Overview
Overview
Network Security
1
10/17/2022
References
1. Security in Computing, 5th edition,
Charles P. Pfleeger - Pfleeger Consulting
Group, Shari Lawrence Pfleeger, Prentice
Hall 2015
2. Cryptography and Network Security
Principles and Practices, Global edition,
William Stallings, Prentice Hall 2017
3. Security Engineering, 3rd edition, Ross J.
Anderson, Wiley 2020
About lecturer
Dr. Nguyen Duc Toan,
Computer Engineering Department, SoICT, HUST
Email: toannd@soict.hust.edu.vn
Working place: Room 801 – B1 – BKHN
Website: https://soict.hust.edu.vn/en/ph-d-nguyen-duc-toan.html
2
10/17/2022
Objectives
1. Describe the rationale for network security
2. Identify risks, threats, vulnerabilities and
countermeasures
3. Discuss the states of information, identify
threats and appropriate countermeasures for
each state
4. Differentiate between security policies,
standards and guidelines
1. Introduction
3
10/17/2022
Username/Password (aging)
Username/Password (static)
No Username or Password
Convenience
Convenience
4
10/17/2022
https://www.statista.com/statistics/1307426/number-of-data-breaches-worldwide
10
5
10/17/2022
11
12
6
10/17/2022
Information security
13
14
7
10/17/2022
15
Confidentiality
Integrity
Availability
16
8
10/17/2022
17
18
9
10/17/2022
Balance 0$
19
Balance 1000$
20
10
10/17/2022
Integrity
21
Integrity – User
Breach of integrity
Balance 1000$
22
11
10/17/2022
Integrity – Bank
Balance 100.000$
23
Integrity – Bank
Breach of integrity
Balance 10$
24
12
10/17/2022
Availability
25
• Confidentiality
• Prevent the disclosure of sensitive information from unauthorized
people, resources, and processes
• Integrity
• The protection of system information or processes from
intentional or accidental modification
• Availability
• The assurance that systems and data are
accessible by authorized users when needed
26
13
10/17/2022
Information States
Processing
Storage
Transmission
27
Security Measures
Technology
28
14
10/17/2022
Processing
Storage
Transmission
Confidentiality
Integrity
Availability
29
Information States
Information
Security
Properties
Security Measures
NSTISSI 4011: National Training Standard for Information Systems Security Professionals, 1994
30
15
10/17/2022
31
32
16
10/17/2022
33
33
34
17
10/17/2022
35
Authentication
36
18
10/17/2022
Authorization
37
Accounting
38
19
10/17/2022
39
40
20
10/17/2022
• Cyber Dependent Crimes, where a digital system is the target as well as the
means of attack. These include attacks on computer systems to disrupt IT
infrastructure, and stealing data over a network using malware (the purpose of
the data theft is usually to commit further crime).
• Cyber Enabled Crimes. ‘Existing’ crimes that have been transformed in scale
or form by their use of the Internet. The growth of the Internet has allowed
these crimes to be carried out on an industrial scale.
• The use of the Internet to facilitate drug dealing, people smuggling and many
other 'traditional' crime types.
41
Cyber element?
42
21
10/17/2022
Highest reported
incidents:
+ Online fraud
+ Mandate
+ Ransomware
+ Romance
frauds
43
44
22
10/17/2022
Current Scams
• Invoice emails – i.e. new vendors, changes to current vendors, Apple
[little mix]
• Vouchers - Supermarkets, on line stores
• Account updates – amazon, Sky, Virgin, Utilities.
• Advice – any unsolicited emails. Do not press that link; simply delete.
Go via normal website. Send to phishing email address for company
• Mandate fraud – Bedford company lost £100K put 27 staff at risk. £1M
in Luton in September. Bedford company had windows 365
compromised with poor PW. L/Buzzard company 17 fake invoices by
post in Jan17.
• Solicitor companies being targeted – Luton March 2017, Bedford Dec
• Advice - Slow down, check via second source. Get copy of our advice.
