SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Module 3: Information & Network Detection
Chapter-1 Access Control & Intrusion detection
1. Overview of Identification & Authorization
2. Overview of IDS
3. Intrusion Detection Systems & Intrusion Prevention Systems
1. Overview of Identification & Authorization:
 Identification:
 Identification is nothing more than claiming you are somebody.
 Example: While talking on telephone, person specifies his/her identity that is
I am Ram.
 An identity is equivalent to the knowledge of a specific piece of data:
 Authentication:
 Authentication is how one proves that they are who they say they are.
 It is a secret between you and the system.
 Example: Logging to gmail Account.
 Authorization
 Authorization is what takes place after a person has been both identified and
authenticated; it’s the step determines what a person can then do on the
system.
 Example: someone knocking on your door at night.
 Difference between identification, Authentication & Authorization:
o Identification: means who
o Authentication: means verification
o Authorization: means rights the person has
2. Overview of IDS:
 IDS stand for Intrusion detection system.
 Intrusion means an illegal act of entering, seizing, or taking possession of another's
property.
 An intrusion detection system (IDS) is a device or software application that monitors
network or system activities for malicious activities or policy violations.
 All Intrusion Detection Systems use one of two detection techniques:
o Statistical anomaly-based IDS (Anomaly detection)
o Signature-based IDS (Misuse detection)
 Signature-based IDS (Misuse detection):
o Example: Biometric attendance
o Disadvantage: signature database must be continually updated.
 Statistical anomaly-based IDS (Anomaly detection):
o An IDS which is anomaly based will monitor network traffic and compare it
against an established baseline.
o Example: Credit card
 Network-based Intrusion Detection System (NIDS):
o A network-based intrusion detection system (NIDS) is used to monitor and
analyze network traffic to protect a system from network-based threats.
o A NIDS reads all inbound packets and searches for any suspicious patterns.
o This is generally accomplished by placing the network interface card (NIC) to
capture all network traffic that crosses its network.
o It involves looking at the packets on the network as they pass by some sensor.
o The sensor can only see the packets that happen to be carried on the network
segment it’s attached to.
o Once the attack is identified, or abnormal behaviour is sensed, the alert can be
sent to the administrator.
 Host-based Intrusion Detection System (HIDS):
o Host intrusion detection systems run on individual hosts or devices on the
network.
o A HIDS monitors the inbound and outbound packets from the device only and
will alert the user or administrator if suspicious activity is detected.
o Use OS based monitoring to find intrusion.
o Log all relevant system events (e.g., file/device accesses)
o Monitor shell commands and system calls executed by user applications and
system programs.
3. Intrusion Prevention Systems: (IPS)
o Intrusion prevention systems (IPS), also known as intrusion detection and
prevention systems (IDPS).
o The main functions of intrusion prevention systems are to identify malicious
activity, log information about this activity, attempt to block/stop it, and report
it.
o Intrusion prevention systems can be classified into four different types:
i. Network-based intrusion prevention system (NIPS): monitors the
entire network for suspicious traffic by analyzing protocol activity.
ii. Wireless intrusion prevention systems (WIPS): monitor a wireless
network for suspicious traffic by analyzing wireless networking
protocols.
iii. Network behaviour analysis (NBA): examines network traffic to identify
threats that generate unusual traffic flows, such as certain forms of
malware and policy violations.
iv. Host-based intrusion prevention system (HIPS): an installed software
package which monitors a single host for suspicious activity by analyzing
events occurring within that host.
Chapter-2 Server Management & Firewalls
1. User Management
2. Overview of firewalls
3. Types of firewalls
4. DMZ & firewall features
1. Overview of firewalls:
o It controls the incoming and outgoing network traffic based on an applied rule
set.
o A firewall establishes a barrier between a trusted, secure internal network and
