DOC PREVIEW
CMU 15441 Computer Networking - lecture 21-security

This preview shows page 1-2-3-25-26-27-28-50-51-52 out of 52 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 52 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Network SecurityA Brief History of the WorldOverviewWhat is “Security”Slide 5Slide 6Slide 7Why do we need security?Who is vulnerable?Common security attacks and their countermeasuresFirewallsSlide 12Slide 13Slide 14Slide 15Slide 16Intrusion DetectionSlide 18Minor Detour…Dictionary AttackDenial of ServiceSlide 22Slide 23Slide 24Slide 25Slide 26Slide 27Slide 28Slide 29TCP AttacksSlide 31Slide 32Slide 33Slide 34Slide 35Slide 36Slide 37Slide 38Slide 39Slide 40Five Minute BreakPacket SniffingSlide 43Slide 44Slide 45Social ProblemsSlide 47Slide 48Slide 49Slide 50ConclusionsSecurity related URLs15-441 Networks Fall 2002 1Network SecurityJustin [email protected] Networks Fall 2002 2A Brief History of the World15-441 Networks Fall 2002 3OverviewWhat is security?Why do we need security?Who is vulnerable?Common security attacks and countermeasures–Firewalls & Intrusion Detection Systems–Denial of Service Attacks–TCP Attacks–Packet Sniffing–Social Problems15-441 Networks Fall 2002 4What is “Security”Dictionary.com says:–1. Freedom from risk or danger; safety.–2. Freedom from doubt, anxiety, or fear; confidence.–3. Something that gives or assures safety, as:•1. A group or department of private guards: Call building security if a visitor acts suspicious.•2. Measures adopted by a government to prevent espionage, sabotage, or attack.•3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.…etc.15-441 Networks Fall 2002 5What is “Security”Dictionary.com says:–1. Freedom from risk or danger; safety.–2. Freedom from doubt, anxiety, or fear; confidence.–3. Something that gives or assures safety, as:•1. A group or department of private guards: Call building security if a visitor acts suspicious.•2. Measures adopted by a government to prevent espionage, sabotage, or attack.•3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.…etc.15-441 Networks Fall 2002 6What is “Security”Dictionary.com says:–1. Freedom from risk or danger; safety.–2. Freedom from doubt, anxiety, or fear; confidence.–3. Something that gives or assures safety, as:•1. A group or department of private guards: Call building security if a visitor acts suspicious.•2. Measures adopted by a government to prevent espionage, sabotage, or attack.•3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.…etc.15-441 Networks Fall 2002 7What is “Security”Dictionary.com says:–1. Freedom from risk or danger; safety.–2. Freedom from doubt, anxiety, or fear; confidence.–3. Something that gives or assures safety, as:•1. A group or department of private guards: Call building security if a visitor acts suspicious.•2. Measures adopted by a government to prevent espionage, sabotage, or attack.•3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.…etc.15-441 Networks Fall 2002 8Why do we need security?Protect vital information while still allowing access to those who need it–Trade secrets, medical records, etc.Provide authentication and access control for resources–Ex: AFSGuarantee availability of resources–Ex: 5 9’s (99.999% reliability)15-441 Networks Fall 2002 9Who is vulnerable?Financial institutions and banksInternet service providersPharmaceutical companiesGovernment and defense agenciesContractors to various government agenciesMultinational corporationsANYONE ON THE NETWORK15-441 Networks Fall 2002 10Common security attacks and their countermeasuresFinding a way into the network–FirewallsExploiting software bugs, buffer overflows–Intrusion Detection SystemsDenial of Service–Ingress filtering, IDSTCP hijacking–IPSecPacket sniffing–Encryption (SSH, SSL, HTTPS)Social problems–Education15-441 Networks Fall 2002 11FirewallsBasic problem – many network applications and protocols have security problems that are fixed over time–Difficult for users to keep up with changes and keep host secure–Solution•Administrators limit access to end hosts by using a firewall•Firewall is kept up-to-date by administrators15-441 Networks Fall 2002 12FirewallsA firewall is like a castle with a drawbridge–Only one point of access into the network–This can be good or badCan be hardware or software–Ex. Some routers come with firewall functionality–ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls15-441 Networks Fall 2002 13FirewallsIntranetDMZInternetFirewallFirewallWeb server, email server, web proxy, etc15-441 Networks Fall 2002 14FirewallsUsed to filter packets based on a combination of features–These are called packet filtering firewalls•There are other types too, but they will not be discussed–Ex. Drop packets with destination port of 23 (Telnet)–Can use any combination of IP/UDP/TCP header information–man ipfw on unix47 for much more detailBut why don’t we just turn Telnet off?15-441 Networks Fall 2002 15FirewallsHere is what a computer with a default Windows XP install looks like:–135/tcp open loc-srv–139/tcp open netbios-ssn–445/tcp open microsoft-ds–1025/tcp open NFS-or-IIS–3389/tcp open ms-term-serv–5000/tcp open UPnPMight need some of these services, or might not be able to control all the machines on the network15-441 Networks Fall 2002 16FirewallsWhat does a firewall rule look like?–Depends on the firewall usedExample: ipfw–/sbin/ipfw add deny tcp from cracker.evil.org to wolf.tambov.su telnetOther examples: WinXP & Mac OS X have built in and third party firewalls–Different graphical user interfaces–Varying amounts of complexity and power15-441 Networks Fall 2002 17Intrusion DetectionUsed to monitor for “suspicious activity” on a network–Can protect against known software exploits, like buffer overflowsOpen Source IDS: Snort, www.snort.org15-441 Networks Fall 2002 18Intrusion DetectionUses “intrusion signatures”–Well known patterns of behavior•Ping sweeps, port scanning, web server indexing, OS fingerprinting, DoS attempts, etc.Example–IRIX