• Ransomware – Luton Hotel attacked over New year – pay and enter
suckers list
45
Other cybercrime
• Identity Theft
• Child Pornography
• Theft of Telecommunications Services
• Electronic Vandalism, Terrorism and Extortion
46
23
10/17/2022
47
Ultimately it depends on the business, how it is set up, the infrastructure and the
policies and procedures, and protect mechanisms in place.
48
24
10/17/2022
Business Impact
1. Decrease in productivity
2. Loss of sales revenue
3. Release of unauthorized sensitive data
4. Threat of trade secrets or formulas
5. Compromise of reputation and trust
6. Loss of communications
7. Threat to environmental and safety systems
8. Loss of time
49
Legislation
50
25
10/17/2022
Proliferation of Threats
51
What is Vulnerability
52
26
10/17/2022
53
Purpose of Security
• To protect assets!
• Historically done through physical security and closed
networks.
54
27
10/17/2022
55
What is Threat
56
28
10/17/2022
Threats
• There are four primary classes of threats to network security:
• Unstructured threats
• Structured threats
• External threats
• Internal threats
57
Types of Attacks
Structured attack
Come from hackers who are more highly motivated and technically
competent. These people know system vulnerabilities and can
understand and develop exploit code and scripts. They understand,
develop, and use sophisticated hacking techniques to penetrate
unsuspecting businesses. These groups are often involved with the
major fraud and theft cases reported to law enforcement agencies.
Unstructured attack
Consists of mostly inexperienced individuals using easily available
hacking tools such as shell scripts and password crackers. Even
unstructured threats that are only executed with the intent of testing
and challenging a hacker’s skills can still do serious damage to a
company.
58
29
10/17/2022
Types of Attacks
External attacks
Initiated by individuals or groups working outside of a company. They
do not have authorized access to the computer systems or network.
They gather information in order to work their way into a network
mainly from the Internet or dialup access servers.
Internal attacks
More common and dangerous. Internal attacks are initiated by
someone who has authorized access to the network. According to the
FBI, internal access and misuse account for 60 to 80 percent of
reported incidents. These attacks often are traced to disgruntled
employees. ba^t' man~
59
Types of Attacks
• Passive Attack
• Listen to system passwords
• Release of message content
• Traffic analysis
• Data capturing
• Active Attack
• Attempt to log into someone else’s account
• Wire taps
• Denial of services
• Masquerading
• Message modifications
60
30
10/17/2022
• ARP Attack
• Brute Force Attack
• Worms
• Flooding
• Sniffers
• Spoofing
• Redirected Attacks
• Tunneling Attack
• Covert Channels
61
Attack Methodology
62
31
10/17/2022
Stages of an Attack
63
64
32
10/17/2022
2. Risk managêmnt
65
Risk Management
• Risk Analysis
• Threats
• Vulnerabilities
• Countermeasures
66
33
10/17/2022
Risk Management
67
Risk Assessment
68
34
10/17/2022
Asset Identification
• Categories of assets
• Information Assets (people, hardware, software, systems)
• Supporting Assets (facilities, utilities, services)
• Critical Assets (can be either of those listed above)
• Attributes of the assets need to be compiled
• Determine each item’s relative value
• How much revenue/profit does it generate?
• What is the cost to replace it?
• How difficult would it be to replace?
• How quickly can it be replaced?
69
70
35
10/17/2022
Understanding Risk
Gives rise to
Threat
Exploits
Agent
Threat Leads to
Vulnerability
Risk
Directly affects
Asset
Can damage
Exposure Causes
Countermeasure
Can be safeguarded by
71
A new worm
72
36
10/17/2022
73
Countermeasures
• DMZ/NAT
• IDS/IPS
• Content Filtering/NAC
• Firewalls/proxy services
• Authentication/Authorization/Accounting
• Self-defending networks
• Policies, procedures, standards guidelines
• Training and awareness
74
37
10/17/2022
Countermeasure Selection
75
Managing Risks
Accept Transfer
Acknowledge that the Shift responsibility for
risk exists, but apply the risk to a third
no safeguard party (ISP, Insurance,
etc.)
Risk
Mitigate Avoid
Change the asset’s risk Eliminate the asset’s
exposure (apply exposure to risk, or
safeguard) eliminate the asset
altogether
76
38
10/17/2022
3. Security Policy
77
78
39
10/17/2022
79
80
40
10/17/2022
81
82
41
10/17/2022
• Take a phrase
Up and At ‘em at 7!