another network (e.g., the Internet).
o All messages entering or leaving the intranet pass through the firewall.
o Firewalls can be implemented in both hardware and software.
2. Types of firewalls:
 There are several types of firewall techniques that will prevent potentially harmful
information from getting through:
o packet filters
o Stateful firewall
o Application-layer firewall
o Proxy firewall
1. Packet filters:
a. First firewall that inspecting the packets that are transferred between
computers on the Internet.
b. When a packet passes through a packet-filter firewall, its source and
destination address, protocol, and destination port number are checked
against the firewall's rule set.
2. Stateful firewall:
a. It records all connections passing through it and determines whether a
packet is the start of a new connection, a part of an existing connection,
or not part of any connection.
b. If a packet does not match an existing connection, it's evaluated
according to the rule set for new connections.
3. Application-layer firewall:
a. The key benefit of application-layer filtering is the ability to block
specific content, such as known malware or certain websites, and
recognize when certain applications and protocols -- such as HTTP, FTP
and DNS -- are being misused.
4. Proxy firewall:
a. Intercepts all messages entering and leaving the network.
b. The proxy server effectively hides the true network addresses.
c. A proxy firewall prevents direct connections between either sides of the
firewall.
4. DMZ & firewall features:
 Firewall features:
1. Protects the user from unwanted incoming connection attempts.
2. Allows the user to control which programs can and cannot access the local
network and/or Internet and provide the user with information about an
application that makes a connection attempt
3. Block or alert the user about outgoing connection attempts
4. Hide the computer from network traffic
5. Monitor applications that are listening for incoming connections
6. Monitor and regulate all incoming and outgoing Internet users
7. Prevent unwanted network traffic from locally installed applications
 DMZ (De militarized Zone) or Perimeter Network
o It is a computer host or small network inserted as a "neutral zone" between
a company's private network and the outside public network.
o It prevents outside users from getting direct access to a server that has
company data.
o A DMZ is an optional and more secure approach to a firewall and effectively
acts as a proxy server as well.
o Hosts in the DMZ are permitted to have only limited connectivity to specific
hosts in the internal network.
o The purpose of a DMZ is to add an additional layer of security to an
organization's Local Area Network (LAN).
Chapter-3 Security for VPN & Next Generation Techniques
1. VPN Security
2. Security in Multimedia Networks
3. Various Computing platforms: HPC, cluster & Computing Grids
4. Virtualization & cloud technology & security
1. VPN:
o VPN stand for Virtual private network.
o A firewall protects your data on your computer, VPNs protect it online.
o A virtual private network (VPN) extends a private network across a public
network, such as the Internet.
o It enables a computer or Wi-Fi-enabled device to send and receive data across
shared or public networks as if it were directly connected to the private
network.
o VPNs allow employees to securely access their company's intranet while
travelling outside the office.
o VPNs securely connect geographically separated offices of an organization,
creating one cohesive network.
VPN Security:
o To prevent disclosure of private information, VPNs typically allow only
authenticated remote access and make use of encryption techniques.
o The VPN security model provides:
 Confidentiality : an attacker would only see encrypted data.
 Sender authentication to prevent unauthorized users from accessing
the VPN.
 Message integrity to detect any instances of tampering with
transmitted messages.
o Secure VPN protocols include the following:
 Internet Protocol Security (IPsec):
 It is developed for IPv6.
 Its design meets most security goals: authentication,
integrity, and confidentiality.
 IPsec uses encryption, encapsulating an IP packet inside an
IPsec packet. De-encapsulation happens at the end of the
tunnel, where the original IP packet is decrypted and
forwarded to its intended destination.
 Secure Sockets Layer (SSL) and Transport Layer Security (TLS):
 These protocols operate using a handshake method.
