IT System Components 1444 S1
IT System Components 1444 S1
IT System Components 1444 S1
IT Systems
Components
Lectures
CHAPTER 1
ENDPOINT SECURITY
1
15/11/2022
2
15/11/2022
3
15/11/2022
Confidentiality ()اﻟﺴﺮﯾﺔ
• Provides privacy on information by encryption.
Integrity()اﻟﺘﮑﺎﻣﻞ
Ensures consistency on the content of information.
Availability ()اﻻﺗﺎﺣﺔ
Provides an “always-on” accessibility to information.
¢ Hint : information = any accessible resource
4
15/11/2022
10
5
15/11/2022
Social
Engineering
11
12
6
15/11/2022
13
Unauthorized Unplanned
Sensitive Data High rate of
access to downtime (i.e.
theft valuable data loss.
endpoints unavailability)
14
7
15/11/2022
15
• Enhance the learning of all users by training all employees on how to achieve
endpoint security.
• Assigning only the privilege that is needed by each user to perform his/her duty.
• The severity of the damage caused is reduced and remedied easily when
detected.
16
8
15/11/2022
• Ensure that all software operating on each endpoint are well updated to the
latest security patch or version.
• There are many vendors of Endpoint Protection toolkit that are available.
• The toolkit provide a console which grant access to several protection
options.
17
9
15/11/2022
IT Systems
Components
Lec2:Storage Devices
01
data and instructions.
02
modern computer.
03
when they are not currently in use for processing.
1
15/11/2022
Types of Storage
There are four type of storage:
q Primary Storage: Main memory – only large storage media
that the CPU can access directly.
q Secondary Storage: extension of main memory that provides
large nonvolatile storage capacity.
q Tertiary Storage:
q Off-line Storage
S to r a
04
Off-lin
S to r a
Se con
S to r a
02
T e r tia
01
03
ge
S to r a
P r im a
e
ge
ge
dary
ge
ry
ry
1) Primary Storage
Also known as main memory.
•Main memory is directly or indirectly connected to
the central processing unit via a memory bus.
•The CPU continuously reads instructions stored
there and executes them as required.
2
15/11/2022
1 Registers
2 Cache
3 RAM
4 ROM
RAM
q It is called Random Access Memory because any
of the data in RAM can be accessed just as fast
as any of the other data.
q There are two types of RAM:
q DRAM (Dynamic Random Access Memory)
q SRAM (Static Random Access Memory)
3
15/11/2022
q Small programs called firmware are often stored in ROM chips on hardware
devices (like a BIOS chip).
q They contain instructions the computer can use in performing some of the
most basic operations required to operate hardware devices.
2) Secondary Storage
q It is not directly accessible by the CPU.
q Computer usually uses its input / output channels to
access secondary storage and transfers the desired
data using intermediate area in primary storage.
q Example:
q Hard disk
4
15/11/2022
Hard Disk
10
5
15/11/2022
3) Tertiary Storage
• Typically it involves a robotic mechanism which will mount (insert) and
dismount removable mass storage media into a storage device.
• It is a comprehensive computer storage system that is usually very slow ,so
it is usually used to archive data that is not accessed frequently.
• This is primarily useful for extraordinarily large datastores ,accessed
without human operators.
Examples:
• Optical Disc
• Magnetic Tape
11
Optical Drives
• Enables a computer to read different types of
media discs.
• Some drives can only read discs, but recent
drives are both reader and recorders.
• Types of Optical Discs:
• CD
• DVD
• Blu-ray
12
6
15/11/2022
13
14
7
15/11/2022
4) Off-line Storage
• Also known as disconnected or removable storage.
• Is a computer data storage on a medium or a device
that is not under the control of a processing unit.
Examples:
• Floppy Disk
• Zip diskette
• USB Flash drive
• Memory card
15
16
8
15/11/2022
Flash Memory
17
q A hot swappable device is one which can be attached or detached from a computer
or other electronic device without having to reboot the computer.
q The most common hot swappable devices are universal serial bus (USB) devices.
q Many hot swappable USB devices have all the necessary software built in to the
device, so simply plugging it in to the computer allows the computer to detect the USB
device and start working with it.
q Firewire is another common interface used with hot swappable devices. eSATA also.
