internet security ( info 1370) detailed objectives 1,2,3

18
Internet Security (INFO 1370) Detailed Objectives 1,2,3 Rich Hildred [email protected] 519-594-0900

Upload: allan

Post on 22-Feb-2016

43 views

Category:

Documents


0 download

DESCRIPTION

Internet Security ( INFO 1370) Detailed Objectives 1,2,3. Rich Hildred [email protected] 519-594-0900. Objectives. Internet Service Provider’s Setup Describe an Internet Service Provider’s setup. List equipment components of Internet connectivity. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Internet Security(INFO 1370)

Detailed Objectives 1,2,3

Rich [email protected]

519-594-0900

Page 2: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Objectives1. Internet Service Provider’s Setup

1. Describe an Internet Service Provider’s setup.

2. List equipment components of Internet connectivity.

3. Define DNS & IP addresses and their application.

4. Discuss user software applications.

Page 3: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Describe an ISP’s setup

Page 4: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Components of Connectivity

Page 5: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

DNS and IP Addresses

Page 6: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Application Layer

Page 7: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Objectives (2)• Operating Systems & Programming

Languages– Distinguish between operating systems and

programming languages.– Discuss operating systems and Internet

security.– Define TCP/IP.– Explain protocols.

Page 8: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

os/ programming languages

Page 9: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

os/programming language (2)

Page 10: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

OS and Internet Security

Page 11: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Define TCP/IP

Page 12: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Protocols• Application

– DHCP DHCPv6 DNS FTP HTTP IMAP IRC LDAP MGCP NNTP BGP NTP POP RPC RTP RTSP RIP SIP SMTP SNMP SOCKS SSH Telnet TLS/SSL XMPP

• Transport– TCP UDP DCCP SCTP RSVP

• Internet– IP IPv4 IPv6 ICMP ICMPv6 ECN IGMP Ipsec

• Link– ARP/InARP NDP OSPF Tunnels L2TP PPP

Media access control Ethernet DSL ISDN FDDI

Page 13: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Objectives (3)• Security Concepts

– Explain security concepts as applied to hackers and crackers.

– Review case studies of penetrated systems.– Discuss Internet warfare.– Explain destructive devices.

Page 14: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Hackers and Crackers• White Hat, Black Hat, Grey Hat, Blue Hat• Elite, Script Kiddie, Noob• Hacktivist• Nation State• Organized Crime• Bots

Page 15: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Cases of Penetrated Systems• 1. Heartland Payment Systems• Date: March 2008• Impact: 134 million credit cards exposed through SQL

injection to install spyware on Heartland's data systems.• 7. Sony's PlayStation Network• Date: April 20, 2011• Impact: 77 million PlayStation Network accounts

hacked; Sony is said to have lost millions while the site was down for a month.

Page 16: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Internet Warfare• Estonia – denial of service• 5. Stuxnet• Date: Sometime in 2010, but origins date to

2007• Impact: Meant to attack Iran's nuclear power

program, but will also serve as a template for real-world intrusion and service disruption of power grids, water supplies or public transportation systems.

Page 17: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Destructive Software Devices• Viruses Infectious programs that can reproduce

themselves but require interaction to propagate.• Worms Infectious programs that can self-

propagate via a network.• Rootkits and back doors Programs designed to

infiltrate a system, hide their own presence, and provide administrative control and monitoring functionality to an unauthorized user or attacker.

Page 18: Internet Security ( INFO 1370)  Detailed Objectives 1,2,3

Destructive Software Devices -2• Bots and zombies Very similar to rootkits and

back doors but focused additionally on usurping the victim system’s resources to perform a specific task or tasks (for example, distributed denial of service against an unrelated target or send spam).

• Trojan horses Software that does something other than, or in addition to, its purported functionality. Usually, this means installing a rootkit or back door.