Modul 1 - Intro To Network Security
Modul 1 - Intro To Network Security
Network Security
Politeknik Elektronika Negeri Surabaya
2007
PENS-ITS
Network Security
Introduction
Penilaian
Tugas 25%
UAS 40%
UTS 30%
Kehadiran 5%
PENS-ITS
Network Security
Overview
PENS-ITS
Network Services CISCO Router
Network Security
INTERNET
ROUTER
All Server in DMZ
Manage using SSH , GTW -
Secure Webmin
DMZ
portsentry , acidlab Block unwanted user from port ,
manage from WEB
E-Mail server
HTTPS , SPAM EEPISHOTSPOT
(Spamassassin ), Virus Access from wifi , signal
Scanner ( ClamAV ) only in EEPIS campus
Authentication from
Proxy
FILESERVER EIS
Internal Server
STUDENTS EEPIS -INFORMATION SYSTEM
(EIS http ://eis.eepis -its.edu)
PENS-ITS
EEPISHOTSPOT
Http://fileserver .eepis -its .edu
Network Security
Internal External
attacker attacker
PENS-ITS
Network Security
Exploits (1)
What is an Exploit?
Crackers break into a computer network by exploiting weaknesses in
operating system services.
Types of attacks
Local
Remote
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
Attack Targets
SecurityFocus
31 million Windows-specific attacks
22 million UNIX/LINUX attacks
7 million Cisco IOS attacks
All operating systems are attacked!
PENS-ITS
Network Security
Hackers Vs Crackers
Ethical Hackers vs. Crackers
Hacker usually is a programmer constantly seeks
further knowledge, freely share what they have
discovered, and never intentionally damage data.
Cracker breaks into or otherwise violates system
integrity with malicious intent. They destroy vital
data or cause problems for their targets.
PENS-ITS
Network Security
Pengelompokan Attack
PENS-ITS
Network Security
Pengelompokan Attacks
Attacks
PENS-ITS
Network Security
Social Engineering
Definisi Social enginering
seni dan ilmu memaksa orang untuk memenuhi harapan anda ( Bernz ),
Suatu pemanfaatan trik-trik psikologis hacker luar pada seorang user
legitimate dari sebuah sistem komputer (Palumbo)
Mendapatkan informasi yang diperlukan (misalnya sebuah password) dari
seseorang daripada merusak sebuah sistem (Berg).
Tujuan dasar social engineering sama seperti umumnya hacking:
mendapatkan akses tidak resmi pada sistem atau informasi untuk
melakukan penipuan, intrusi jaringan, mata-mata industrial,
pencurian identitas, atau secara sederhana untuk mengganggu
sistem atau jaringan.
Target-target tipikal termasuk perusahaan telepon dan jasa-jasa
pemberian jawaban, perusahaan dan lembaga keuangan dengan
nama besar, badan-badan militer dan pemerintah dan rumah
sakit.
PENS-ITS
Network Security
PENS-ITS
Network Security
Host
Internet
172.16.99.1
Attacker
No Host
No Reply Results
172.16.99.2
172.16.99.1 is reachable
172.16.99.2 is not reachable
Corporate Network
PENS-ITS
Network Security
Network Scanning
PENS-ITS
Network Security
Denial-of-Service (DoS)
Flooding Attack
Message Flood
Server
Attacker
Overloaded By
Message Flood
PENS-ITS
Network Security
DoS By Example
PENS-ITS
Network Security
Dialog Attack
Eavesdropping, biasa disebut dengan spoofing,
cara penanganan dengan Encryption
Impersonation dan message alteration
ditangani dengan gabungan enkripsi dan
autentikasi
PENS-ITS
Network Security
Eavesdropping on a Dialog
Dialog
Hello
Client PC
Server
Bob
Alice
Hello
PENS-ITS
Network Security
PENS-ITS
Network Security
Sniffing By Example
PENS-ITS
Network Security
KeyLogger
PENS-ITS
Network Security
Message Alteration
Dialog
Balance = Balance =
Client PC $1 $1,000,000 Server
Bob Alice
Balance =
$1 Balance =
$1,000,000
Attacker (Eve) intercepts
and alters messages
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
Attacker
Dropped
Packet
Hardened
Server Internal
Log File Corporate
Network
PENS-ITS
Network Security
1.
4. Alarm Intrusion Suspicious
Detection Packet
System
Network
2. Suspicious
Administrator Internet
Packet Passed
Attacker
3. Log
Packet
Hardened
Server
Log File Corporate Network
PENS-ITS
Network Security
Encrypted
Message
100100110001
Client PC Server
Bob Alice
100100110001
PENS-ITS
Network Security
Impersonation and
Authentication
Im Bob
Prove it!
Client PC Attacker (Authenticate Yourself)
Server
Bob (Eve) Alice
PENS-ITS
Network Security
Secure Dialog
Client PC
Automatically Handles Server
Bob
Negation of Security Options Alice
Authentication
Encryption
Integrity
Attacker cannot
read messages, alter
messages, or impersonate
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
PENS-ITS
Network Security
Managing Permissions
Principle of Least Permissions: Give Users
the Minimum Permissions Needed for Their
Job
More feasible to add permissions selectively than
to start with many, reduce for security
PENS-ITS
Network Security
Backup
File Encryption