18
9
15/11/2022
19
IT Systems Components
Lecture 3: System architecture
20
10
15/11/2022
21
22
11
15/11/2022
23
Components of
system architecture
1 Fundamental properties
The
architecture 2 The patterns of relationships
of the
system
involves 3 Connections and constraints
24
12
15/11/2022
25
1 Hardware
2 Operating system
3 Application programs
4 Users
26
13
15/11/2022
27
Operating System
Computer Hardware
28
14
15/11/2022
Cache EPROM
CPU
Computer Systems Components
ROM EEPROM
H /W Storage
Flash Memory
Operating Systems I/O Devices
Magnetic Tapes
Applications
Secondary
Magnetic Disks
Storage
Users
Compact Disks
29
30
15
15/11/2022
Enterprise
Resource
Planning
Initial (ERP)
Cost and
TCO
01
Scalability
02
Processing
Options 03
Security
Issues 04
05
31
32
16
15/11/2022
33
34
17
15/11/2022
35
36
18
15/11/2022
IT Systems Components
Lecture 4: Virtual environments and cloud computing
37
Public Cloud.
IaaS: Virtual
Storage
computing
Type1 Networking
Virtualization Hypervisors
Type 2
38
19
15/11/2022
Virtualization
qNow that you are aware of the roles of hardware and
software, the concept of virtualization will be easier to grasp.
qVirtualization is the “layer” of technology that goes between
the physical hardware of a device and the operating system to
create one or more copies of the device.
39
What is Virtualization?
qVirtualization is the ability to run multiple operating systems on a single
physical system and share the underlying hardware resources.
qIt is the process by which one computer hosts the appearance of many
computers.
qVirtualization is used to improve IT throughput and costs by using physical
resources as a pool from which virtual resources can be allocated.
40
20
15/11/2022
41
42
21
15/11/2022
What is a Hypervisor?
qA hypervisor, also known as a virtual machine monitor or VMM, is
software that creates and runs virtual machines (VMs).
qA hypervisor allows one host computer to support multiple guest
VMs by virtually sharing its resources, such as memory and
processing.
qSoftware installed on top of hardware that created virtualization layer:
§ Type 1 Hypervisor – Bare metal hypervisor (VMware ESXi).
§ Type 2 Hypervisor – Hosted hypervisor (VMware Workstation).
43
Type 1 Hypervisors
q Type 1 hypervisors are also called the “bare metal” approach because the
hypervisor is installed directly on the hardware.
q Type 1 hypervisors are usually used on enterprise servers and data center
networking devices.
q With Type 1 hypervisors, the hypervisor is installed directly on the server or
networking hardware. Then, instances of an OS are installed on the hypervisor, as
shown in the figure.
q Type 1 hypervisors have direct access to the hardware resources. Therefore, they
are more efficient than hosted architectures. Type 1 hypervisors improve
scalability, performance, and robustness.
44
22
15/11/2022
Type 2 Hypervisors
• A Type 2 hypervisor is software that creates and runs VM
instances.
• The computer, on which a hypervisor is supporting one or
more VMs, is a host machine. Type 2 hypervisors are also
called hosted hypervisors.
• A big advantage of Type 2 hypervisors is that management
console software is not required.
45
Benefits of hypervisors
qSpeed: Hypervisors allow virtual machines to be created instantly.
qEfficiency: Hypervisors that run several virtual machines on one
physical machine’s resources also allow for more efficient utilization
of one physical server.
qFlexibility: Bare-metal hypervisors allow operating systems and
their associated applications to run on a variety of hardware types.
qPortability: Because the virtual machines that the hypervisor runs
are independent from the physical machine, they are portable.
46
23
15/11/2022
03
N e tw o
01
Com p
02
S to r a
u te
rks
ge
47
Compute Systems
q Hardware and operating system software that runs applications.
q Difference between a PC and a server
§ PCs have user-friendly interface and request services.
§ Servers focus on running programs and provide services.
qTypes of servers:
§ Tower.
§ Blade server.
§ Rack-mounted server.
48
24
15/11/2022
49
Networks
qTransfer data across the data center so devices can communicate.
qWhat type of hardware is used for networking?
50
25
15/11/2022
Cloud Definition
Cloud computing is a model for enabling everywhere,
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services)
that can be rapidly supplied and released with
minimal management effort or service provider
interaction.