 This handshake produces the cryptographic parameters of
the session."
 These parameters, typically digital certificates, are the means
by which the two systems exchange encryption keys,
authenticate the session, and create the secure connection.
 Point-to-Point Tunnelling Protocol (PPTP):
 Secure Shell (SSH):
 SSH creates both the VPN tunnel and the encryption that
protects it.
 This allows users to transfer unsecured data by routing the
traffic from remote fileservers through an encrypted
channel.
 The data itself isn't encrypted but the channel it’s moving
through is.
2. Security in Multimedia Networks:
 Definition of multimedia:
o Multimedia is an integration of text, graphics, still and moving images,
animation, sounds, and any other medium where every type of information can
be represented, stored, transmitted.
o It involves transmission and distribution of multimedia information on the
network.
o Sample applications: videoconferencing, web video broadcasting, multimedia
Email, etc.
4. Various Computing platforms: HPC, cluster & Computing Grids:
 HPC: (High Performance Computing)
o High Performance Computing (HPC) allows scientists and engineers to
solve complex science, engineering, and business problems using
applications that require high bandwidth, low latency networking, and
very high compute capabilities.
o High performance computers of interest to small and medium-sized
businesses today are really clusters of computers.
o HPC people often refer to the individual computers in a cluster as nodes.
o A cluster of interest to a small business could have as few as four nodes.
o Task is carried out in distributed environment.
o Sometimes HPC is also called as parallel processing.
o HPC can be carried out in 2 ways:
 Cluster Computing
 Grid Computing
o Cluster Computing:
 Cluster is homogenous.
 Cluster computers all have the same hardware and OS.
 Computers in the cluster are normally contained in a single
location.
 In case of Cluster, the whole system (all nodes) behaves like a
single system view and resources are managed by centralized
resource manager.
o Grid Computing:
 Grids are heterogeneous.
 The computers that are part of a grid can run different operating
systems and have different hardware.
 Grids are inherently distributed by its nature over a LAN,
metropolitan or WAN.
 In case of Grid, every node is autonomous i.e. it has its own
resource manager and behaves like an independent entity.
5. Virtualization & cloud technology & security:
 Virtualization:
i. Refers to the act of creating a virtual (rather than actual) version of
something, including but not limited to a virtual computer hardware
platform, operating system (OS), storage device, or computer network
resources.
ii. The term virtual machine essentially describes sharing the resources
of one single physical computer into various computers within itself.
iii. Virtualization differs from cloud computing because virtualization is
software that manipulates hardware, while cloud computing refers to
a service that results from that manipulation.
 Cloud computing:
i. It is computing in which large groups of remote servers are networked
to allow centralized data storage and online access to computer
services or resources.
ii. Example : Email Communication
iii. Bringing VMs (virtual machines) onto the cloud.
iv. Cloud computing relies on sharing of resources.
v. Organizations use the Cloud in a variety of different service models
(SaaS, PaaS, and IaaS)
 Cloud Security:
o Cloud security is sub-domain of computer security, network security, and,
information security.
o Identity management :
 Every enterprise will have its own identity management system to
control access to information and computing resources.
o Physical security:
 Essential supplies (such as electricity), theft, fires, floods are sufficiently
robust to minimize the possibility of disruption.
o Personnel security:
 Employment activities such as security monitoring and supervision,
disciplinary procedures, service level agreements, codes of conduct,
policies etc.
o Availability:
o Application security:
o Privacy:
 Providers ensure that all critical data (credit card numbers, for example)
are masked or encrypted (even better) and that only authorized users
have access to data in its entirety.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet BawaPuneet Bawa
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDSMAURICE NTAHOBARI
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 