• Convert to a strong password
Up&atm@7!
• To create other passwords from this phrase,
change the number, move the symbol, or
change the punctuation mark
83
84
42
10/17/2022
Policy Elements
85
Policy Elements, 2
86
43
10/17/2022
Policy Example
Purpose The purpose of this policy is to protect the assets of the organization by clearly informing staff of their roles
and responsibilities for keeping the organization’s information confidential.
Audience ABC Co confidentiality agreement policy applies equally to all individuals granted access privileges to an
ABC Co Information resources
Policy This policy requires that staff sign a confidentiality policy agreement prior to being granted access to any
sensitive information or systems.
Agreements will be reviewed with the staff member when there is any change to the employment or contract,
or prior to leaving the organization.
The agreements will be provided to the employees by the Human Resource Dept.
Exceptions At the discretion of the Information Security Officer, third parties whose contracts include a confidentiality
clause may be exempted from signing individual confidentiality agreements.
Disciplinary Violation of this policy may result in disciplinary actions, which may include termination for employees and
Actions temporaries; a termination of employment relations in the case of contractors or consultants; or dismissal for
interns and volunteers. Additionally, individuals are subject to civil and criminal prosecution.
87
www.sans.org
www.cisecurity.org
www.cert.org
www.isc2.org
www.first.org
www.infragard.net
www.mitre.org
www.cnss.gov
88
44
10/17/2022
SANS
89
CERT
90
45
10/17/2022
ISC2
91
4. Evolution of Hacking
92
46
10/17/2022
Hacker Titles
• Phreaker
• An individual that manipulates the phone
network in order to cause it to perform a
function that is normally not allowed such as
to make free long distance calls.
• Captain Crunch (John Drapper)
• Spammer
• Individual that sends large quantities of
unsolicited email messages.
• Spammers often use viruses to take control
of home computers to send out their bulk
messages.
• Phisher
• Individual uses email or other means in an
attempt to trick others into providing
sensitive information, such as credit card
numbers or passwords.
93
Evolution of Hacking
• 1960s - Phone Freaks (Phreaks)
• 1980s - Wardialing (WarGames)
• 1988 - Internet Worm
• 1993 - First def Con hacking conference held
• 1995 - First 5 year federal prison sentence for hacking
• 1997 - Nmap released
• 1997 - First malicious scripts used by script kiddies
• 2002 - Melissa virus creator gets 20 months in jail
94
47
10/17/2022
Security firsts …
95
96
48
10/17/2022
First Worm
• Robert Morris created the first Internet worm with
99 lines of code.
• When the Morris Worm was released, 10% of Internet
systems were brought to a halt.
97
First SPAM
98
49
10/17/2022
99
Mafiaboy
• In 2001, The Montreal Youth Court
sentenced him on September 12, 2001
to eight months of "open custody," one
year of probation, restricted use of the
Internet, and a small fine.
• In 2005, Mr. Calce wrote as a columnist
on computer security topics for the
Francophone newspaper Le Journal de
Montréal.
• In 2008, he published Mafiaboy: “How I
Cracked the Internet and Why It's Still
Broken.”
• He has also made numerous TV
appearances.
100
50
10/17/2022
101
102
51
10/17/2022
103
5. Network Attacks
104
52
10/17/2022
Types of Attacks
• There are four categories of attacks:
• Malicious Code: Viruses, Worms and Trojan Horses
• Reconnaissance Attacks
• Access Attacks
• Denial of Service (DoS) Attacks
105
Malware
xam nhap
• “Malicious software” is software designed to infiltrate a computer
without the owner's informed consent.
su dong thuan, dong y
• Malware includes:
• Computer viruses
• Worms
• Trojan horses
• Rootkits
• Backdoors (Method of bypassing normal authentication
procedures and usually installed using Trojan horses or
worms.)
• For profit (Spyware, botnets, keystroke loggers, and dialers)
106
53
10/17/2022
Spyware
• Spyware is a strictly for-profit category of malware designed to:
• Monitor a users web browsing.
• Display unsolicited advertisements.