51
Cloud Overview
Cloud computing addresses a variety of data management
issues:
§ Enables access to organizational data anywhere and at any time.
§ Simplify the organization’s IT operations by subscribing only to needed
services.
§ Eliminates or reduces the need for onsite IT equipment, maintenance,
and management.
§ Reduces cost for equipment, energy, physical plant requirements, and
personnel training needs.
§ Enables rapid responses to increasing data volume requirements.
52
26
15/11/2022
CLOUD COMPONENTS
1. Clients:
• Mobile - Thin (Just view, lets servers do all work) – Thick (Laptops, desktop).
• Which is the best? Thin - lower costs, security, power consumption.
2. Data Center – Facility used to house computer systems and associated components.
3. Distributed servers:
• Compute nodes: Provides CPU, Memory, Storage, and Networking resources through virtualized
interfaces.
• Storage nodes: Compute nodes only provide temporary storage space for users/applications
• Administrative nodes: Provides “hidden” back-end services such as security/firewalls.
s e r v e r te d
02
D is tr i
C e n te
03
C l ie n t
D a ta
01
bu
s
rs
s
53
Cloud Services
The three main cloud computing services are as follows:
q Software as a Service (SaaS) - The cloud provider is responsible for access to
applications and services that are delivered over the internet.
• Consumer Applications Such as Google Docs
q Platform as a Service (PaaS) - The cloud provider is responsible for providing
users access to the development tools and services used to deliver the
applications.
• For Developers (one or two programming languages)
q Infrastructure as a Service (IaaS) - The cloud provider is responsible for giving IT
managers access to the network equipment, virtualized network services, and
supporting network infrastructure [on demand creation of server resources].
q IT as a Service (ITaaS): IT Professionals support applications, platforms and
infrastructure.
54
27
15/11/2022
Cloud Services
Consumer
Applications
For
Developers
On demand
Resources
55
56
28
15/11/2022
Cloud Models
There are four primary cloud models:
q Public clouds - Cloud-based applications and services made available to the general
population.
q Private clouds - Cloud-based applications and services intended for a specific
organization or entity, such as the government.
q Hybrid clouds - A hybrid cloud is made up of two or more clouds (example: part private,
part public), where each part remains a separate object, but both are connected using a
single architecture.
q Community clouds - A community cloud is created for exclusive use by a specific
community. The differences between public clouds and community clouds are the
functional needs that have been customized for the community. For example, healthcare
organizations must remain compliant with policies and laws that require special
authentication and confidentiality.
57
Data centers are the physical facilities that provide the compute, network, and
storage needs of cloud computing services. Cloud service providers use data
centers to host their cloud services and cloud-based resources.
58
29
15/11/2022
59
Advantages of CC
Lower costs Instant
(H.W, S.W, Improved Reduced software
performance software costs
Maintenance) updates
Improved
document Unlimited Increased data Universal
storage document
format reliability
capacity access
compatibility
Services in the
pay-per-use Data security.
model.
60
60
30
15/11/2022
Distributed Systems
qOften PLCs figure in a hierarchy of communications.
qAt the lowest level we have input and output devices such as sensors and motors.
qThe next level involves controllers such as small PLCs or small computers, linked
through a network, with the next level of larger PLCs and computers exercising local area
control.
qThe term SCADA, which stands for supervisory control and data acquisition system, is
widely used for such a system.
65
What is SCADA?
qSCADA (Supervisory Control And Data Acquisition) can be defined as a
supervisory computerized system that gathers and processes data and
applies operational controls for distribution-side systems used to control
dispersed assets.
qA SCADA system means a system consisting of several Remote Terminal
Units (RTUs) collecting field data connected back to a master station via a
communications system.
qThe master station displays the acquired/collected data and allows the
operator to perform remote control tasks.
66
33
15/11/2022
What is SCADA?
A SCADA application has two elements:
67
SCADA Hardware
68
34
15/11/2022
01
Networking 07 03 Alarms
05
69
Real-time Data
§ Real-time data is data that is available as soon as it is
generated and gained/acquired.
§ Instead of being stored, data is forwarded to users as soon
as it's collected and is immediately available, which is
crucial for supporting live and in-the-moment decision
making.
§ This data is powering everything from bank transactions to
GPS and others.
70
35
15/11/2022
71
SCADA Benefits
Improved operation of the plant or process resulting
in savings due to the optimization of the system
72
36
15/11/2022
73
74
37
15/11/2022
CI (cont.)