Was ist angesagt? (18)

Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
The vpn
The vpnThe vpn
The vpn
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDS
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
firewalls
firewallsfirewalls
firewalls
 
Web Security
Web SecurityWeb Security
Web Security
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 

Ähnlich wie Introduction to Cyber security module - III

CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter SecuritySam Bowne
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdfAschalewAyele2
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMBhushan Gajare
 
System and web security
System and web securitySystem and web security
System and web securitychirag patil
 

Ähnlich wie Introduction to Cyber security module - III (20)

CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Network security
Network securityNetwork security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
 
G011123539
G011123539G011123539
G011123539
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEM
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
System and web security
System and web securitySystem and web security
System and web security
 

Kürzlich hochgeladen

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Kürzlich hochgeladen (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

Introduction to Cyber security module - III

  • 1. Module 3: Information & Network Detection Chapter-1 Access Control & Intrusion detection 1. Overview of Identification & Authorization 2. Overview of IDS 3. Intrusion Detection Systems & Intrusion Prevention Systems 1. Overview of Identification & Authorization:  Identification:  Identification is nothing more than claiming you are somebody.  Example: While talking on telephone, person specifies his/her identity that is I am Ram.  An identity is equivalent to the knowledge of a specific piece of data:  Authentication:  Authentication is how one proves that they are who they say they are.  It is a secret between you and the system.  Example: Logging to gmail Account.  Authorization  Authorization is what takes place after a person has been both identified and authenticated; it’s the step determines what a person can then do on the system.  Example: someone knocking on your door at night.  Difference between identification, Authentication & Authorization: o Identification: means who o Authentication: means verification o Authorization: means rights the person has 2. Overview of IDS:  IDS stand for Intrusion detection system.  Intrusion means an illegal act of entering, seizing, or taking possession of another's property.  An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations.  All Intrusion Detection Systems use one of two detection techniques: o Statistical anomaly-based IDS (Anomaly detection) o Signature-based IDS (Misuse detection)
  • 2.  Signature-based IDS (Misuse detection): o Example: Biometric attendance o Disadvantage: signature database must be continually updated.  Statistical anomaly-based IDS (Anomaly detection): o An IDS which is anomaly based will monitor network traffic and compare it against an established baseline. o Example: Credit card  Network-based Intrusion Detection System (NIDS): o A network-based intrusion detection system (NIDS) is used to monitor and analyze network traffic to protect a system from network-based threats. o A NIDS reads all inbound packets and searches for any suspicious patterns. o This is generally accomplished by placing the network interface card (NIC) to capture all network traffic that crosses its network. o It involves looking at the packets on the network as they pass by some sensor.
  • 3. o The sensor can only see the packets that happen to be carried on the network segment it’s attached to. o Once the attack is identified, or abnormal behaviour is sensed, the alert can be sent to the administrator.  Host-based Intrusion Detection System (HIDS): o Host intrusion detection systems run on individual hosts or devices on the network. o A HIDS monitors the inbound and outbound packets from the device only and will alert the user or administrator if suspicious activity is detected. o Use OS based monitoring to find intrusion. o Log all relevant system events (e.g., file/device accesses) o Monitor shell commands and system calls executed by user applications and system programs. 3. Intrusion Prevention Systems: (IPS) o Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS). o The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it. o Intrusion prevention systems can be classified into four different types: i. Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity. ii. Wireless intrusion prevention systems (WIPS): monitor a wireless network for suspicious traffic by analyzing wireless networking protocols. iii. Network behaviour analysis (NBA): examines network traffic to identify threats that generate unusual traffic flows, such as certain forms of malware and policy violations. iv. Host-based intrusion prevention system (HIPS): an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.
  • 4. Chapter-2 Server Management & Firewalls 1. User Management 2. Overview of firewalls 3. Types of firewalls 4. DMZ & firewall features 1. Overview of firewalls: o It controls the incoming and outgoing network traffic based on an applied rule set. o A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet). o All messages entering or leaving the intranet pass through the firewall. o Firewalls can be implemented in both hardware and software. 2. Types of firewalls:  There are several types of firewall techniques that will prevent potentially harmful information from getting through: o packet filters o Stateful firewall o Application-layer firewall o Proxy firewall 1. Packet filters: a. First firewall that inspecting the packets that are transferred between computers on the Internet. b. When a packet passes through a packet-filter firewall, its source and destination address, protocol, and destination port number are checked against the firewall's rule set.
