Unit-1 Nis
Unit-1 Nis
Unit-1 Nis
on
Network And Information Security
(22620)
By
Ms.Pritee H. Raut
(Assistance Professor)
Availability:
The principle of availability states that the resources will be available to authorize party at all times. Information
will not be useful if it is not available to be accessed. Systems should have sufficient availability of information to
satisfy the user request.
Risk And Thread Analysis
What’s an asset?
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat,
a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by
discovering and reporting it so that corrective action can be taken.
What is viruse?
A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting
or destroying them.
Computer virus has the tendency to make its duplicate copies , and also spread it across every folder and
damage the data of your computer system.
A computer virus is actually a malicious software program or "malware" that, when infecting your system,
replicates itself by modifying other computer programs and inserting its own code.
Types of Virus
1. Boot Sector Virus
2. Parasitic Virus
3. Memory Resident Virus
4. Nom-Resident Virus
5. Stealth virus
6. Micro virus
7. Polymorphic Virus
8. Companion virus
9. Email virus
10. Metamorphic virus
11. Overwrite Virus
Boot Sector Viruses
This type of viruses has ability to hide in boot sector. The viruses will load into memory when
there is booting system and trying to read from hard disk. Boot sector viruses are more spread
since old time when floppy disk was popular. But now we hardly seen them since many of
them only can spread through floppy disk.
Companion Viruse
Companion Viruses is create a new program instead of modifying an existing file
Macro Virus
These viruses are not executable, it affect Microsoft word like documents. They can spread
through email.
Parasitic Virus
it attached itself to executable code and replicates itself. When the infected code is executed, it will find other
executable code or program to infect
Resident Viruses
Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate module and installing
malicious code into computer memory (RAM). The viruses are commonly classified into two main categories: Fast Infectors
and Slow Infectors.
Nonresident Viruses
This type of virus executes itself and terminated or destroyed after specific time
Polymorphic Viruses:
Polymorphic Virus is similar to encrypted viruses; polymorphic viruses encrypt their codes and use different encryption keys
every time. Some polymorphic viruses are hardly to detect by antivirus software using virus signature based, because it do not
remain any identical after replication.
A particularly infamous polymorphic backdoor trojan – the Storm Worm discovered in 2007 – could alter its identity every 10 to
30 minutes. The speed of the change made it a headache for cyber-security experts trying to stamp out the threat.
Example: Pseudonym, 1260
Stealth Viruses
Stealth Viruses is some sort of viruses which has ability to hide itself from some antivirus software programs.
Therefore, some antivirus program cannot detect them.
Metamorphic virus
This type of virus keeps rewrite itself every time . It may change their behavior as well as appearance code.
Email virus
Virus gets executed when email attachment is open by recipient . Virus sends itself to everyone on the mailing list of sender
Overwriting Virus
an overwrite virus is a computer virus that overwrites a file with its own code, helping spread the virus to other files and
computers. An overwrite virus deletes user data - documents, pictures, videos etc ..in such a way that they cannot be
recovered.
Phases of virus/Lifecycle (6m)
What are typical phases of operation of a virus or worm?
Dormant phase: The virus is idle. but during this stage, the virus does not take any action. The virus will
eventually be activated by some event
Propagation stage: The virus places an identical copy of itself into other programs or into certain system
areas on the disk. Each infected program will now contain a clone of the virus, which will itself enter a
propagation phase.
Triggering phase: The virus is activated to perform the function for which it was intended. condition may
be a particular date, time, size on disk exceeding a threshold, or opening a specific file.
Execution phase: The function is performed . It can be destructive such as deleting files on disk, crashing the
system, or corrupting files.
What is worm
A computer worm is a type of malware that spreads copies of itself from computer to computer.
A worm can replicate itself without any human interaction, and it does not need to attach itself to a
software program in order to cause damage
It usually doesn’t target files on an individual computer. Instead, it takes on entire networks in an
attempt to create large botnets.
A worm makes multiple copies of itself which then spread across the network or through
an internet connection. These copies will infect any inadequately protected computers and servers that
connect—via the network or internet
virus Worms
A Virus is a malicious executable code attached to A Worm is a form of malware that replicates itself
another executable file which can be harmful or and can spread to different computers via
can modify or delete data. Network.
