SLIDE 1
CBCN4103
SLIDE 2 It is a global collection of networks, both big
and small, that connect together in many different ways to form the single entity that we know as "the Internet."
Who owns it? The Internet
ernet Society, a non-profit group established in 1992, oversees the formation
- f the policies and protocols that define how
we use and interact with the Internet.
SLIDE 3 The Internet is a gigantic collection of
millions of computers, all linked together on a computer network. The network allows all
- f the computers to communicate with one
another
SLIDE 4 When the Internet was in its infancy, you could
- nly make connections by providing the IP
(Internet Protocol) address of the computer you wanted to establish a link with.
In 1983, the University of Wisconsin created the
Doma main n Name me System m (DNS), which maps text names to IP addresses. This way you only need to remember www.villacollege.edu.mv, for example, instead of 202.1.x.y.
The Domain Name System is a distributed
database, but there are central name servers at the core of the system. Someone has to maintain these central name servers to avoid conflicts and duplication.
SLIDE 5
In 1993, the U.S. Department of Commerce, in
conjunction with several public and private entities, created InterNI NIC to maintain a central database that contains all the registered domain names and the associated IP addresses in the U.S. (other countries maintain their own NICs (Network Information Centers). Network Solutions, a member of InterNIC, was chosen to administer and maintain the growing number of Internet domain names and IP addresses. This central database is copied to Top Level Domain (TLD) servers around the world and creates the primary routing tables used by every computer that connects to the Internet.
SLIDE 6
When you use the Web or send an e-mail
message, you use a domain name to do it. For example, the URL "http://www.oum.edu.my" contains the domain name oum.edu.my. So does the e-mail address mymail@oum.edu.my.
All of the machines use names called IP
addresses to refer to one another. For example, the machine that humans refer to as "www.oum.edu.my" has the IP address 202.x.y.z.
There are billions of DNS requests made every
day.
SLIDE 7 Each host in the Internet is assigned to a specific and
unique number for identification.
This number is called the IP address of the specific
host.
This number is divided into 4 parts for improving the
readability.
The range of each number is between 0 and 255.
- E.g. 0.0.0.0
- 255.255.255.255
For example, the host “www.villacollege.edu.mv” has
its IP address of “202.1.x.y”
These addresses are 32-bit numbers.
SLIDE 8 Every machine on the Internet has its own IP
- address. A server has a static IP address that
does not change very often. A home machine that is dialing up through a modem often has an IP address that is assigned by the ISP when you dial in. That IP address is unique for your session and may be different the next time you dial in. In this way, an ISP only needs one IP address for each modem it supports, rather than for every customer.
SLIDE 9 The COM, EDU and UK portions of the domain names
are called the top-level domain or first-level domain. There are several hundred top-level domain names, including COM, EDU, GOV, MIL, NET, ORG and INT, as well as unique two-letter combinations for every country.
Every name in the COM top-level domain must be
unique, but there can be duplication across domains. For example, oum.com and oum.org are completely different machines.
In the case of bbc.co.uk, it is a third-level domain. Up
to 127 levels are possible, although more than four is rare.
The left-most word, such as www or Encarta, is the host
- name. It specifies the name of a specific machine (with a
specific IP address) in a domain.
SLIDE 10
Regi
gisterin stering g a Domain ain Name
The only way to register and start using a domain
name is to use the services of a domain name registrar.
The domain name industry is regulated and overseen
by ICANN, the organisation that is responsible for certifying companies as domain name registrars.
Only a domain name registrar is permitted to access
and modify the master database of domain names maintained by InterNIC.
ICANN-accredited registrars have the authority to
assign domain names for the TLDs of .com, .biz. .info, .name, .net, and .org. ICANN does not, however, specifically accredit registrars to provide registration services for country code TLDs.
SLIDE 11 Wo World d Wi Wide We Web:
World Wide Web is a system of Internet
servers that support specially formatted
- documents. The documents are formatted in
a markup language called HTML (HyperText Markup Language) that supports links to
- ther documents, as well as graphics, audio,
and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web.
SLIDE 12
The Diff fference between the Interne net t and the World Wide Web:
Many people use the terms Internet and World Wide
Web (a.k.a. the Web) interchangeably, but in fact the two terms are not synonymous. The Internet and the Web are two separate but related things.
The Internet is a massive network of networks, a
networking infrastructure.
The World Wide Web, or simply Web, is a way of
accessing information over the medium of the Internet.
The Internet, not the Web, is also used for e-mail,
which relies on SMTP, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused.
SLIDE 13 E-mail is short for electronic mail, the transmission
- f messages over communications networks
The messages can be notes entered from the
keyboard or electronic files stored on disk.
Sent messages are stored in electronic mailboxes
until the recipient fetches them.
All online services and Internet Service Providers
(ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems.
Please read about SMTP, POP and IMAP
SLIDE 14
FTP is the protocol for exchanging files over
the Internet.
FTP works in the same way as HTTP for
transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.
SLIDE 15 In the computer industry, security refers to
techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorisation. Most security measures involve data encryption and passwords.
