Freedom from risk, danger, doubt, anxiety, and fear.
Security
Why do we need Security?(3)
Who is vulnerable?(7)
(possible quesion?)
Common Security Attacks and their Countermeasures
attacks = countermeasures
is like a castle with a drawbridge.
Only one point of access into the network.
Firewall
Used to monitor for suspicious activity on a network.
Uses “intrusion signatures”
Intrusion Detection
Can take a dictionary of words, crypt() them all, and compare with the hashed passwords.
Dictionary Attack
Make a network service unusable, usually by overloading the server or network.
Denial of Service (DOS)
Different kinds of DoS attacks(4)
Send packets with bogus source address
SYN flooding
(Synchronous)
Large number of machines respond back to victim, overloading it
SMURF
Same techniques as regular DoS, but on a much larger scale.
Distributed Denial of Service
launched a DDOS attack against www1.whitehouse.gov from the 20th to the 28th of every month
Spent the rest of its time infecting other hosts.
CodeRed
host may trick destination into believing that the packet is from a trusted source.
Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source
TCP Attacks
Encrypts data before transport.
IPSec
Other hosts listening on the wire from sent packets to detect collisions.
Packet Sniffing
People can be just as dangerous as unprotected computer systems.
Social Problems