Final ITAM Ppt

download Final ITAM Ppt

of 16

Transcript of Final ITAM Ppt

  • 7/30/2019 Final ITAM Ppt

    1/16

    IT FOR SECURITY& PRIVACY

    PRESENTED BY:-

    POULAMI SARKAR 2013201

    PRERNA BANSAL 2013209

    PRIYADARSHI TANDON 2013211

    PRIYANKA DOSHI

    2013212

  • 7/30/2019 Final ITAM Ppt

    2/16

    INTRODUCTION

    Two major aspects of information

    security are:

    IT Security

    Information assurance

    Information Security Attributes or

    qualities i.e. Confidentiality, Integrity &

    Availability (CIA)

    Information security, sometimes shortened to InfoSec, is the practice

    of defending information from unauthorized access, use, disclosure,

    disruption, modification, perusal, inspection, recording or destruction. It is a

    general term that can be used regardless of the form the data may take

    (electronic, physical, etc...).

  • 7/30/2019 Final ITAM Ppt

    3/16

    IP SPOOFING IP spoofing is a technique used to gain unauthorized access to

    computers, where by the attacker sends messages to a computer with aforging IP address indicating that the message is coming from a trusted

    host.

    Attacker puts an internal, or trusted, IP address as its source. The

    access control device sees the IP address as trusted and lets it through.

    Two general techniques are used during IP spoofing:A hacker uses an IP address that is within the range of trusted

    IP addresses.A hacker uses an authorized external IP address that is trusted.

    Types of IP Spoofing:

    Flooding

    Blind Spoofing

    Non-blind Spoofing

  • 7/30/2019 Final ITAM Ppt

    4/16

    REAL LIFE EXAMPLE TO EXPLAIN WHAT

    IS

    IP SPOOFING.

    AB

    C

    B is on line

    A disguising his voice,making

    it sound more like that of B

    If we now , replace the 3 people by computers and change the

    term voice with IP-Address then you would know what we

    mean by IP-SPOOFING

  • 7/30/2019 Final ITAM Ppt

    5/16

    DNS POISONING

    DNS spoofing (or DNS cache poisoning) is a computer

    hacking attack, whereby data is introduced into a Domain Name

    System (DNS) name server's cache database, causing the name server

    to return an incorrect IP address, diverting traffic to another computer(often the attacker's).

    A DNS cache can become poisoned if it contains an incorrect entry.

    EXAMPLE:If various Internet service providers are getting their DNS informationfrom the compromised server, the poisoned DNS entry will spread to the

    Internet service providers and be cached there. It will then spread to

    home routers and the DNS caches on computers as they look up the

    DNS entry, receive the incorrect response, and store it.

  • 7/30/2019 Final ITAM Ppt

    6/16

    A SHORT OVERVIEW ON DNS

    Internet: Authoritive

    DNS Servers

    Client

    Caching

    DNS Server

    dns.microsoft.com

    dns.hacker.com

  • 7/30/2019 Final ITAM Ppt

    7/16

    ADDRESS BOOK THEFT

    Stealing of email address book

    Spamming

    Solution: 1. Use email client on

    computer.

    2. Change the password

    difficult to crack.

    Precaution: 1. Personal Details arecorrect.

    2. Creative Password

    3. Proper security

    question.

  • 7/30/2019 Final ITAM Ppt

    8/16

    PASSWORD CRACKERS

    Recovering passwords from data stored in computer

    systems

    Purpose: 1. Recover forgotten password2. Gain unauthorized access

    3. Preventive measure for easily crackable

    passwords

    Methods: 1. Dictionary Attack

    2. Hybrid Attack

    3. Brute Force Attack

  • 7/30/2019 Final ITAM Ppt

    9/16

    PASSWORD CRACKING

    SOFTWAREPassword cracking

    software tools

    Most popularCainand Abel, John the

    Ripper,

    Hashcat, Hydra,SolarWinds, ElcomSoft

    Mixture of cracking

    strategiesbrute force

    and dictionary attacks

    most productive

  • 7/30/2019 Final ITAM Ppt

    10/16

    TROJAN HORSE

    A Trojan Horse is a program

    that installs malicious software

    while under the guise of doingsomething else.

    It erases or Overwrites data on

    a computer, spreading other

    malware, such as viruses. Inthis case the Trojan horse is

    called a 'dropper'.

  • 7/30/2019 Final ITAM Ppt

    11/16

    TYPES OF TROJAN

    AceBot

    AceBot is a tremendous backdoor Trojan, which was designed for performing a

    lot of destructive actions.

    The parasite detects, terminates and totally disables running antivirus software

    installed on the target computer.

    AceBot also connects to the IRC network and uses it for giving the hacker a

    remote control over the computerised system. Moreover, the Trojan is able to

    connect to various malicious servers and download other harmful parasites from

    there.

    Secup The Secup Trojan displays fake security related messages. When the user clicks on such a message the Trojan opens malicious web site

    that quietly installs potentially harmful software. Secup also serves undesirable commercial advertisements.

    Dmsys

    Dmsys is a dangerous Trojan that specializes in infecting various instant

    messengers and stealing user confidential information.

    By using its keystroke logging technique, Dmsys easily steals user passwords

    and captures private conversations. This information is written into a log file,

    which is then sent to the hacker.

  • 7/30/2019 Final ITAM Ppt

    12/16

    COMPUTER WORM

    Worms

    A worm is a computer

    program that has :

    The ability to copy itself

    from machine to machine.

    Worms use up computer

    processing time and

    network bandwidth when

    they replicate.

  • 7/30/2019 Final ITAM Ppt

    13/16

    CODE RED (THE WORM)

    The worm spread itself

    using a common type of

    vulnerability known asa buffer overflow. It did this

    by using a long string of

    the repeated character 'N'

    to overflow a buffer

    allowing the worm toexecute arbitrary code and

    infect the machine

  • 7/30/2019 Final ITAM Ppt

    14/16

    LOGIC BOMB A logic bomb is a piece

    of code intentionally inserted into

    a software system that will set off a

    malicious function when specified

    conditions are met. For example, a

    programmer may hide a piece of codethat starts deleting files (such as

    a salary)

    On March 20, 2013 an attack was

    launched against South Korea, a

    logic bomb struck machines "and

    wiped the hard drives and masterboot records of at least three banks

    and two media companies

    simultaneously". Symantec reported

    that the malware also contained a

    component that was capable of

    wiping Linux machines.

  • 7/30/2019 Final ITAM Ppt

    15/16

    IT PRIVACY

    Internet privacy involves theright or mandate of

    personal privacy concerning the

    storing, repurposing, provisionto third-parties, and displaying

    of information pertaining tooneself via the Internet

    Examples:

    Sony CD spywareAOL search leak

    Google Street View

  • 7/30/2019 Final ITAM Ppt

    16/16