Strategii de Marketing Ale Companiilor Multi Nation Ale Pe Piata Produselor de Tutun Din Romania
Tutun Juhana Telecommunication engineering School of electrical engineering & informatics
description
Transcript of Tutun Juhana Telecommunication engineering School of electrical engineering & informatics
TUTUN JUHANA TELECOMMUNICAT ION ENGINEERING
SCHOOL OF ELECTRICAL ENGINEERING & INFORMATIC SINST ITUT TEKNOLOGI BANDUNG
ET4085/ET5085 Keamanan Jaringan Telekomunikasi
ET4085/ET5085 Telecommunication Network Security
http://wp.me/P29YQz-k
2
Security Principles
http://wp.me/P29YQz-k
3
Security is the sum of all measures taken to prevent loss of any kind
Loss can occur because of : user error defects in code malicious acts hardware failure, and acts of nature
http://www.clipartof.com
http://wp.me/P29YQz-k
4
User Errors
Deleting file(s) unintentionallyShared folders without passwordUsing weak passwords
Username: tutunPassword: tutun
Etc.
http://wp.me/P29YQz-k
5
Code Flaws
http://wp.me/P29YQz-k
6
Malicious Acts
Spywarewww.comphandyman.com
VirusSIM Cloning Carding
http://wp.me/P29YQz-k
7
Hardware failure
Denial of Service (DoS)
http://wp.me/P29YQz-k
8
Acts of nature
Denial of Service (DoS)
http://wp.me/P29YQz-k
9
Security is the antithesis of convenience
The more secure something is, the less convenient it is
http://wp.me/P29YQz-k
10
Why Computers Aren’t Secure
http://wp.me/P29YQz-k
11
Security is an annoyance
Administrators often fail to implement security features in operating systems because doing so causes problems for users
Users also circumvent security choosing easy-to-use (easy-to-guess)
passwords never changing passwords disclosing those passwords to co-workers, or
sharing user accounts. Vendors ship software so that it will
install in the most feature-filled configuration with its security features disabled so that unskilled users won’t run into roadblocks and don’t have to understand and configure it correctly before they use it The vast majority of installations are never
properly secured.
http://wp.me/P29YQz-k
12
Features are rushed to market
Vendors concentrate their efforts on adding features that make their software more useful, with little thought to security
A perfect example of this is the addition of scripting language support to Microsoft Outlook and Outlook Express. Spreading e-mail viruses
http://wp.me/P29YQz-k
13
Vendors who spend time on security are eclipsed by the competition
Customers don’t truly value security.If they did, they would use older, well-tested,
security-proven software that doesn’t have all the bells and whistles of the latest versions.
Companies like Microsoft that retrofitted their existing products to work on the Internet decimated their competition.
Had they waited to do it securely, they would have been beaten to market by someone who didn’t.
The end result? The least-secure products always get to market first and become standards.
http://wp.me/P29YQz-k
14
Computers and software evolve very quickly
Moore’s law : computer hardware will double in power every two years
Protocols that were not developed to be secure were adapted to purposes that they were never intended for and then grew in popularity to a far wider audience than the original creators could have imagined
http://wp.me/P29YQz-k
15
Programmers can’t accurately predict flaws
The programmers who created a project could never come up with the complete set of attacks that the million hackers who attempt to exploit it will
http://wp.me/P29YQz-k
16
There is little diversity in the software market
OSes Apps
IIS
Narrowing hackers targets
http://wp.me/P29YQz-k
17
Vendors are not motivated to reveal potential flaws
They hide their product’s problem
It discourage discussion of their flaws
http://wp.me/P29YQz-k
18
Patches are not widely deployed and can cause problems when they are installed
Not everyone gets the notice or installs the patch
In fact, the majority of users never install security patches for software unless they actually get hacked
http://wp.me/P29YQz-k
19
Key Principles of Network Security
http://wp.me/P29YQz-k
20
(C-I-A)confidentiality, integrity, and availability
Depending upon the application and context, one of these principles might be more important than the others.
http://wp.me/P29YQz-k
21
ConfidentialityConfidentiality is concerned with preventing
the unauthorized disclosure of sensitive information.