Data
a encryp ryption ion is the translation of data into a form that is unintelligible without a deciphering mechanism. A passw sword
secret word or phrase that gives a user access to a particular program or system.
SLIDE 16
Along with the convenience and easy access
to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted.
If information is recorded electronically and is
available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet.
SLIDE 17 Three basic security concepts important to
information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentic nticat ation ion, authorisat sation ion, and nonrepudia pudiati tion
When information is read or copied by someone
not authorised to do so, the result is known as loss of f confi fidentia tiali lity ty.
Information can be corrupted when it is available
- n an insecure network. When information is
modified in unexpected ways, the result is known as loss of in f integrit ity.
SLIDE 18 Information can be erased or become inaccessible,
resulting in loss ss of ava vail ilabil ability
people who are authorized to get information cannot get what they need.
When a user cannot get access to the network or
specific services provided on the network, they experience a denial ial of servi vice ce.
To make information available to those who need it
and who can be trusted with it, organizations use authenti henticati cation
- n and authorization
- horization. Au
Authent entication ication is proving that a user is whom he or she claims to be. Au Autho horization rization is the act of determining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading a file or running a program.
SLIDE 19
The consequences of a break-in cover a
broad range of possibilities: a minor loss of time in recovering from the problem, a decrease in productivity, a significant loss of money or staff-hours, a devastating loss of credibility or market opportunity, a business no longer able to compete, legal liability, and the loss of life.
SLIDE 20 A network security incident is any network-
related activity with negative security
- implications. This usually means that the
activity violates an explicit or implicit security policy.
Incidents come in all shapes and sizes. They
can come from anywhere on the Internet, although some attacks must be launched from specific systems or networks and some require access to special accounts.
SLIDE 21 It is difficult to characterize the people who
cause incidents. An intruder may be an adolescent who is curious about what he or she can do on the Internet, a college student who has created a new software tool, an individual seeking personal gain, or a paid “spy” seeking information for the economic advantage of a corporation or foreign country. An incident may also be caused by a disgruntled former employee
- r a consultant who gained network information
while working with a company. An intruder may seek entertainment, intellectual challenge, a sense of power, political attention, or financial gain.
SLIDE 22 Incidents can be broadly classified into several kinds:
the probe, scan, account compromise, root compromise, packet sniffer, denial of service, exploitation of trust, malicious code, and Internet infrastructure attacks.
Probe
be
A probe is characterized by unusual attempts to gain access to a system or to discover information about the system. One example is an attempt to log in to an unused account. Probing is the electronic equivalent
- f testing doorknobs to find an unlocked door for
easy entry. Probes are sometimes followed by a more serious security event, but they are often the result of curiosity or confusion.
SLIDE 23 Scan
Scan A scan is simply a large number of probes done using an automated tool. Scans can sometimes be the result of a misconfiguration or other error, but they are
- ften a prelude to a more directed attack on
systems that the intruder has found to be vulnerable.
SLIDE 24 Accou
nt Comprom
ise An account compromise is the unauthorized use
- f a computer account by someone other than
the account owner, without involving system- level or root-level privileges (privileges a system administrator or network manager has). An account compromise might expose the victim to serious data loss, data theft, or theft of services. The lack of root-level access means that the damage can usually be contained, but a user- level account is often an entry point for greater access to the system.
SLIDE 25 Root Compromise
ise A root compromise is similar to an account compromise, except that the account that has been compromised has special privileges on the
- system. The term root is derived from an account
- n UNIX systems that typically has unlimited, or
“superuser”, privileges. Intruders who succeed in a root compromise can do just about anything on the victim’s system, including run their own programs, change how the system works, and hide traces of their intrusion.
SLIDE 26 Packet
t Sniff ffer A packet sniffer is a program that captures data from information packets as they travel over the
- network. That data may include user names,
passwords, and proprietary information that travels over the network in clear text. With perhaps hundreds or thousands of passwords captured by the sniffer, intruders can launch widespread attacks on systems. Installing a packet sniffer does not necessarily require privileged access. For most multi-user systems, however, the presence of a packet sniffer implies there has been a root compromise.
SLIDE 27 Denial of Se
f Service The goal of denial-of-service attacks is not to gain unauthorized access to machines or data, but to prevent legitimate users of a service from using it. A denial-of-service attack can come in many forms. Attackers may “flood” a network with large volumes of data or deliberately consume a scarce or limited resource, such as process control blocks or pending network
- connections. They may also disrupt physical
components of the network or manipulate data in transit, including encrypted data.
SLIDE 28 Exploi
tation of Trust st Computers on networks often have trust relationships with one another. For example, before executing some commands, the computer checks a set of files that specify which other computers on the network are permitted to use those commands. If attackers can forge their identity, appearing to be using the trusted computer, they may be able to gain unauthorized access to other computers.