The main objective of virus is to modify the The main objective of worms to eat the system
information. resources.
It needs human action to replicate.. It does not needs human action to replicate.
Trojans can be found in MP3 songs that the user may have downloaded, or downloading games
from an unsecured website, or the advertisement that pops up when the user is browsing the page.
Some features of the Trojan horse are as follows :
It steals information like a password and more.
It can be used to allow remote access to a computer.
It can be used to delete data and more on the user’s computers.
How to prevent this virus:
• Do not download anything like the images, audios from an unsecured website.
• Do not click on the ads that pop up on the page with some advertisements for online games.
• Do not open any attachment that has been sent from an unknown use.
The user has to install the anti-virus program. This anti-virus program has the capacity to detect those files which are
affected by a virus.
Intruders: (4m)
An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In
summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality.
i. Masquerader:
An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
ii. Misfeasor:
A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but
misuses his or her privileges
LegitImate user with no permission to access permission
An Insider threat is a malicious threat to an organization that comes from people within the organization, such as
employees, former employees, contractors or business associates, who have inside information concerning the
organization's security practices, data and computer systems.
For example, a software engineer might have database access to customer information and will steal it to sell to
a competitor. This activity would be difficult to detect since the software engineer has legitimate access to the
database.
Types of Attack(4 or 6m)
Active attacks:
An Active attack attempts to alter system resources or effect their operations. Active attack involve some
modification of the data stream or creation of false statement.
Suppose Alice wants to request Bob to transfer $100 from his account to hers. Alice will send
an authentic message to Bob to make this request. Since Bob trusts Alice, he transfers her the
amount. Unfortunately, Alice’s initial transfer request was intercepted by an attacker who
resends the message to Bob. Bob sees a message he thinks is from Alice, so he again transfers
the required amount. However, this time the money is transferred to the attacker instead of
Alice. This is one example of how replay attacks can be used to meet an attacker’s malicious
intent.
Denial of Service
It prevents normal use of communication facilities. This attack may have a specific target.
For example, an entity may suppress all messages directed to a particular destination.
Another form of service denial is the disruption of an entire network by disabling the
network or by overloading it by messages so as to degrade performance.
Passive attacks:
A Passive attack are those, where attacker aims to obtain information that is in transit. In passive attack,
attacker does not involve any modification to the content of original message. So, passive attack are4 hard
to detect
Passive Attacks are in the nature of eavesdropping on or monitoring of transmission. The goal of the
opponent is to obtain information is being transmitted.
Types of Passive
2. SYN flood – sends a request to connect to a server, but never completes the handshake. Continues
until all open ports are saturated with requests and none are available for legitimate users to connect
to.
Distributed Denial of Service (DDoS)
(4m)
A Distributed Denial of Service (DDoS) attack is an attempt to make an online
service or a website unavailable by overloading it with huge floods of traffic
generated from multiple sources.
Unlike a Denial of Service (DoS) attack, in which one computer and one Internet
connection is used to flood a targeted resource with packets, a DDoS attack uses
many computers and many Internet connections, often distributed globally in
what is referred to as a botnet.
What are Botnets?
Attackers build a network of hacked machines which are known as botnets, by spreading
malicious piece of code through emails, websites, and social media. Once these computers are
infected, they can be controlled remotely, without their owners' knowledge, and used like an
army to launch an attack against any target.
Backdoors and Trapdoors(4m)
Backdoor is a term that refers to the access of the software or hardware of a computer system without
being detected. The backdoor can be created by the developer themselves so that they can quickly and
easily make changes to the code without the need to log in to the system.
A back door in an operating system would provide access to all system functions in the computer.
However, backdoors can be used by hackers in cyberattacks to steal personal information and data.
A backdoor attack is a type of malware that gives cybercriminals unauthorized access to a website.
Cybercriminals install the malware through unsecured points of entry, such as outdated plug-ins or
input fields. Once they enter through the back door, they have access to all your company’s data,
including customers’ personal identifiable information (PII).
As the name suggests, a backdoor attack is stealthy, and cybercriminals often slip in undetected.