Confidentiality involves the protection of data providing access for those who are allowed to see it, while disallowing others from learning anything about its content
The disclosure could be intentional breaking a cipher reading the information, etc.
or it could be unintentional carelessness or incompetence of individuals
handling the information.
http://wp.me/P29YQz-k
22
Tools for Confidentiality Encryption Access Control
rules and policies that limit access to confidential information to those people and/or systems with a “need to know.”
Authentication the determination of the identity or role that someone has.
Authorization the determination if a person or system is allowed access to
resources, based on an access control policy Physical Security
http://wp.me/P29YQz-k
23
IntegrityIntegrity: the property that information
has not be altered in an unauthorized way
The goals of integrity: Prevention of the modification of
information by unauthorized users Prevention of the unauthorized or
unintentional modification of information by authorized users
http://wp.me/P29YQz-k
24
Tools for integrity Backups: the periodic archiving of data. Checksums: the computation of a function that maps
the contents of a file to a numerical value. A checksum function depends on the entire
contents of a file and is designed in a way that even a small change to the input file (such as flipping a single bit) is highly likely to result in a different output value.
Data correcting codes: methods for storing data in such a way that small changes can be easily detected and automatically corrected.
http://wp.me/P29YQz-k
25
Availability
Availability: the property that information is accessible and modifiable in a timely fashion by those authorized to do so.
Availability assures that a system’s authorized users have timely and uninterrupted access to the information in the system and to the network.
Tools: Physical protections: infrastructure meant to keep
information available even in the event of physical challenges.
Computational redundancies: computers and storage devices that serve as fallbacks in the case of failures.
http://wp.me/P29YQz-k
26
Threats and Attacks
http://wp.me/P29YQz-k
27
Eavesdropping: the interception of information intended for someone else during its transmission over a communication channel.
Trudy
http://wp.me/P29YQz-k
28
Alteration: unauthorized modification of information. Example: the man-in-the-middle attack, where a
network stream is intercepted, modified, and retransmitted.
http://wp.me/P29YQz-k
29
Denial-of-service: the interruption or degradation of a data service or information access. Example: email spam, to the degree that it is meant to
simply fill up a mail queue and slow down an email server.
http://wp.me/P29YQz-k
30
Masquerading: the fabrication of information that is purported to be from someone who is not actually the author
(really is from Trudy)
http://wp.me/P29YQz-k
31
Correlation and traceback: the integration of multiple data sources and information flows to determine the source of a particular data stream or piece of information.
http://wp.me/P29YQz-k
32
Repudiation: the denial of a commitment or data receipt. This involves an attempt to back out of a
contract or a protocol that requires the different parties to provide receipts acknowledging that data has been received.
http://wp.me/P29YQz-k
33
Understanding Hacking
http://wp.me/P29YQz-k
34
What Is Hacking?
Hacking is the attempt to gain access to a computer system without authorization.
Originally, the term hacker simply referred to an adept computer user, and gurus still use the term to refer to themselves in that original sense.
But when breaking into computer systems (technically known as cracking) became popular, the media used the hacker to refer only to computer criminals, thus popularizing only the negative connotation.
http://wp.me/P29YQz-k
35
Types of Hackers
There are only two serious types of hackers the underemployed and those hackers being paid by someone to hack.
Hackers fall quite specifically into these categories, in order of increasing threat: Security experts Script kiddies Underemployed adults Ideological hackers Criminal hackers Corporate spies Disgruntled employees
http://wp.me/P29YQz-k
36
Phreak
Phreaks are hackers with an interest in telephones and telephone systems
Phreak is short for phone phreak
http://wp.me/P29YQz-k
37
Vectors That Hackers Exploit
Connecting over the Internet
By using a computer on your network directly
By dialing in via a Remote Access Service (RAS)
serverBy connecting via anonsecure wireless network
http://wp.me/P29YQz-k
38
Black or White?
http://wp.me/P29YQz-k
39
Kevin Mitnick
was"America's Most Wanted Computer
Outlaw“served five years in prison (four years of it pre-trial), 8 months of that in solitary
confinement, and was released on January 21, 2000
He says: the solitary confinement was very difficult.
Nowfounder of Mitnick Security Consulting,a security firm that offers corporations and agencies, services to better protect themselves against intrusions and attackers.
http://wp.me/P29YQz-k
40
Kristina Svechinskaya
If convicted, she could be imprisoned for up to 40 years