180 likes | 327 Views
Internet Security ( INFO 1370) Detailed Objectives 1,2,3. Rich Hildred rhildred@conestogac.on.ca 519-594-0900. Objectives. Internet Service Provider’s Setup Describe an Internet Service Provider’s setup. List equipment components of Internet connectivity.
E N D
Internet Security(INFO 1370) Detailed Objectives 1,2,3 Rich Hildred rhildred@conestogac.on.ca 519-594-0900
Objectives • Internet Service Provider’s Setup • Describe an Internet Service Provider’s setup. • List equipment components of Internet connectivity. • Define DNS & IP addresses and their application. • Discuss user software applications.
Objectives (2) • Operating Systems & Programming Languages • Distinguish between operating systems and programming languages. • Discuss operating systems and Internet security. • Define TCP/IP. • Explain protocols.
Protocols • Application • DHCPDHCPv6DNSFTPHTTPIMAPIRCLDAPMGCPNNTPBGPNTPPOPRPCRTPRTSPRIPSIPSMTPSNMPSOCKSSSHTelnetTLS/SSLXMPP • Transport • TCPUDPDCCPSCTPRSVP • Internet • IPIPv4IPv6ICMPICMPv6ECNIGMPIpsec • Link • ARP/InARPNDPOSPFTunnelsL2TPPPPMedia access controlEthernetDSLISDNFDDI
Objectives (3) • Security Concepts • Explain security concepts as applied to hackers and crackers. • Review case studies of penetrated systems. • Discuss Internet warfare. • Explain destructive devices.
Hackers and Crackers White Hat, Black Hat, Grey Hat, Blue Hat Elite, Script Kiddie, Noob Hacktivist Nation State Organized Crime Bots
Cases of Penetrated Systems 1. Heartland Payment Systems Date: March 2008 Impact: 134 million credit cards exposed through SQL injection to install spyware on Heartland's data systems. 7. Sony's PlayStation Network Date: April 20, 2011 Impact: 77 million PlayStation Network accounts hacked; Sony is said to have lost millions while the site was down for a month.
Internet Warfare Estonia – denial of service 5. Stuxnet Date: Sometime in 2010, but origins date to 2007 Impact: Meant to attack Iran's nuclear power program, but will also serve as a template for real-world intrusion and service disruption of power grids, water supplies or public transportation systems.
Destructive Software Devices Viruses Infectious programs that can reproduce themselves but require interaction to propagate. Worms Infectious programs that can self-propagate via a network. Rootkits and back doors Programs designed to infiltrate a system, hide their own presence, and provide administrative control and monitoring functionality to an unauthorized user or attacker.
Destructive Software Devices -2 Bots and zombies Very similar to rootkits and back doors but focused additionally on usurping the victim system’s resources to perform a specifictask or tasks (for example, distributed denial of service against an unrelated target or send spam). Trojan horses Software that does something other than, or in addition to, its purported functionality. Usually, this means installing a rootkit or back door.