Sniffing(2m or 4m)
Sniffing is the process of monitoring and capturing all the packets passing through
a given network using sniffing tools. It is a form of “tapping phone wires” and get
to know about the conversation. It is also called wiretapping applied to the
computer networks.
Data packets captured from a network are used to extract and steal sensitive
information such as passwords, usernames, credit card information, etc. Attackers
install these sniffers in the system in the form of software or hardware. There are
different types of sniffing tools used and they include Wireshark,
Ettercap, BetterCAP, Tcpdump, WinDump, etc.
How to Prevent Sniffing Attacks
Untrusted networks: users should avoid connecting to unsecured networks, which includes free public Wi-Fi.
These unsecured networks are dangerous since an attacker can deploy a packet sniffer that can sniff the entire
network. Another way an attacker can sniff network traffic is by creating their own fake–free public Wi-Fi.
Encryption: Encryption is the process of converting plaintext into cipher text in order to protect the message
from attackers. Before leaving the network, the information should be encrypted to protect it from hackers who
sniff into networks. This is achieved through the use of a virtual private network (VPN).
Network scanning and monitoring: Network administrators should scan and monitor their networks to detect
any suspicious traffic. This can be achieved by bandwidth monitoring or device auditing.
Spoofing (6M)
when someone or something pretends to be something else in an attempt to gain our confidence, get access to
our systems, steal data, steal money, or spread malware.
Spoofing is a type of attack on computer device in which the attacker tries to steal the identity of the
legitimate user and act as another person. This kind of attack is done to breach the security of the system or to
steal the information of the users.
Example:
Hackers normally change their IP addresses to hack a website so that the hacker can’t be traced.
Website Spoofing: Website spoofing refers to when a website is designed to mimic an existing site known and/or trusted
by the user. Attackers use these sites to gain login and other personal information from users.
IP Spoofing: Attackers may use IP (Internet Protocol) spoofing to disguise a
computer IP address, thereby hiding the identity of the sender or impersonating
another computer system. One purpose of IP address spoofing is to gain access
to a networks that authenticate users based on IP addresses.
DNS Server Spoofing: DNS (Domain Name System) servers resolve URLs
and email addresses to corresponding IP addresses. DNS spoofing allows
attackers to divert traffic to a different IP address, leading victims to sites that
spread malware.
b Explain in brief IT
How to protect against spoofing attacks
Example:
Suppose in the communication of two parties A and B; A is sharing his key to B to prove
his identity but in the meanwhile Attacker C eavesdrop the conversation between them and
keeps the information which are needed to prove his identity to B. Later C contacts to B
and prove its authenticity.
Example
The figure above shows the overview of a replay attack. Let’s look at an example to understand the attack better.
Suppose Alice wants to request Bob to transfer $100 from his account to hers. Alice will send an authentic message
to Bob to make this request. Since Bob trusts Alice, he transfers her the amount. Unfortunately, Alice’s initial
transfer request was intercepted by an attacker who resends the message to Bob. Bob sees a message he thinks is
from Alice, so he again transfers the required amount. However, this time the money is transferred to the attacker
instead of Alice. This is one example of how replay attacks can be used to meet an attacker’s malicious intent.
TCP/IP Hijacking(4M)
TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It
is done in order to bypass the password authentication which is normally the start of a session.
Example
An attacker monitors the data transmission over a network and discovers the IP’s of two devices that
participate in a connection.
When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS
attack and then resume communication by spoofing the IP of the disconnected user.
TCP/IP hijacking is a type of man-in-the-middle attack. The intruder can determine the IP addresses of the two
session participants, make one of them inaccessible using a DoS attack, and connect to the other by spoofing
the network ID of the former.
IP Spoofing: IP spoofing is a technique which is used to gain unauthorized access to computers where the
intruder sends a message to a computer with an Ip address indicating that the message is coming from a trusted
host.
Operating System Security
Hotfix – A work-around or solution to customer-reported issues. Trend Micro develops and releases hot fixes to
specific customers only. Typically, hotfixes are made to address a specific customer situation and may not be
distributed outside the customer organization.