• Redirect affiliate marketing revenues to the spyware
creator.
• Spyware programs are generally installed by exploiting security
holes or as Trojan horse programs such as most peer-to-peer
applications.
107
108
54
10/17/2022
109
110
55
10/17/2022
Viruses
• A computer virus is a malicious computer program (executable file) that
can copy itself and infect a computer without permission or knowledge
of the user.
• A virus can only spread from one computer to another by:
• Sending it over a network as a file or as an email payload.
• Carrying it on a removable medium.
• Viruses need USER INTERVENTION to spread …
111
Viruses
• Some viruses are programmed to damage the computer by
damaging programs, deleting files, or reformatting the hard disk.
• Others are not designed to do any damage, but simply replicate
themselves and perhaps make their presence known by
presenting text, video, or audio messages.
112
56
10/17/2022
113
114
57
10/17/2022
giai? pha^~u
Anatomy of a Worm
• The enabling vulnerability
• A worm installs itself using an exploit vector on a vulnerable
system.
• Propagation mechanism
• After gaining access to devices, a worm replicates and selects
new targets.
• Payload
• Once the device is infected with a worm, the attacker has
access to the host – often as a privileged user.
• Attackers could use a local exploit to escalate their privilege
level to administrator.
115
116
58
10/17/2022
Trojan Horse
• A Trojan horse is a program that appears, to the user, to perform a
desirable function but, in fact, facilitates unauthorized access to the
user's computer system.
• Trojan horses may appear to be useful or interesting programs, or at the
very least harmless to an unsuspecting user, but are actually harmful
when executed.
• Trojan horses are not self-replicating which distinguishes them from
viruses and worms.
117
118
59
10/17/2022
• Probe phase:
• Vulnerable targets are identified using ping scans.
• Application scans are used to identify operating systems and vulnerable software.
• Hackers obtain passwords using social engineering, dictionary attack, brute-force, or network sniffing.
xa^m nha^.p
• Penetrate phase:
• Exploit code is transferred to the vulnerable target.
• Goal is to get the target to execute the exploit code through an attack vector, such as a buffer overflow, ActiveX or
Common Gateway Interface (CGI) vulnerabilities, or an email virus.
• Persist phase:
• After the attack is successfully launched in the memory, the code tries to persist on the target system.
• Goal is to ensure that the attacker code is running and available to the attacker even if the system reboots.
• Achieved by modifying system files, making registry changes, and installing new code.
• Propagate phase:
• The attacker attempts to extend the attack to other targets by looking for vulnerable neighboring machines.
• Propagation vectors include emailing copies of the attack to other systems, uploading files to other systems using file
shares or FTP services, active web connections, and file transfers through Internet Relay Chat.
te^ lie^.t
• Paralyze phase:
• Actual damage is done to the system.
• Files can be erased, systems can crash, information can be stolen, and distributed DDoS attacks can be launched.
119
120
60
10/17/2022
121
122
61
10/17/2022
Worms - Mitigation
• Containment Phase:
• Limit the spread of a worm infection to areas of the network
that are already affected.
chia ngan
• Compartmentalize and segment the network to slow down or
stop the worm to prevent currently infected hosts from
targeting and infecting other systems.
• Use both outgoing and incoming ACLs on routers and firewalls
at control points within the network.
tie^m chung?
• Inoculation Phase:
• Runs parallel to or subsequent to the containment phase.
• All uninfected systems are patched with the appropriate
vendor patch for the vulnerability. tuoc' doat.
• The inoculation process further deprives the worm of any
available targets.
123
Worms - Mitigation
• Quarantine Phase:
• Track down and identify infected machines within the
contained areas and disconnect, block, or remove them.
• This isolates these systems appropriately for the Treatment
Phase.
• Treatment Phase:
• Actively infected systems are disinfected of the worm.
• Terminate the worm process, remove modified files or system
settings that the worm introduced, and patch the vulnerability
the worm used to exploit the system.
• In more severe cases, completely reinstalling the system to
ensure that the worm and its by products are removed.
