...EVREN KUCUKKAYA E-COMMERCE SEMINAR Elias A. Hadzilias, PhD NTUA Assignment: On-line security: attacks and solutions 2012 ISG – INTERNATIONAL MBA Table of Context 1. INTRODUCTION ................................................................................................................................... 3 2. MAIN TYPES OF MALWARE ................................................................................................................. 4 2.1. Computer Viruses ............................................................................................................................. 4 2.1. Computer Worms ............................................................................................................................. 5 2.3. Trojan Horses.................................................................................................................................... 6 2.4. Spyware ............................................................................................................................................ 6 2.5. Backdoor........................................................................................................................................... 6 2.6. Spams ............................................................................................................................................... 7 2.7. Keyloggers ....................................................................................................
Words: 5692 - Pages: 23
...Security in the Smart Grid introduction Present and future battlefronts of electronic terrorism includes the state of readiness and resilience of the computer equipment protecting America's energy distribution networks and industrial control systems. According to a Pike research report [1] published March 1st of this year, it is projected that investments in smart grid cyber security will total $14 billion through 2018. First, what is a power grid? A power grid consists of several networks that carry electricity from the power plants where it is generated to consumers, and includes wires, substations, transformers, switches, software, and other hardware. The grid in the past used a centralized one-way communication distribution concept that consisted of limited automation, limited situational awareness, and did not provide the capability for consumers to manage their energy use. “Smart Grid” generally refers to a class of technology designed to upgrade the current utility grid infrastructure to improve the efficiency on the power network and in energy users’ homes and businesses. Much of the legacy power plant infrastructure is now over 30 years old with electrical transmission and distribution system components (i.e. power transformers) averaging over 40 years old and 70% of transmission lines being 25 years or older [2]. In December 2007, Title XIII of the Energy Independence and Security Act of 2007 became an official...
Words: 3081 - Pages: 13
...Evaluating the Security of Computer Networks Security in Systems Architecture and Applications SE579 2 Table of Contents Evaluating the Security of Computer Networks I. Vulnerabilities A. Design Flaws B. Poor Security Management C. Incorrect Implementation II. Firewalls A. Packet Filtering B. Circuit Level Gateway Proxy Server C. Application Gateway III. Antivirus A. Scans IV. Intrusion Detection Systems V. Disadvantages VI. Conclusion 3 One of the major computing challenges in today’s economy is the lack of adequate security over the information computer networks, and internet applications in which business, government, and economy depend on. Businesses have become more dependent on information. The gathering, organizing, managing, finding, and analyzing of information are crucial to businesses. Computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005.(Coyne) 2003 Single instances of hacking may cost as much as $600,000 to $7m a day for...
Words: 2281 - Pages: 10
...4-5……………………………………………………………………Importance of IPS 5-6……………………………………………………………………IPS Challenges 7………………………………………………………………………IPS Sensor 8………………………………………………………………………Limitations and Benefits 8-9……………………………………………………………………Solution 10………………………………………………………………….…Conclusion 11…………………………………………………………………….References ABSTRACT This paper illustrate an Intrusion Prevention System (IPS) which is based on sensors in the Network. These sensors are considered honeypots. The system is designed to offer a lot of possibilities to get the most of information gathered about attackers. The analysis of network based intrusion prevention system process reveals one challenge facing administrator: containing the threats or mitigating the threats in the shortest possible time. Information security is crucial and plays a very important role in designing any high-speed network device on system. Since the present generation of intrusion prevention system has numerous limitations on performance and effectiveness, there should be an alternate solution. In this paper, I will discuss the analysis of the intrusion prevention system sensor process and the challenges administrators face in dealing with threats. This paper will also discuss ways to contain attacks by sensors that have the capability to divert attacks and avoiding false-positive. INTRODUCTION Sensor...
Words: 2299 - Pages: 10
...The company does not wish to release any security related information per company policy. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw (U.S. Airforce) therefore my assumptions on the network diagram shows that there are vulnerabilities that may exist as a weakness in the automated systems, security procedures, administrative controls, and /or internet controls of the finance company there could also exist hardware vulnerabilities that could lead to unprotected storage of hardware the solution is to store all hardware at the recommended temperature, software vulnerability can occur with insufficient testing and a lack of audit trail solution will be to test and secure all software used and update software as appropriate, audit trails enable security relevant chronological records of activities that occur in the software. There could be network vulnerability with unsecure network architecture and unprotected communication lines the solution will be to install and configure network security equipment to curb these issues. Personnel can be compromised and may be used to create problems either directly or indirectly on the system a solution will be proper recruiting of staff and security awareness training there could also exist organizational vulnerabilities such as lack of security within the organization the solution will be to secure the organization and its...
Words: 964 - Pages: 4
...1) List the major security problems of CNB of Oklahoma and relate them to the attack methods described in section 9.2 through 9.4. The Security problems faced by CNB are as follows • Malware • Malicious software • Unprecedented of Spam Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software, and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. States. Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics. Software such as anti-virus, anti-malware, and firewalls are relied upon by users at home, small and large...