Hotfixes can also solve many of the same issues as a patch, but it is applied to a “hot” system—a live system—to fix an
issue:
1. Immediately
2. Without creating system downtimes or outages.
Patch - A patch is a program that makes changes to software installed on a computer. Software companies issue
patches to fix bugs in their programs, address security problems, or add functionality.Publicly released update to fix a
known bug/issue
Service Pack – Large Update that fixes many outstanding issues, normally includes all Patches, Hotfixes,
Maintenance releases that predate the service pack.
A service pack is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a
single installable package. Installing a service pack is easier and less error-prone than installing a high number of
patches individually, even more so when updating multiple computers over a network. Service packs are usually
What is Information Security (InfoSec)?
Information security (sometimes referred to as InfoSec) covers the tools and processes that
organizations use to protect information. This includes policy settings that prevent unauthorized
people from accessing business or personal information.
Why Is Information Security Important?
Companies need to be confident that they have strong data security and that they can protect against cyber attacks and other
unauthorized access and data breaches. Weak data security can lead to key information being lost or stolen, create a poor
experience for customers that can lead to lost business, and reputational harm if a company does not implement sufficient
protections over customer data and information security weaknesses are exploited by hackers. Solid infosec reduces the risks of
attacks in information technology systems, applies security controls to prevent unauthorized access to sensitive data, prevents
disruption of services via cyber attacks like denial-of-service (DoS attacks), and much more.
Company core business integrity and client protections are critical, and the value and importance of information security in
organizations make this a priority. All organizations need protection against cyber attacks and security threats, and investing in
those protections is important. Data breaches are time-consuming, expensive, and bad for business. With strong infosec, a
company reduces their risk of internal and external attacks on information technology systems. They also protect sensitive data,
protect systems from cyber attacks, ensure business continuity, and provide all stakeholders peace of mind by keeping
confidential information safe from security threats.
Information classification (4M)
Information classification is a process used in information security to categorize data based on its level of sensitivity
and importance. The purpose of classification is to protect sensitive information by implementing appropriate security
controls based on the level of risk associated with that information.
Information classification, also known as data classification, is how corporate information is classified into specific
significant categories so that critical data remains protected and safe. In a business, vast data volumes are handled
every day – invoice records, email lists, customer information, user data, order history, etc. Obviously, all data is not
equally important, and some information will need higher protection than the other.
If a piece of information is critical or sensitive, it needs more protection as it is more vulnerable to security threats. It is
easier to ascertain which information needs more protection and how data can be classified and labeled with
information classification. For instance, files of different departments of an organization should be kept separately.
They should be saved in different folders, and only individuals of a particular department should be given access to the
files so that they can work with the data. This ensures information security and easy access to the files as and when
needed.
Information Classification(4m and6m)
Public: Information that is not sensitive and can be shared freely with anyone.
Internal: Information that is sensitive but not critical, and should only be shared within the organization.
Confidential: Information that is sensitive and requires protection, and should only be shared with authorized
individuals or groups.
Secret: Information that is extremely sensitive and requires the highest level of protection, and should only be
shared with a select group of authorized individuals.
Top Secret: Information that if disclosed would cause exceptionally grave damage to the national security and
access to this information is restricted to a very small number of authorized individuals with a need-to-know.
Information classification also includes a process of labeling the information with the appropriate classification
level and implementing access controls to ensure that only authorized individuals can access the information. This
is done through the use of security technologies such as firewalls, intrusion detection systems, and encryption.
Criteria for Information Classification
(4M sample)
Value – the most frequently used criteria for classifying information is the value of data. If the information is
so valuable that their loss could create significant organizational problems, it needs to be classified.
Age – if the value of certain information declines over time, the classification of the information may be
lowered.
Useful Life – if the information is available to make desired changes as and when needed, it can be labeled
‘more useful’.
Personal Association – information that is linked to specific individuals or is addressed by privacy law
needs to be classified.
Summer 2022
{2M}
1.Define :
i. Confidentiality
ii. accountability
2. Explain terms:
I. Shoulder surfing
II. Piggybacking
3.Differentiate between virus and worms
{4m}
4.define following terms:
III. Operating system
IV. Hot fix
V. Patch
VI. Service pack
{6m}