Critical Infrastructure (CI) can be classified as:
q Energy: energy production sources, storage and distribution (oil,
gas, electricity).
q Information, Communication Technology (ICT): information system
and network protection (e.g., the Internet), provision of mobile
telecommunication, radio and satellite communication and
broadcasting.
q Water Supply: Provision of water; control of quality and quantity.
q Food and Agriculture: Food production and distribution.
q Health Care : Medical and hospital care; medicines, vaccines, and
pharmaceuticals.
75
IT Systems Components
Lecture 6: Local Network, Wireless, and Internet
76
38
15/11/2022
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs.
77
The Internet
78
39
15/11/2022
80
40
15/11/2022
81
82
41
15/11/2022
Benefits of Wireless
qA Wireless LAN (WLAN) is a type of
Productivity
wireless network that is commonly used in
Convenie
Scalability.
homes, offices, and campus environments. nce
Speed
Installation and
Flexibility
Simplicity.
83
qWireless LAN (WLAN): Medium sized networks up to about 300 feet. Based on
IEEE 802.11 standard and 2.4 or 5.0 GHz frequency.
qWireless MAN (WMAN) – Large geographic area such as city or district. Uses
specific licensed frequencies.
84
42
15/11/2022
85
86
43
15/11/2022
4
WLAN
Components
87
Wireless NICs
q To communicate wirelessly, laptops, tablets, smart phones,
and even the latest automobiles include integrated
wireless NICs that incorporate a radio
transmitter/receiver.
q If a device does not have an integrated wireless NIC, then
a USB wireless adapter can be used.
88
44
15/11/2022
89
90
45
15/11/2022
91
92
46
15/11/2022
93
94
47
15/11/2022
IT Systems Components
Lecture 7: Network Mapping
95
96
48
15/11/2022
97
98
49
15/11/2022
01
the network.
02Security needs:
• Predict the cybercriminals hackers before attackers
03
attacked.
• Identify the most likely avenues that hackers and attacker
will attempt to breach and taking steps for protection.
99
Network Mapping
What is network mapping and how does it help network performance?
q Many Network Performance Monitors (NPMs) come equipped with a tool that
generates or displays network maps.
q These maps provide easy-to-understand graphics that show you how the
devices on your network are performing.
q There are three key areas where network maps can help you improve your
network performance.
v is u a l
01
N e tw o
m o n it
d ia g n
02
03
D e v ic
is s u e
N e tw o
iz a t io
rk
o s is
o r in g
e
rk
n
100
50
15/11/2022
101
102
51
15/11/2022
103
VLANs
104
52
15/11/2022
What Is Geolocation?
105
IP2Geo
q Hosts that are aggregated for the purposes of Internet routing also
tend to be clustered geographically.
106
53
15/11/2022
IP2Geo
GeoTrack
• Determine location of closest router with a recognizable DNS
name.
GeoPing
• Use delay measurements to estimate location.
GeoCluster
• Extrapolate partial (and possibly inaccurate) IP-to-location
mapping information using BGP prefix clusters.
107
GeoTrack
GeoTrack operation
q Do a traceroute to the target IP address.
q Determine location of last recognizable router along the
path.
Key ideas in GeoTrack
q Partitioned city code database to minimize chance of
false match.
q ISP-specific parsing rules.
q Delay-based correction.
108
54
15/11/2022
GeoTrack
Limitations
109
* “jitter” In electronics and telecommunications, jitter is the deviation from true periodicity of a presumably
periodic signal, often in relation to a reference clock signa
110
55
15/11/2022
111
Distribution layer
Core Layer
112
56
15/11/2022
113
Collapsed Core
114
57
15/11/2022
Public Zone-based
Demilitarized Policy
and Zone (DMZ) Firewalls
Private (ZPFs)
115
116
58
15/11/2022
117
118
59
15/11/2022
3
2
Network Security
Devices
From Network to Security
119
1
Firewalls
A firewall is a system, or group of systems, that enforces an
access control policy between networks.
