the home page of united states department of justice was hacked on august 17, 1996
TRANSCRIPT
![Page 1: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/1.jpg)
The home page of United States Department of Justice Was hacked on
August 17, 1996
![Page 2: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/2.jpg)
![Page 3: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/3.jpg)
WWW Security Degui CaoID: 100361
Professor: M. Anvari
Southeastern University
Fall 2000
![Page 4: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/4.jpg)
1. Introduction
• World Wide Web (WWW)
• Web server faces three security risks: • Bugs or misconfiguration problems
• Browser-side risks
• Interception • Hacker definition
![Page 5: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/5.jpg)
2. Comparison of two basic OS
• Unix System• Windows NT system
![Page 6: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/6.jpg)
3. Security problems With NT and Unix
• Security problems with NT• Security problems with Unix
![Page 7: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/7.jpg)
4. Security problems in software of WWW
• CGI• JAVA• JAVA Script
![Page 8: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/8.jpg)
5. Procedures taken on www security • File and file systems administration• Ownership: user, group, other• Permission: read, write, execute• ls: attributes of the file and directory • drwxrwxrwx www• chmod: change the mode• Firewall• •
![Page 9: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/9.jpg)
Fig1. Firewall/proxy server
![Page 10: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/10.jpg)
• Types of fire walls • Screening routers• Proxy server gateway• Stateful inspection technique• Firewall policy• Basic strategies defining firewall policy• Default permit and Default deny• Often firewall policies
![Page 11: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/11.jpg)
Fig2. Screening router & Fig3. Proxy server
![Page 12: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/12.jpg)
6. Conclusions
• Set up a good secure policy
![Page 13: The home page of United States Department of Justice Was hacked on August 17, 1996](https://reader036.vdocument.in/reader036/viewer/2022083008/56649f585503460f94c7d055/html5/thumbnails/13.jpg)
7. Reference
• http://www.sddt.com/files/
• http://www.apache.org/
• http://hacke.infinit.se/
• http://www.microsoft.com/security/