1 / 18

Internet Security ( INFO 1370) Detailed Objectives 1,2,3

Internet Security ( INFO 1370) Detailed Objectives 1,2,3. Rich Hildred rhildred@conestogac.on.ca 519-594-0900. Objectives. Internet Service Provider’s Setup Describe an Internet Service Provider’s setup. List equipment components of Internet connectivity.

allan
Download Presentation

Internet Security ( INFO 1370) Detailed Objectives 1,2,3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Security(INFO 1370) Detailed Objectives 1,2,3 Rich Hildred rhildred@conestogac.on.ca 519-594-0900

  2. Objectives • Internet Service Provider’s Setup • Describe an Internet Service Provider’s setup. • List equipment components of Internet connectivity. • Define DNS & IP addresses and their application. • Discuss user software applications.

  3. Describe an ISP’s setup

  4. Components of Connectivity

  5. DNS and IP Addresses

  6. Application Layer

  7. Objectives (2) • Operating Systems & Programming Languages • Distinguish between operating systems and programming languages. • Discuss operating systems and Internet security. • Define TCP/IP. • Explain protocols.

  8. os/ programming languages

  9. os/programming language (2)

  10. OS and Internet Security

  11. Define TCP/IP

  12. Protocols • Application • DHCPDHCPv6DNSFTPHTTPIMAPIRCLDAPMGCPNNTPBGPNTPPOPRPCRTPRTSPRIPSIPSMTPSNMPSOCKSSSHTelnetTLS/SSLXMPP • Transport • TCPUDPDCCPSCTPRSVP • Internet • IPIPv4IPv6ICMPICMPv6ECNIGMPIpsec • Link • ARP/InARPNDPOSPFTunnelsL2TPPPPMedia access controlEthernetDSLISDNFDDI

  13. Objectives (3) • Security Concepts • Explain security concepts as applied to hackers and crackers. • Review case studies of penetrated systems. • Discuss Internet warfare. • Explain destructive devices.

  14. Hackers and Crackers White Hat, Black Hat, Grey Hat, Blue Hat Elite, Script Kiddie, Noob Hacktivist Nation State Organized Crime Bots

  15. Cases of Penetrated Systems 1. Heartland Payment Systems Date: March 2008 Impact: 134 million credit cards exposed through SQL injection to install spyware on Heartland's data systems. 7. Sony's PlayStation Network Date: April 20, 2011 Impact: 77 million PlayStation Network accounts hacked; Sony is said to have lost millions while the site was down for a month.

  16. Internet Warfare Estonia – denial of service 5. Stuxnet Date: Sometime in 2010, but origins date to 2007 Impact: Meant to attack Iran's nuclear power program, but will also serve as a template for real-world intrusion and service disruption of power grids, water supplies or public transportation systems.

  17. Destructive Software Devices Viruses Infectious programs that can reproduce themselves but require interaction to propagate. Worms Infectious programs that can self-propagate via a network. Rootkits and back doors Programs designed to infiltrate a system, hide their own presence, and provide administrative control and monitoring functionality to an unauthorized user or attacker.

  18. Destructive Software Devices -2 Bots and zombies Very similar to rootkits and back doors but focused additionally on usurping the victim system’s resources to perform a specifictask or tasks (for example, distributed denial of service against an unrelated target or send spam). Trojan horses Software that does something other than, or in addition to, its purported functionality. Usually, this means installing a rootkit or back door.

More Related