Common Firewall Properties:
1. Resistant to network attacks
2. The only transit point between internal corporate networks
and external networks because all traffic flows through the
firewall
3. Enforce the access control policy
120
60
15/11/2022
121
122
61
15/11/2022
123
124
62
15/11/2022
125
126
63
15/11/2022
IT Systems Components
Lecture 9: Intrusion detection and prevention systems
127
64
15/11/2022
§ Seek to identify source and method of intrusion to ensure that attack cannot occur again.
q Intrusion detection systems (IDSs) work like a burglar alarm []إﻧذار ﺿد اﻟﺳرﻗﺔ:
detect violation, activate alarm.
q Intrusion prevention system (IPS) can detect intrusion and launch an active
response.
129
Alert or alarm
• Indication a system has just been attacked or is under attack.
Evasion:
• Process by which attacker changes the format and/or timing of their activities to
avoid being detected by the IDPS.
False attack stimulus [alarm]:
• Event that triggers alarm when no actual attack is in progress.
False negative:
• Failure of an IDPS to react to an actual attack event.
False positive:
• Alert or alarm that occurs in the absence of an actual attack.
130
65
15/11/2022
Detect attacks and security violations not prevented by other security measures.
131
Host-based (operates
on hosts )
IDPS operational
Wireless.
categories
Network-based
(functions at the
network level)
Network behavior
analysis (NBA).
132
66
15/11/2022
133
Network-Based IDPS
q NIDPSs reside on computer or appliance connected to network segment
and monitor network traffic.
134
67
15/11/2022
Wireless NIDPS
q Monitors and analyzes wireless network traffic looking for potential problems
with wireless protocols (Layers 2 and 3 of the OSI model).
q Cannot evaluate and diagnose issues with higher-layer protocols like TCP and
UDP.
135
§ Source and destination TCP or UDP ports or ICMP types and codes.
136
68
15/11/2022
Host-Based IDPS
q Resides on computer or server (the host) and monitors activity only on that
system.
q Triggers alert when file attributes change, new files are created, or existing files
are deleted.
137
• Reviews log files from servers, network devices, and other IDPSs for
signatures indicating an attack or intrusion.
138
69
15/11/2022
Active response:
Passive response:
• Report information they have collected and wait for administrator to act.
139
Reconfigure E-mail
firewall
Possible message
responses
Launch of IDPSs Page or
phone
program
message
Act against
Log entry
the intruder
Evidentiary
packet
dump
140
70
15/11/2022
141
q Padded cell: honey pot that has been protected so it cannot be easily
142
71
15/11/2022
q Use a combination of techniques to detect an intrusion and then to trace it back to its
source.
q If intruder is someone inside the organization, administrators are within their power to
track the individual and turn him or her over to authorities.
q If intruder is outside security perimeter of the organization, numerous legal issues arise
q Back hack: hacking into a hacker’s system to find out as much as possible about the
hacker.
143
IT Systems Components
Lecture 10: Cyber Incident Response (CIR)
144
72
15/11/2022
145
Tricking users into opening email attachments, which are in fact malware
that infect their computers.
146
73
15/11/2022
147
148
74
15/11/2022
q It helps with dealing properly with legal issues that may arise during
incidents.
149
150
75
15/11/2022
q Incident response plan provides the roadmap for implementing the incident
response capability.
q The plan should meet the organization’s unique requirements, which relates
to its mission, size, structure, and functions.
q The plan should include the necessary resources and management support.
q The plan should be implemented and reviewed at least annually to ensure
the organization is following the roadmap and meet their goals for incident
response.
151
152
76
15/11/2022
153
1) Preparation:
154
77
15/11/2022
155
156
78
15/11/2022
157
158
79
15/11/2022
4) Post-incident activity:
improving.
• Each IR team should evolve to reflect new threats, improved technology,
and lessons learned.
• The team should hold a “lessons learned” meeting with all involved parties
after a major incident.
• This meeting reviews the incident by reviewing what occurred, what was
done to intervene, and how well intervention worked
159
IT Systems Components
Lecture 11: Managed services
160
80
15/11/2022
Managed services
What is Managed services?
q The Managed services are the practice of outsourcing the
responsibility for maintaining, and anticipating need for, a range of
processes and functions, ostensibly for the purpose of:
§ Improved operations.
§ Reduced budgetary expenditures through the reduction of directly-
employed staff.
161
162
81
15/11/2022
Customer peace
Single supplier Avoid costs of
of mind- Single point of instead of building own
monitor network contact for all management &
on 24x7×365 issues. multiple reporting
vendors.
basis proactively. systems.