View Full Document

CMU 15441 Computer Networking - lecture 21-security

Documents in this Course
Lecture

Lecture

14 pages

Lecture

Lecture

19 pages

Lecture

Lecture

14 pages

Lecture

Lecture

78 pages

Lecture

Lecture

35 pages

Lecture

Lecture

4 pages

Lecture

Lecture

4 pages

Lecture

Lecture

29 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

44 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

13 pages

Lecture

Lecture

47 pages

Lecture

Lecture

49 pages

Lecture

Lecture

7 pages

Lecture

Lecture

18 pages

Lecture

Lecture

15 pages

Lecture

Lecture

74 pages

Lecture

Lecture

35 pages

Lecture

Lecture

17 pages

lecture

lecture

13 pages

Lecture

Lecture

21 pages

Lecture

Lecture

14 pages

Lecture

Lecture

53 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

20 pages

Lecture

Lecture

39 pages

Lecture

Lecture

10 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

lecture

lecture

11 pages

lecture

lecture

7 pages

Lecture

Lecture

10 pages

lecture

lecture

46 pages

lecture

lecture

7 pages

Lecture

Lecture

8 pages

lecture

lecture

55 pages

lecture

lecture

45 pages

lecture

lecture

47 pages

lecture

lecture

39 pages

lecture

lecture

33 pages

lecture

lecture

38 pages

lecture

lecture

9 pages

midterm

midterm

16 pages

Lecture

Lecture

39 pages

Lecture

Lecture

14 pages

Lecture

Lecture

46 pages

Lecture

Lecture

8 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

9 pages

Lab

Lab

3 pages

Lecture

Lecture

53 pages

Lecture

Lecture

51 pages

Lecture

Lecture

38 pages

Lecture

Lecture

42 pages

Lecture

Lecture

49 pages

Lecture

Lecture

63 pages

Lecture

Lecture

7 pages

Lecture

Lecture

51 pages

Lecture

Lecture

35 pages

Lecture

Lecture

29 pages

Lecture

Lecture

65 pages

Lecture

Lecture

47 pages

Lecture

Lecture

41 pages

Lecture

Lecture

41 pages

Lecture

Lecture

32 pages

Lecture

Lecture

35 pages

Lecture

Lecture

15 pages

Lecture

Lecture

52 pages

Lecture

Lecture

16 pages

Lecture

Lecture

4 pages

lecture

lecture

27 pages

lecture04

lecture04

46 pages

Lecture

Lecture

46 pages

Lecture

Lecture

13 pages

lecture

lecture

41 pages

lecture

lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

Lecture

Lecture

38 pages

lecture

lecture

11 pages

Lecture

Lecture

42 pages

Lecture

Lecture

12 pages

Lecture

Lecture

36 pages

Lecture

Lecture

46 pages

Lecture

Lecture

35 pages

Lecture

Lecture

34 pages

Lecture

Lecture

9 pages

lecture

lecture

49 pages

class03

class03

39 pages

Lecture

Lecture

8 pages

Lecture 8

Lecture 8

42 pages

Lecture

Lecture

20 pages

lecture

lecture

29 pages

Lecture

Lecture

9 pages

lecture

lecture

46 pages

Lecture

Lecture

12 pages

Lecture

Lecture

24 pages

Lecture

Lecture

41 pages

Lecture

Lecture

37 pages

lecture

lecture

59 pages

Lecture

Lecture

47 pages

Lecture

Lecture

34 pages

Lecture

Lecture

38 pages

Lecture

Lecture

28 pages

Exam

Exam

17 pages

Lecture

Lecture

21 pages

Lecture

Lecture

15 pages

Lecture

Lecture

9 pages

Project

Project

20 pages

Lecture

Lecture

40 pages

L13b_Exam

L13b_Exam

17 pages

Lecture

Lecture

48 pages

Lecture

Lecture

10 pages

Lecture

Lecture

52 pages

21-p2p

21-p2p

16 pages

lecture

lecture

77 pages

Lecture

Lecture

18 pages

Lecture

Lecture

62 pages

Lecture

Lecture

25 pages

Lecture

Lecture

24 pages

Project

Project

20 pages

Lecture

Lecture

47 pages

Lecture

Lecture

38 pages

Lecture

Lecture

35 pages

Roundup

Roundup

45 pages

Lecture

Lecture

47 pages

Lecture

Lecture

39 pages

Lecture

Lecture

13 pages

Midterm

Midterm

22 pages

Project

Project

26 pages

Lecture

Lecture

11 pages

Project

Project

27 pages

Lecture

Lecture

10 pages

Lecture

Lecture

50 pages

Lab

Lab

9 pages

Lecture

Lecture

30 pages

Lecture

Lecture

6 pages

r05-ruby

r05-ruby

27 pages

Lecture

Lecture

8 pages

Lecture

Lecture

28 pages

Lecture

Lecture

30 pages

Project

Project

13 pages

Lecture

Lecture

11 pages

Lecture

Lecture

12 pages

Lecture

Lecture

48 pages

Lecture

Lecture

55 pages

Lecture

Lecture

36 pages

Lecture

Lecture

17 pages

Load more
Download lecture 21-security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view lecture 21-security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view lecture 21-security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?