124
62
10/17/2022
125
Types of Attacks
• There are four categories of attacks:
• Malicious Code: Viruses, Worms and Trojan Horses
trinh sat
• Reconnaissance Attacks
• Access Attacks
• Denial of Service (DoS) Attacks
126
63
10/17/2022
Reconnaissance A reconnaissance attack is a type of security attack that an attacker uses to gather all
possible information about the target before launching an actual attack. An attacker uses a
reconnaissance attack as a preparation tool for an actual attack.
127
128
64
10/17/2022
129
130
65
10/17/2022
131
Packet Sniffing
• Some network applications (FTP, Telnet, TFTP, SNMP, …)
distribute network packets in plaintext.
• The packets can be processed and understood by
packet sniffing applications.
• Numerous freeware and shareware packet sniffers are
available that do not require the user to understand
anything about the underlying protocols.
132
66
10/17/2022
Types of Attacks
• There are four categories of attacks:
• Malicious Code: Viruses, Worms and Trojan Horses
• Reconnaissance Attacks
• Access Attacks
• Denial of Service (DoS) Attacks
133
Access Attacks
• Access attacks exploit known vulnerabilities in authentication
services, FTP services, and web services to gain entry to web
accounts, confidential databases, and other sensitive information
for these reasons:
• Retrieve data
• Gain access
• Escalate their access privileges
134
67
10/17/2022
Access Attacks
• Access attacks can be performed in a number of different ways,
including:
• Password attacks
• Trust exploitation
• Port redirection
• Man-in-the-middle attacks
• Buffer overflow
135
Password Attacks
• Hackers implement password attacks using the following:
• Brute-force attacks
• Trojan horse programs
• IP spoofing
• Packet sniffers
136
68
10/17/2022
137
Trust Exploitation
• Trust exploitation refers to an individual taking advantage of a
trust relationship within a network.
• An example of when trust exploitation takes place is when a
perimeter network is connected to a corporate network.
• These network segments often contain DNS, SMTP, and
HTTP servers.
• Because these servers all reside on the same segment,
a compromise of one system can lead to the
compromise of other systems if those other systems also
trust systems that are attached to the same network.
138
69
10/17/2022
Trust Exploitation
• Another example of trust exploitation is a Demilitarized Zone
(DMZ) host that has a trust relationship with an inside host that is
connected to the inside firewall interface.
• The inside host trusts the DMZ host.
• When the DMZ host is compromised, the attacker can
leverage that trust relationship to attack the inside host.
ta^n. dung.
139
Trust Exploitation
• A hacker leverages existing trust relationships.
• Several trust models exist:
• Windows:
• Domains
• Active directory
• Linux and UNIX:
• NIS
• NIS+
140
70
10/17/2022
Port Redirection
• A port redirection attack is a type of trust exploitation attack that
uses a compromised host to pass traffic through a firewall that
would otherwise have been dropped.
• Port redirection bypasses the firewall rule sets by
changing the normal source port for a type of network
traffic.
• You can mitigate port redirection by using proper trust
models that are network-specific.
• Assuming a system is under attack, an IPS can help
detect a hacker and prevent installation of such utilities
on a host.
141
Port Redirection
142
71
10/17/2022
“Man-in-the-Middle” Attacks
• Man-in-the-middle attacks have these purposes:
• Theft of information
• Hijacking of an ongoing session to gain access to your
internal network resources
• Traffic analysis to obtain information about your network
and network users
• DoS
• Corruption of transmitted data
• Introduction of new information into network sessions
• An example of a man-in-the-middle attack is when someone
working for your ISP gains access to all network packets that
transfer between your network and any other network.
143
Types of Attacks
• There are four categories of attacks:
• Malicious Code: Viruses, Worms and Trojan Horses
• Reconnaissance Attacks
• Access Attacks
• Denial of Service (DoS) Attacks
144
72
10/17/2022
145
DoS Attacks
146
73
10/17/2022
Denial-of-Service Facts
147
Denial-of-Service Example
148
74
10/17/2022
149
150
75
10/17/2022
151
152
76
10/17/2022
153
154
77
10/17/2022
155
156
78
10/17/2022
DoS - Viruses/Worms
157
158
79
10/17/2022
159
160
80
10/17/2022
161
Ping of death
• Legacy attack that sent an echo request in an IP packet larger
than the maximum packet size of 65,535 bytes.