163
Ability to interact
More Business Increased ARPU with influence
Lower Total Cost contracts - customers at a
Ownership (TCO) (average revenue
for client. extended per user)
business/application
longevity. decision making
level.
164
82
15/11/2022
The Architecture
Monitoring Application
Data center server. server
Virtualization Provisioning
components. manager.
165
The Architecture
166
83
15/11/2022
Types
Name Functions Providers
• Software – production support and maintenance.
• Authentication.
• Systems management.
IT managed services
• Data backup and recovery.
Information services • Data storage, warehouse and management.
provider
• Cloud transformation.
• Network monitoring, management and security.
167
Types
Name Functions Providers
Marketing
• Marketing strategy, planning. managed services
• Integrated marketing / advertising agency provider,
Marketing
services (graphic design, copywriting, PPC, outsourced
social media, web design, SEO) marketing
providers
168
84
15/11/2022
169
170
85
15/11/2022
IT Systems Components
Lecture 12: Software Security
171
172
86
15/11/2022
173
174
87
15/11/2022
Cybercriminals
• Cybercriminals are threat actors who are motivated to
make money using any necessary means.
• They are financed and sponsored by criminal
organizations through buy and sell personal information
and intellectual property that they steal from victims.
• They target small businesses and consumers, as well as
large enterprises and industries.
• Hence, Cybersecurity is a shared responsibility which all
users must practice to make the internet and networks
safer and more secure.
• Organizations must act and protect their assets, users,
and customers.
• They must develop and practice cybersecurity tasks
such as those mentioned in the figure.
175
176
88
15/11/2022
Categories of Attacks
• It is important to understand that threat actors use a variety of security tools to carry
out these attacks.
• The following table displays common types of attacks.
Data modification Occur when a threat actor has captured enterprise traffic and has
altered the data in the packets without the knowledge of the sender or
attack
receiver.
IP address spoofing When a threat actor constructs an IP packet that appears to originate
attack from a valid address inside the corporate intranet.
177
Categories of Attacks
Category of Attack Description
Password-based
Occur when a threat actor obtains the credentials for a valid user account.
attacks
Denial-of-service (DoS) A DoS attack prevents normal use of a computer or network by valid users.
This attack can block traffic, which results in a loss of access to network
attack
resources.
Man-in-the-middle A MiTM attack occurs when threat actors have positioned themselves
attack (MiTM) between a source and destination.
Compromised key Occurs when a threat actor obtains a secret key. A compromised key can be
used to gain access to a secured communication without the sender or
attack
receiver.
A sniffer is an application or device that can read, monitor, and capture
Sniffer attack network data exchanges and read network packets. If the packets are not
encrypted, a sniffer provides a full view of the data inside the packet.
178
89
15/11/2022
Types of Malware
• Malware is a code or software designed to damage, disrupt, steal, or inflict
some other ‘bad’ or illegitimate action on data, hosts, or networks.
• The three most common types of malware are Virus, Worm, and Trojan
horse.
179
Viruses
• A virus is a type of malware that spreads by inserting a
copy of itself into another program.
• After the program is run, viruses spread from one
computer to another, thus infecting the computers.
• A simple virus may install itself at the first line of code
in an executable file.
• Viruses can be harmless, for those that display a
picture on the screen, or they can be destructive.
• They can also modify or delete files on the hard drive.
• Most viruses spread by USB memory drives, CDs,
DVDs, network shares, and email.
• Email viruses are a common type of virus.
180
90
15/11/2022
Trojan Horses
• Trojan horse malware is a software that appears to
be legitimate, but it contains malicious code which
exploits the privileges of the user that runs it.
• Trojans are found attached to online games.
• Users are commonly tricked into loading and
executing the Trojan horse on their systems
• It can cause immediate damage, provide remote
access to the system, or access through a back
door.
181
Worms
• Computer worms are similar to viruses
because they replicate themselves by
independently exploiting vulnerabilities in
networks.
• Worms can slow down networks as they
spread from system to system. Initial Code Red Worm Infection
• Worms can run without a host program.
• However, once the host is infected, the
worm spreads rapidly over the network.
182
91
15/11/2022
Ransomware
• Ransomware is a malware that denies
access to the infected computer system or
its data.
