Module 5 Information Security
Module 5 Information Security
Security
Mary Komunte
Ethical use of Information Security
• We discuss vulnerabilities and attacks
– Most vulnerabilities may be fixed
– Some attacks may still cause harm
– Do not try these at home, work places or
anyplace else
• Purpose of this class
– Learn to prevent malicious attacks
– Use knowledge for good purposes
What is security?
Masquerading
• Masquerading occurs when one person uses the identity of another to
gain access to a computer . This may be done in person or remotely.
• In person, a criminal may use an authorized user's identity or access
card to get into restricted areas where he will have access to computers
and data.
• This may be as simple as signing someone else‘s name to a sign in sheet
at the door of a building.
• It may be as complex as playing back a voice recording of someone
else to gain entry via a voice recognition system.
• Electronically, an unauthorized person will use an authorized user's
login ID, password, personal identification number (PIN), or telephone
access code to gain access to a computer or to a particular set of
sensitive data files.
Breaches of Personnel Security
Social Engineering
• Social engineering is the name given a category of attacks in
which someone manipulates others into revealing information that
can be used to steal data or subvert systems.
Harassment
• A particularly nasty kind of personnel breach we've seen lately is
harassment on the Internet. Sending threatening email messages
and slandering people on bulletin board systems and newsgroups
is all too common.
• the electronic audience is a much larger one, and such messages,
sent out from an organization's network domain, may damage the
reputation of the organization as well as that of the particular
perpetrator.
Breaches of Personnel Security…
Software Piracy
• Copying and selling off-the-shelf application
programs in violation of the copyrights costs
software vendors many millions of dollars. The
stealing of proprietary programs is also a major
business problem.
• A company may spend millions of dollars to develop
a specialized program, only to find that its competitor
has the same program--and the competitor hasn't had
to invest in the development costs!
Breaches of Communications
and Data Security…
Breaches of Communications
and Data Security…
Session Hijacking
• Some systems don't disconnect immediately when a
session is terminated. Instead, they allow a user to re-
access the interrupted program for a short period. A
cracker with a good knowledge of telephone and
telecommunications operations can take advantage of
this fact to reconnect to the terminated session.
• Sometimes, an attacker will connect a covert computer
terminal to a line between the authorized terminal and
the computer.
Session Hijacking cont……
Trap Doors
• A trap door is a quick way into a program; it allows
program developers to bypass all of the security built
into the program now or in the future.
• To a programmer, trap doors make sense. If a
programmer needs to modify the program sometime
in the future, he can use the trap door instead of
having to go through all of the normal, customer-
directed protocols just to make the change.
Trap Doors cont…..
IP Spoofing
• (IP stands for Internet Protocol, one of the communications
protocols that underlies the Internet).
• Certain UNIX programs grant access based on IP addresses;
essentially, the system running the program is authenticated,
rather than the individual user.
• The attacker forges the addresses on the data packets he sends so
they look as if they came from inside a network on which systems
trust each other.
• Because the attacker's system looks like an inside system, he is
never asked for a password or any other type of authentication. In
fact, the attacker is using this method to penetrate the system
from the outside.
Breaches of Operations Security…
Password Sniffing
• Password sniffers are able to monitor all traffic on areas of a
network.
• Crackers have installed them on networks used by systems that
they especially want to penetrate, like telephone systems and
network providers.
• Password sniffers are programs that simply collect the first 128 or
more bytes of each network connection on the network that's
being monitored.
• When a user types in a user name and a password--as required
when using certain common Internet services like FTP (which is
used to transfer files from one machine to another) or Telnet (which lets
the user log in remotely to another machine)--the sniffer collects that
information.
Threats to Information Security
• Scanning
• With scanning, a program known as a war dialer
or demon dialer processes a series of
sequentially changing information, such as a list
of telephone numbers, passwords, or telephone
calling card numbers. It tries each one in turn to
see which ones succeed in getting a positive
response,
Security measures…
• What are the security measures to all these
breaches?