• Sending a ping of this size can crash the target
computer.
• A variant of this attack is to crash a system by sending ICMP
fragments, which fill the reassembly buffers of the target.
162
81
10/17/2022
163
164
82
10/17/2022
165
166
83
10/17/2022
Reconnaissance Attacks -
Countermeasures
167
168
84
10/17/2022
169
170
85
10/17/2022
171
172
86
10/17/2022
Man-in-the-Middle Mitigation
• Man-in-the-middle attacks can be effectively mitigated only
through the use of cryptography (encryption).
IPSec tunnel
Host A Host B
173
174
87
10/17/2022
175
176
88
10/17/2022
10 Best Practices
1. Keep patches up to date by installing them weekly or daily, if possible,
to prevent buffer overflow and privilege escalation attacks.
2. Shut down unnecessary services and ports.
3. Use strong passwords and change them often.
4. Control physical access to systems.
5. Avoid unnecessary web page inputs.
• Some websites allow users to enter usernames and passwords.
• A hacker can enter more than just a username.
• For example, entering "jdoe; rm -rf /" might allow an attacker
to remove the root file system from a UNIX server.
• Programmers should limit input characters and not accept
invalid characters such as | ; < > as input.
177
10 Best Practices
6. Perform backups and test the backed up files on a regular basis.
7. Educate employees about the risks of social engineering, and develop
strategies to validate identities over the phone, via email, or in person.
• http://www.networkworld.com/news/2010/091610-social-
networks.html?source=NWWNLE_nlt_daily_pm_2010-09-16
• http://searchsecurity.techtarget.com/news/1519804/Phishing-
attacks-target-users-of-Facebook-other-social-
networks?asrc=EM_NLN_12420860&track=NL-
102&ad=784799&
8. Encrypt and password-protect sensitive data.
9. Implement security hardware and software such as firewalls, IPSs,
virtual private network (VPN) devices, anti-virus software, and content
filtering.
10. Develop a written security policy for the company.
178
89
10/17/2022
179
180
90
10/17/2022
Hacking a Network
• The goal of any hacker is to compromise the intended target or
application.
• Hackers begin with little or no information about the intended target.
• Their approach is always careful and methodical—never rushed and
never reckless.
• The seven-step process outlined on the next slide is a good
representation of the method that hackers use – and a starting point for
an analysis of how to defeat it.
181
182
91
10/17/2022
183
184
92
10/17/2022
185
Software Tools
• A great deal of hacker tools are available:
• Netcat: Netcat is a featured networking utility that reads and
writes data across network connections using the TCP/IP
protocol.
• Microsoft EPDump and Remote Procedure Call (RPC) Dump:
These tools provide information about Microsoft RPC services
on a server:
• The Microsoft EPDump application shows what is running and waiting
on dynamically assigned ports.
• The RPC Dump (rpcdump.exe) application is a command-line tool that
queries RPC endpoints for status and other information on RPC.
• GetMAC: This application provides a quick way to find the MAC
(Ethernet) layer address and binding order for a computer
running Microsoft Windows 2000 locally or across a network.
• Software development kits (SDKs): SDKs provide hackers with
the basic tools that they need to learn more about systems.
186
93
10/17/2022
187
• Recommended reading:
• “The Art of Deception: Controlling the
Human Element of Security”
• Mitnik, KD and Simon, WL; Wiley; New Ed
edition
188
94
10/17/2022
189
190
95
10/17/2022
191
192
96
10/17/2022
193
Password Cracking
• Hackers use many tools and techniques to crack passwords:
• Word lists
• Brute force
• Hybrids
• The yellow Post-It stuck on the side of the monitor, or in top of desk
drawer
• Password cracking attacks any application or service that accepts user
authentication, including those listed here:
• NetBIOS over TCP (TCP 139)
• Direct host (TCP 445)
• FTP (TCP 21)
• Telnet (TCP 23)
• SNMP (UDP 161)
• PPTP (TCP 1723)
• Terminal services (TCP 3389)
194
97
10/17/2022
195
196
98
10/17/2022
197
198
99
10/17/2022
199
Q&A
200
100