• Ransomware frequently uses an
encryption algorithm to encrypt system
files and data.
• Email and malicious advertising, also
known as malvertising()اﻹﻋﻼﻧﺎت اﻟﺧﺑﯾﺛﺔ, are
vectors for ransomware campaigns.
• Social engineering is also used, when
cybercriminals pretending to be security
technicians make random calls at homes
and persuade users to connect to a
website that downloads ransomware to
the user’s computer.
183
Files have been Increased CPU and/or Problems connecting to Slow computer or web
modified or deleted memory usage networks browser speeds
184
92
15/11/2022
Integrity
• unauthorized users cannot alter information
Availability
• authorized users can always access information
Others
• Privacy, anonymity…
185
Resource This evasion technique makes the target host too busy to properly use security
exhaustion detection techniques.
This evasion technique splits a malicious payload into smaller packets to bypass
Traffic network security detection. After the fragmented packets bypass the security detection
fragmentation system, the malware is reassembled and may begin sending sensitive data out of the
network.
186
93
15/11/2022
IT Systems Components
Lecture 13: System Administration
187
What is a system?
Servers PCs
run on
run on
Network
Services Users
help to accomplish work
188
94
15/11/2022
Monitors and
Monitors allocates system Performs Provides user
system health. resources like backups. access.
disk space.
189
190
95
15/11/2022
Planning and properly responding to system outages and various other problems.
191
Responsibility for
documenting the Performing routine
Responsibility for audits of systems
security. Performing backups.
configuration of the
system. and software.
Introducing and
Analyzing system integrating new Ensuring that the
logs and identifying Troubleshooting any network
reported problems. technologies into
potential issues with existing data center infrastructure is up
computer systems. and running.
environments.
192
96
15/11/2022
IT Systems Components
Lecture 14: Software Update
193
194
97
15/11/2022
q With more and more connected devices around us, the chance that
you've been hit by an update notification is high.
But ????
q What do these software updates do?
q How do they work, and why are they important?
195
196
98
15/11/2022
Cybercrime Protection
Decrease Downtime
197
Fix conflicts :
• If you don't update, conflicts may happen and cause problems with other programs.
198
99
15/11/2022
199
200
100
15/11/2022
IT Systems Components
Lecture 15: Vulnerability Monitoring
201
What is Vulnerability ?
q Identify exploitable flaws or weaknesses in organization’s IT
systems or processes.
q Need combination of threat and vulnerability to create a risk to an
asset.
q Outcome should be a list of threats and vulnerabilities with brief
descriptions of how and why they might occur.
202
101
15/11/2022
What is Vulnerability ?
203
In Security ..
• A vulnerability is a weakness All of them are very serious attacks these days.
which allows an attacker to
Viruses, trojan Stolen Customer
reduce a system’s horses… etc. Denial of Service
Data
Decrease Downtime
attack is the z-day attack. Hack-tivism
204
102
15/11/2022
1 FOR HARDWARE
The Four
Levels 2 FOR SOFTWARE
Can be
Attacked
3 FOR DATA
205
206
103
15/11/2022
Software Deletion:
Software Theft
• Unauthorized copying
• Via P2P, etc. “BitTorrent illegal Copy and movies”
207
208
104
15/11/2022
Usurpation
209
210
105
15/11/2022
211
Methods of Defense
Five basic approaches to defense of computing systems
Cybercrime Protection
Fix Bugs and Malware
Prevent attack Deter attack Better Security
Deflect attack Detect attack
• Block attack / Close Benefit from New Features • During or after.
ردع ﺗﺷﺗﯾت
Decrease Downtime Recover from
vulnerability
• Make attack • Make another target attack.
harder more attractive than
“impossible” this target.
212
106
15/11/2022
IT Systems Components
Lecture 16: People and security role
213
Introduction
q Computers and digital devices are a target of attack.
q Networks that computers and devices use should also be secured.
q The success of any information security program lies in policy
development.
q Policy is the foundation of an effective information security program.
q An effective information security training and awareness effort cannot be
initiated without writing information security policies.
214
107
15/11/2022
CIA Triad
We know now!!
te
gr
ity
n fi
Co
215
Encryption Passwords
Firewalls
Cybercrime Protection
Fix Bugs and Malware
Backup Firewalls Better Security
Benefit from New Features
Decrease Downtime
Virtual Private
Networks Physical Virtual Private Networks
Security
(VPN)
Security Encryption
Policies
Backup
216
108
15/11/2022
Importance of Cybersecurity
q The Internet allows an attacker to work from anywhere on the planet.
q Risks caused by poor security knowledge and practice:
§ Identity Theft.
