Syed Ubaid Ali Jafri Lecture on Information Technology

23
INTERNET INTEGRATION & NETWORK SECURITY BY SYED UBAID ALI JAFRI Information Security Expert CEO UJ Consultant & Solution Provider http://www.ujconsultant.com

description

Why Information Technology is still an issue for Non technical users? Information technology Assets, Data Security in Information technology, Information And data does still has a difference?

Transcript of Syed Ubaid Ali Jafri Lecture on Information Technology

Page 1: Syed Ubaid Ali Jafri Lecture on Information Technology

INTERNET INTEGRATION & NETWORK SECURITY

BY

SYED UBAID ALI JAFRIInformation Security ExpertCEOUJ Consultant & Solution Providerhttp://www.ujconsultant.com

Page 2: Syed Ubaid Ali Jafri Lecture on Information Technology

CONSIDERATIONS

•IMPORTANCE OF TECHNOLOGY •NETWORK SCANNING•WHAT WE DO?•VIRTUALIZATION•INTRODUCTION TO NETWORK SECURITY•MINIMIZING RISK•EVALUATE PERFORMANCE

Page 3: Syed Ubaid Ali Jafri Lecture on Information Technology

IMPORTANCE OF TECHNOLOGYMAIL POST EMAIL

A Sender A Sender

Writes a Letter and place the informationTo:From:Return Address:

Writes a Letter and place the informationTo:From:Return Address:

Find nearby post office Find an E-Mail Server

Post Officer then check the Header information:1)To: abc2)Address: 123/Abc. Khi3)From: xyz4)Return Address: 123/Abc. Khi

E-Mail Server verify the header information:1)To: [email protected])From: [email protected])Return Address: [email protected]

When the information on a header is verified a stamp has been made on the envelop , and an amount is charged for the service

When the information on a header is verified it send the information to the e-mail server, For free E-Mail Server , no amount is charged for the service

On the same day or another day the post master took the envelop and send the envelop to the nearby post office of the destination

On the same day or with a delay of time Email server send the request to another email server if it contains the address then it send to the Mail Server

Post Master of the destination’s Address then took the envelop and send it to the address

Mail Server send a mail to the destination’s Address.

Receiver check the POSTBOX Receiver checks the Mail Box

Page 4: Syed Ubaid Ali Jafri Lecture on Information Technology

10 Years Back• Microsoft Launch their operating system known as

“Windows XP”

Time Period Commands

10 Years Start > Run> cmdNetstat-an

Identifies from which server your machine connection is established

10 Years Start > Run > cmdNet view

Identifies how many computers are the part of your network

9 Years Start > Run > cmdPing Pc-Name

Ping google.com.pkGet the IP Address from a Domain name

8 Years Start > Run > cmdMsinfo32.exe

Command used to identify the peripheral of computer

Page 5: Syed Ubaid Ali Jafri Lecture on Information Technology

NETWORK SCANNING

•Foot printing•Finger Printing•Scanning•Identify the threat•Applying patches

Page 6: Syed Ubaid Ali Jafri Lecture on Information Technology

WHAT WE DO AND HOW WE BECOME A VICTIM

Following are the list of threats that a user faces on a network:

•MAN IN THE MIDDLE ATTACK•SESSION HIJACKING•FAKE E-MAIL FORWARDING•DENIAL OF SERVICES•SOCIAL ENGINEERING

Page 7: Syed Ubaid Ali Jafri Lecture on Information Technology

THREATSMAN IN THE MIDDLE ATTACK:

The man-in-the middle attack intercepts a communicationbetween two systems.

Page 8: Syed Ubaid Ali Jafri Lecture on Information Technology

THREATSSESSION HIJACKING

•The Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token.

Page 9: Syed Ubaid Ali Jafri Lecture on Information Technology

THREATSFAKE E-MAIL FORWARDING

Page 10: Syed Ubaid Ali Jafri Lecture on Information Technology

THREATS

DENIAL OF SERVICES

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users

Page 11: Syed Ubaid Ali Jafri Lecture on Information Technology

THREATS

SOCIAL ENGINEERING

In the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information

Page 12: Syed Ubaid Ali Jafri Lecture on Information Technology

INTRODUCTION TO NETWORK SECURITY

• It consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

• Network security involves the authorization of access to data in a network, which is controlled by the network administrator.

Page 13: Syed Ubaid Ali Jafri Lecture on Information Technology

COUNTERMEASUREMENTS

•Denying Unusable services•Checking people currently connect with this network•Closing Default operators of windows•Saving external resources•Making Log files•Updated Virus Definitions

Page 14: Syed Ubaid Ali Jafri Lecture on Information Technology

COUNTERMEASUREMENTSDenying Unusable services

RUN>Services.mscClose these services

Automatic UpdatesLive UpdateTelnet

Page 15: Syed Ubaid Ali Jafri Lecture on Information Technology

COUNTERMEASUREMENTS

Closing Default operators of windows

Page 16: Syed Ubaid Ali Jafri Lecture on Information Technology

COUNTERMEASUREMENTSHKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ExplorerHKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Operating system Default settingWindows 7 0x91

Windows Server 2008 0x91

Windows Vista 0x91

Windows Server 2003 0x95

Windows XP 0x91

Windows 2000 0x95

Windows 95/98 0x95

Page 17: Syed Ubaid Ali Jafri Lecture on Information Technology

COUNTERMEASUREMENTSMaking Log files

RUN > eventvwr

Page 18: Syed Ubaid Ali Jafri Lecture on Information Technology

MINIMIZING RISK•Making Remote Connectivity disabled•Services Like Telnet, SSH, VNC should be stopped forcefully•Changing Values from Registry•Releasing and Renewing IP Addresses

Page 19: Syed Ubaid Ali Jafri Lecture on Information Technology

MINIMIZING RISK•Services Like Telnet, SSH, VNC should be stopped forcefully

•Net stop telnet

•Net start telnet

Page 20: Syed Ubaid Ali Jafri Lecture on Information Technology

MINIMIZING RISK•Releasing and Renewing IP Addresses:

•Ipconfig /release

•Ipconfig /renew

Page 21: Syed Ubaid Ali Jafri Lecture on Information Technology

EVALUATE PERFORMANCE

Page 23: Syed Ubaid Ali Jafri Lecture on Information Technology