  • 5. 2. Stateful firewall: a. It records all connections passing through it and determines whether a packet is the start of a new connection, a part of an existing connection, or not part of any connection. b. If a packet does not match an existing connection, it's evaluated according to the rule set for new connections. 3. Application-layer firewall: a. The key benefit of application-layer filtering is the ability to block specific content, such as known malware or certain websites, and recognize when certain applications and protocols -- such as HTTP, FTP and DNS -- are being misused. 4. Proxy firewall: a. Intercepts all messages entering and leaving the network. b. The proxy server effectively hides the true network addresses. c. A proxy firewall prevents direct connections between either sides of the firewall. 4. DMZ & firewall features:  Firewall features: 1. Protects the user from unwanted incoming connection attempts. 2. Allows the user to control which programs can and cannot access the local network and/or Internet and provide the user with information about an application that makes a connection attempt 3. Block or alert the user about outgoing connection attempts 4. Hide the computer from network traffic 5. Monitor applications that are listening for incoming connections 6. Monitor and regulate all incoming and outgoing Internet users 7. Prevent unwanted network traffic from locally installed applications
  • 6.  DMZ (De militarized Zone) or Perimeter Network o It is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. o It prevents outside users from getting direct access to a server that has company data. o A DMZ is an optional and more secure approach to a firewall and effectively acts as a proxy server as well. o Hosts in the DMZ are permitted to have only limited connectivity to specific hosts in the internal network. o The purpose of a DMZ is to add an additional layer of security to an organization's Local Area Network (LAN).
  • 7. Chapter-3 Security for VPN & Next Generation Techniques 1. VPN Security 2. Security in Multimedia Networks 3. Various Computing platforms: HPC, cluster & Computing Grids 4. Virtualization & cloud technology & security 1. VPN: o VPN stand for Virtual private network. o A firewall protects your data on your computer, VPNs protect it online. o A virtual private network (VPN) extends a private network across a public network, such as the Internet. o It enables a computer or Wi-Fi-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network. o VPNs allow employees to securely access their company's intranet while travelling outside the office. o VPNs securely connect geographically separated offices of an organization, creating one cohesive network. VPN Security: o To prevent disclosure of private information, VPNs typically allow only authenticated remote access and make use of encryption techniques. o The VPN security model provides:  Confidentiality : an attacker would only see encrypted data.  Sender authentication to prevent unauthorized users from accessing the VPN.  Message integrity to detect any instances of tampering with transmitted messages.
  • 8. o Secure VPN protocols include the following:  Internet Protocol Security (IPsec):  It is developed for IPv6.  Its design meets most security goals: authentication, integrity, and confidentiality.  IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination.  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  These protocols operate using a handshake method.  This handshake produces the cryptographic parameters of the session."  These parameters, typically digital certificates, are the means by which the two systems exchange encryption keys, authenticate the session, and create the secure connection.  Point-to-Point Tunnelling Protocol (PPTP):  Secure Shell (SSH):  SSH creates both the VPN tunnel and the encryption that protects it.  This allows users to transfer unsecured data by routing the traffic from remote fileservers through an encrypted channel.  The data itself isn't encrypted but the channel it’s moving through is. 2. Security in Multimedia Networks:  Definition of multimedia: o Multimedia is an integration of text, graphics, still and moving images, animation, sounds, and any other medium where every type of information can be represented, stored, transmitted. o It involves transmission and distribution of multimedia information on the network. o Sample applications: videoconferencing, web video broadcasting, multimedia Email, etc.
  • 9. 4. Various Computing platforms: HPC, cluster & Computing Grids:  HPC: (High Performance Computing) o High Performance Computing (HPC) allows scientists and engineers to solve complex science, engineering, and business problems using applications that require high bandwidth, low latency networking, and very high compute capabilities. o High performance computers of interest to small and medium-sized businesses today are really clusters of computers. o HPC people often refer to the individual computers in a cluster as nodes. o A cluster of interest to a small business could have as few as four nodes. o Task is carried out in distributed environment. o Sometimes HPC is also called as parallel processing. o HPC can be carried out in 2 ways:  Cluster Computing  Grid Computing o Cluster Computing:  Cluster is homogenous.  Cluster computers all have the same hardware and OS.  Computers in the cluster are normally contained in a single location.  In case of Cluster, the whole system (all nodes) behaves like a single system view and resources are managed by centralized resource manager. o Grid Computing:  Grids are heterogeneous.  The computers that are part of a grid can run different operating systems and have different hardware.  Grids are inherently distributed by its nature over a LAN, metropolitan or WAN.  In case of Grid, every node is autonomous i.e. it has its own resource manager and behaves like an independent entity.
  • 10. 5. Virtualization & cloud technology & security:  Virtualization: i. Refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. ii. The term virtual machine essentially describes sharing the resources of one single physical computer into various computers within itself. iii. Virtualization differs from cloud computing because virtualization is software that manipulates hardware, while cloud computing refers to a service that results from that manipulation.  Cloud computing: i. It is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. ii. Example : Email Communication iii. Bringing VMs (virtual machines) onto the cloud. iv. Cloud computing relies on sharing of resources. v. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS)  Cloud Security: o Cloud security is sub-domain of computer security, network security, and, information security. o Identity management :  Every enterprise will have its own identity management system to control access to information and computing resources. o Physical security:  Essential supplies (such as electricity), theft, fires, floods are sufficiently robust to minimize the possibility of disruption. o Personnel security:  Employment activities such as security monitoring and supervision, disciplinary procedures, service level agreements, codes of conduct, policies etc. o Availability: o Application security: o Privacy:  Providers ensure that all critical data (credit card numbers, for example) are masked or encrypted (even better) and that only authorized users have access to data in its entirety.