§ Monetary Theft.
Cybercrime Protection
§ Legal Ramifications for yourself and
Fixyour
Bugsorganization).
and Malware
Better Security
§ Sanctions [ ]اﻟﻌﻘﻮﺑﺎتor terminationBenefit
if policies
fromare
NewnotFeatures
followed.
Decrease Downtime
q Top vectors for vulnerabilities available to a cyber criminal are:
§ Web Browser.
§ Web Applications.
§ Excessive User Rights.
217
Cybersecurity is Safety
qSecurity: We must protect our computers and data in the
same way that we secure the doors to our homes.
qSafety: We must behave inProtection
Cybercrime ways that protect us against
Fix Bugs and Malware
Better Security
risks and threats that come with technology.
Benefit from New Features
Decrease Downtime
218
109
15/11/2022
Leading Threats
Viruses Worms
Cybercrime Protection
Trojan
Social Fix Bugs and Malware
Horses / Better Security
Botnets /
Rootkits
Zombies
219
Social Engineering
q Social engineering is a manipulation technique that exploits human
error to gain private information, access, or valuables.
q In cybercrime, these “human hacking” scams tend to lure
Cybercrime Protection
Fix Bugs and Malware
unsuspecting users into exposing data, spreading malware
Better Security
Benefit from New Features
infections, or giving access to restricted systems.
Decrease Downtime
220
110
15/11/2022
Why Policy?
q A quality information security program begins and ends with policy.
q Although information security policies are the least expensive means
of control to execute, they are often the most difficult to implement.
Cybercrime Protection
q Policy controls cost onlyFix
the time
Bugs and effort that the management
and Malware
Better Security
Benefit from New Features
team spends to create, approve and communicate them, and that
Decrease Downtime
221
Cybercrime Protection
Management mustFix Bugsensure the
and Malware
adequate sharing of responsibility
Better Security
Benefit from New Features
for proper use of information
Decrease Downtime
systems
222
111
15/11/2022
Cybercrime Protection
Policy must be able to stand up in court, if
Fix Bugs and Malware
Better Security
challenged. Benefit from New Features
Decrease Downtime
223
224
112
15/11/2022
Networks :
•The place where threats from public networks meet the organization’s networking
infrastructure; in the past, most information security efforts have focused on
networks, and until recently Cybercrime
information security was often thought to be
Protection
synonymous with network security.
Fix Bugs and Malware
Better Security
Systems: Benefit from New Features
Decrease
•Computers used as servers, desktop Downtime
computers, and systems used for process control
and manufacturing systems.
Application :
•All applications systems, ranging from packed applications such as office automation
and e-mail programs, to high-end ERP packages and custom application software
developed by the organization.
225
IT Systems Components
Lecture 17: Physical (Environmental) Security
226
113
15/11/2022
Availability :
• Ensures that the system is physically protected from destruction.
Integrity:
• Ensures that the information system is physically protected so that unauthorized
“taps” or equipment (wireless access points, additional routers, etc.) cannot be
inserted into the system.
227
228
114
15/11/2022
229
Perimeter
230
115
15/11/2022
231
232
116
15/11/2022
233
234
117
15/11/2022
IT Systems Components
Lecture 18: Internet of Things (IoT)
235
Local Cloud
Sensors Processing Network Internet Processing
and Storage and Storage
236
118
15/11/2022
IoT Network
237
q The main goal of IoT is to configure, control, and network the devices or
things, to the internet, which are traditionally not associated with the
238
119
15/11/2022
239
240
120
15/11/2022
Applications of IoT
Health &
Lifestyle
241
242
121
15/11/2022
243
Computation
• Performed on the collected info
• Provide processing power for IoT applications.
Services
• Identity-related services: get the identity of objects
• Information aggregation: collect info from objects
• Collaborative services: integrate info sources, make decisions, send
appropriate responses, …
• Ubiquitous services: offer immediate responses without the rigidity of time
and place.
• IoT platforms: platforms for hosting, connecting, and integrating IoT services.
244
122
15/11/2022
245
123