Anonymous is a international network of activist and hacktivist entities. The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate website .

Page 8: Cyber secure

Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.

Page 9: Cyber secure

TYPES OF FIREWALLS

Hardware Firewalls Protect an entire network Implemented on the router level Usually more expensive, harder to configure

Software Firewalls Protect a single computer Usually less expensive, easier to configure

Page 10: Cyber secure

FIREWALL ARCHITECTURES

The configuration that works best for a particular organization depends on three factors: The objectives of the network the organization‘s ability to develop and implement the

architectures the budget available for the function

Packet filtering routers

Screened subnet firewalls. Dual-homed

firewalls

Screened host firewalls

Page 11: Cyber secure

Bastion HostA bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. Generally , placed outside the firewall

For example a proxy server, and all other services are removed or limited to reduce the threat to the computer.

Page 12: Cyber secure

Dual-Homed Host Firewalls Architecture with high complexity

In this architectural approach , the bastion host contains two NICs (Network Interface Cards)

One NIC is connected to the external network, and one is connected to the internal network, providing an additional layer of protection.

Implementation of this architecture often makes use of NATs.

Page 13: Cyber secure

WHAT IS NAT ? Function as network-level proxy Convert IP addresses of internal hosts to IP address

assigned by firewall

Page 14: Cyber secure

Taking advantage of this , NAT prevents external attacks from reaching internal machines with addresses in specified ranges.

Hide TCP/IP information of hosts in the network being protected, preventing hackers from getting address of actual host

Page 15: Cyber secure
Page 16: Cyber secure

ADVANTAGES OF DUAL – HOMED ARCHITECTURE

High protection as compared to Packet Filtering and Screened host architecture.

Overall Strong protection at low expense

LIMITATIONS OF DUAL – HOMED ARCHITECTURE

It can disable the connection to the external network, and as traffic volume increases, it can become over- loaded.

Page 17: Cyber secure

Secure SHellEcrypted command-line communication

Page 18: Cyber secure

• The standard TCP port 22 has been assigned for contacting SSH servers.

• An SSH tunnel can provide a secure path over the Internet, through a firewall to a virtual machine.

«Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked

computers that connects, via a secure channel over an insecure network, a server

and a client

Definition

Page 19: Cyber secure

Client-> Computer programs that can make requests to servers and fetch responses are called clientsServer->A web server can listen to requests and respond back with data on the same connection

SSH

Client Server

Structure

Page 20: Cyber secure

SSH-Usage

• SecureSHell handles the set up and generation of an encrypted TCP connection

• SSH can handle secure remote logins (ssh)

• SSH can handle secure file copy (scp)

. SSH can even drive secure FTP (sftp)

Page 21: Cyber secure

Architecture

Page 22: Cyber secure

SSH Authentication Methods

$ Password$ Host-based

authentication

Page 23: Cyber secure

I Password Authentication

Password Authentication • The user specifies the username and corresponding password.

Prompts for Password

you server

ssh sshd

you> ssh mac-1password: ****other>

Page 24: Cyber secure

• Doesn’t require user credentials (password or key)

• Provides trust based on hostname and user id

• User id on both system has to be the same

• Disabled by default -- not that useful

II Host-based Authentication

Page 25: Cyber secure

CYBER AWARENESSPremise one: Cyber security should be viewed and managed as a strategic activity that impacts the enterprise’s most valued assets. Premise two: Designs and plans for cyber security should be data driven to move from reactive to predictive responses. Shared intelligence among countries and organizations is critical. Findings from a recent survey conducted by IBM indicated that organizations most able to handle or avoid security breaches had some unique characteristics: 1. Security leaders had a strategic voice in the enterprise;2. Cyber security was not viewed as an IT issue but as an enterprise wide

responsibility3. Security budgets were managed at a senior level;4. Security was considered early in the design of new products and services;

o Measurement and accountability were part of the security design;5. A culture of proactively protecting the enterprise existed.

Page 26: Cyber secure

Putty

Putty is a SSH client ,open source software used to connect client to a sever.

.Control over the SSH encryption key and protocol version.

. Unicode support.

. Support for local serial port connections.

features

Page 27: Cyber secure

QUESTION - TIME

Page 28: Cyber secure

THANK – YOU

CREDITSAMAN JAIN

GAURAV SACHDEVA