SLIDE 29 Malic
iciou ious Code Malicious code is a general term for programs that, when executed, would cause undesired results on a system. Users of the system usually are not aware of the program until they discover the damage. Malicious code includes Trojan horses, viruses, and worms. Trojan horses and viruses are usually hidden in legitimate programs or files that attackers have altered to do more than what is
- expected. Worms are self-replicating programs that
spread with no human intervention after they are started. Viruses are also self-replicating programs, but usually require some action on the part of the user to spread inadvertently to other programs or systems. These sorts of programs can lead to serious data loss, downtime, denial
- f service, and other types of security incidents.
SLIDE 30
Interne
net t Infr frastructu ucture re Attacks ks These rare but serious attacks involve key components of the Internet infrastructure rather than specific systems on the Internet. Examples are network name servers, network access providers, and large archive sites on which many users depend. Widespread automated attacks can also threaten the infrastructure. Infrastructure attacks affect a large portion of the Internet and can seriously hinder the day-to-day operation of many sites.
SLIDE 31 A vulnerability is a weakness that a person
can exploit to accomplish something that is not authorized or intended as legitimate use
- f a network or system. When a vulnerability
is exploited to compromise the security of systems or information on those systems, the result is a security incident. Vulnerabilities may be caused by engineering or design errors, or faulty implementation.
SLIDE 32 Several
veral factors rs that make e Internet ernet vu vulnerable erable are as follows ws:
- The inherent openness of the Internet and the
- riginal design of the protocols make the Internet
prone to attacks that are quick, easy, inexpensive, and may be hard to detect or trace. An attacker does not have to be physically present to carry out the attack. Many attacks can be launched readily from anywhere in the world - and the location of the attacker can easily be hidden.
SLIDE 33
Technology is constantly changing and
intruders are constantly developing new tools and techniques, and as such existing solutions do not remain effective indefinitely. It is common for sites to be unaware of the risks or unconcerned about the amount of trust they place in the Internet. They may believe that their site will not be a target or that precautions they have taken are sufficient.
SLIDE 34
Much of the traffic on the Internet is not
encrypted, and thus confidentiality and integrity are difficult to achieve. This situation undermines not only applications (such as financial applications that are network-based) but also more fundamental mechanisms such as authentication and nonrepudiation. As a result, sites may be affected by a security compromise at another site over which they have no control. An example of this is a packet sniffer that is installed at one site that allows the intruder to gather information about other domains on another site (possibly in other countries).
SLIDE 35
The rapid growth and use of the network,
accompanied by rapid deployment of network services involving complex applications. Often, these services are not designed, configured, or maintained securely. In the rush to get new products to market, developers do not adequately ensure that they do not repeat previous mistakes or introduce new vulnerabilities.
SLIDE 36 Operating system security is rarely a purchase
- criterion. Commercial operating system vendors
- ften report that sales are driven by customer
demand for performance, price, ease of used, maintenance, and support. As a result, off-the- shelf operating systems are shipped in an easy- to-use but insecure configuration that allows sites to use the system soon after installation. These hosts/sites are often not fully configured from a security perspective before connecting. This lack of secure configuration makes them vulnerable to attacks, which sometimes occur within minutes of connection
SLIDE 37 The need for network security experts far
exceeds the supply, and as such inexperienced people are called upon to secure systems, opening windows of
- pportunity for the intruder community.
Nevertheless, the explosive growth of the Internet has put a high demand for well- trained and experienced people to engineer and manage the network in a secure manner.
SLIDE 38 Securit ity y Policy
A policy is a documented high-level plan for
- rganisation-wide computer and information
- security. It provides a framework for making
specific decisions, such as which defense mechanisms to use and how to configure services, and is the basis for developing secure programming guidelines and procedures for users and system administrators to follow. Because a security policy is a long-term document, the contents avoid technology specific issues.
SLIDE 39
To create a baseline of your current security
posture
To set the framework for security
implementation
To define allowed and not allowed behaviors To help determine necessary tools and
procedures
To communicate consensus and define roles To define how to handle security incidents
SLIDE 40
Procedures are specific steps to follow that
are based on the computer security policy. Procedures address such topics as retrieving programs from the network, connecting to the site's system from home or while traveling, using encryption, authentication for issuing accounts, configuration, and monitoring.
SLIDE 41 System administration practices play a key
role in network security. Checklists and general advice on good security practices are readily available. Below are examples of commonly recommended practices:
- Ensure all accounts have a password and that the
passwords are difficult to guess. A one-time password system is preferable.
- Use tools such as MD5 checksums (8), a strong
cryptographic technique, to ensure the integrity
- f system software on a regular basis.
SLIDE 42
- Use secure programming techniques when writing
- software. These can be found at security-related
sites on the World Wide Web.
- Be vigilant in network use and configuration, making
changes as vulnerabilities become known.
- Regularly check with vendors for the latest available
fixes and keep systems current with upgrades and patches.
- Regularly check on-line security archives, such as
those maintained by incident response teams, for security alerts and technical advice.
- Audit systems and networks, and regularly check
- logs. Many sites that suffer computer security
incidents report that insufficient audit data is collected, so detecting and tracing an intrusion is difficult.