Top Banner
NETWORK AND APPLICATION ATTACKS PENJAMINAN DAN KEAMANAN INFORMASI UNIVERSITAS PENDIDIKAN INDONESIA Kampus Cibiru
23

NETWORK AND APPLICATION ATTACKS

Dec 18, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NETWORK AND APPLICATION ATTACKS

NETWORK ANDAPPLICATION ATTACKSPENJAMINAN DAN KEAMANAN INFORMASI

UNIVERSITAS PENDIDIKAN INDONESIAKampus Cibiru

Page 2: NETWORK AND APPLICATION ATTACKS

Two Major Type Attack

Application Attacks

Networking Attacks

Page 3: NETWORK AND APPLICATION ATTACKS

Objectives

1.Server-side web application attacks

2.Client-side attacks

3.Overflow attacks

4.Networking-based attacks

Page 4: NETWORK AND APPLICATION ATTACKS

Network and Application Attacks

Page 5: NETWORK AND APPLICATION ATTACKS

Application Attacks (Server Side)

Cross Site Scripting (XSS)

Page 6: NETWORK AND APPLICATION ATTACKS

How to Defense Cross Site Scripting (XSS)

• Web masters should determine that their web pages validateinput, do not echo bad input to the user, and do not allowinput of code where it does not belong

• Web server administrators should make sure web services anddatabase programs are up to date on patches

• Users should never click an embedded link in an emailmessage without being sure where that link leads

Page 7: NETWORK AND APPLICATION ATTACKS

Application Attacks (Server Side)

SQL Injection

Page 8: NETWORK AND APPLICATION ATTACKS

How to Defense SQL INJECTION

• Validate input, rejecting SQL commands and scripts

• Provide drop down lists of choices for users (preparedstatements) instead of allowing free form entry

• Do not assign more privileges than the users need

• Do not ask users for SQL commands (yes, some systems haveallowed users to do this)

• Don't give your data tables and fields obvious names: aSELECT command must call a table and its columns by theircorrect names, or the command will fail

Page 9: NETWORK AND APPLICATION ATTACKS

Application Attacks (Server Side)

XML External Entity Attack (XXE)

Page 10: NETWORK AND APPLICATION ATTACKS

Application Attacks (Server Side)

Directory Traversal/Command Injection

Page 11: NETWORK AND APPLICATION ATTACKS

Application Attacks (Client Side)

Drive-by Download

Page 12: NETWORK AND APPLICATION ATTACKS

Application Attacks (Client Side)

HTTP Header Manipulation

Page 13: NETWORK AND APPLICATION ATTACKS

Application Attacks (Client Side)

Cookie Posioning

Page 14: NETWORK AND APPLICATION ATTACKS

Application Attacks (Client Side)

Attachment Attack

Page 15: NETWORK AND APPLICATION ATTACKS

Application Attacks (Client Side)

Session Hijacking

Page 16: NETWORK AND APPLICATION ATTACKS

Application Attacks (Client Side)

Malicious Add Ons

Page 17: NETWORK AND APPLICATION ATTACKS

Application Attacks (Server - Client Side)

Impartial Overflow

Page 18: NETWORK AND APPLICATION ATTACKS

Networking Attacks

Denial of Service (DoS)

Page 19: NETWORK AND APPLICATION ATTACKS

Networking Attacks

Interception Attack

Page 20: NETWORK AND APPLICATION ATTACKS

Networking Attacks

Poisoning Attack

Page 21: NETWORK AND APPLICATION ATTACKS

Networking Attacks

Attacks on Access Rights

Page 22: NETWORK AND APPLICATION ATTACKS

Tugas Kelompok1. Cari kasus serangan terhadap Network dan Application Attack2. Bagaimana serangan itu terjadi ?3. Bagaimana cara mengatasi / bertahan terhadap serangan ?

- Tulis dalam bentuk format Artikel - Posting di Blog Personal / Kelompok- Tautkan Linknya pada GClassroom

Page 23: NETWORK AND APPLICATION ATTACKS

Referensi “Computer Security ”, 3rd edition by Dieter Gollmann. Wiley, March, 2011

https://stevevincent.info/CSS211_2014_2.htm

23