Words: 830 - Pages: 4
...Information Security Challenge February 17, 2010 Information Security Challenges As the world becomes more saturated and dependent upon Information Access, increased opportunities await the criminal element to exploit. This creates new and more costly problem sets that must be mitigated in order to navigate in today’s business world. One of the larger challenges is, entering the criminal information market does not take an excessive capital investment. It simply requires a computer, online access and some talent. Potentiating this problem is the large legitimate market of information brokers that gather marked amounts of information today. This allows for the integration of legal identifiable information to augment those criminal activities. From far away places like Russia, Belarus and Nigeria, scores of criminal associations scour the Internet in search of information and opportunities to be used in identity theft, malware insertion or extortion through complete denial of service (DOS), (Higgins, 2008). The Bigger They are… the Harder They Fall Most of us have seen it in the news, “Veterans Administration loses Personally Identifiable Information (PII)”, “Bank of America (BOA) loses account numbers” etc… At first it seems minor but after investigation it turns out to be large amounts of PII lost (O’Brien, 2008). The criminals focus on big companies (mostly point of sale functions) as they are the slowest to adapt to change and they have the largest...
Words: 2242 - Pages: 9
...Importance of Firewall MedIQ is going in the right direction by adding a firewall in their network. The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some...
Words: 1017 - Pages: 5
...A potential solution to the problem of building more secure but still affordable and timely systems is to combine Commercial-Off-The-Shelf (COTS) hardware and software with proven techniques from the fault tolerant community. A prestigious University such as Princeton approach to achieve such stability forgo a COT solution an invested in a Intrusion Prevention Systems (IPS). Intrusion Prevention Systems (IPS) Intrusion Prevention Systems (IPS) are network-based devices or host-based applications that protect systems against computer hacking attacks by analyzing each message passing through it. The messages that match any of the thousands of known attack patterns or "signatures," messages that violate domestic and international networking standards, attempts to scan network devices, denial of service attacks, reconnaissance activity (i.e., testing computers to find less protected systems). Once an attack is detected, the IPS can be configured to take any of the following actions: It can capture information about the attack to a log file. It can continue to capture subsequent data from a suspicious source. It can drop the message completely. It can drop subsequent messages from a suspicious source. It can e-mail and/or page appropriate support personnel. Types of network-based IPS solutions In-line Intrusion Prevention Systems: An in-line IPS must positioned between the untrusted network environment and the trusted network it is intended to protect. All traffic...
Words: 1046 - Pages: 5
...DDOS prevention capabilities of Appcito CAFÉ Prepare, detect and mitigate DDoS attacks Introduction Consumers today use a wide variety of applications and smart devices to access information, make transactions and conduct business online. In addition, many enterprises have in-house applications that are used by employees to complete tasks and projects. Almost all the applications are deployed on the cloud because it offers a host of advantages. The cloud offers real time, elastic service with the option to pay as you use. But hosting the applications on the cloud also increases the possibility of attacks by malicious hackers. Most of these attacks are in the form of DDoS (distributed denial-ofservice). Virtually, there is no industry that has been spared from DDoS attacks. Such attacks prevent customers and business users from accessing applications. In a world where time is money, any application downtime is sure to affect businesses negatively. These costs range from financial losses and lost business opportunities to poor productivity. Internet and the OSI model At the heart of the cloud is the internet. Or, in other words, the cloud is an extension of the internet. The internet is a complex network connecting computers across the globe for easy transmission of data and information. This complexity arises because there are different types of hardware and software working in unison. In addition, rapid proliferation and adoption of new technologies has added...
Words: 2332 - Pages: 10
...The main location of 2 buildings consisting of 50 total computers will be physically connected through a fiber line with a T-3 connection to the internet. The primary servers for this network will also be located at location 1. Location 2 and 3 will connect to the network via the VPN concentrators. Location 3 will house back-up servers for the network. Both locations will also connect to the internet with a T-3 connection. T-3 lines are a combination of 28 T-1 circuits and produce 44.736 Mbps of total bandwidth for the network. T-3 lines are commonly used for building a business network at one centralized location. Although T-3 line is costly, it is required for a large business network because of the speed and the amount of bandwidth it provides (Mitchell, n.d.). For location 2 and 3 to operate on the same network, VPN is a viable option. It provides an enhanced level of security, allows for users to access network assets, eliminates the need for distance leases lines, is cost effective, can offer better performance, provides online privacy, allows for remote access, and offers network performance efficiency ("8 advantages of using VPN - ibVPN.com," 2010). A VPN server will also allow for remote connectivity for employees to access network resources while away from the office (i.e. telecommuting). A primary server and a back-up server are included in this network. The backup server will be a Warm Backup Site. A warm backup site is typically pre-configured equipment...
Words: 900 - Pages: 4
...ask about your intrusion security solution Why intrusion prevention— not detection—is essential Business white paper Table of contents Introduction ..................................................................................... 3 The fundamental difference................................................................ 3 Eight basic questions ......................................................................... 3 1. Is your intrusion security solution in-band? ...................................... 3 2. Does your intrusion security solution support maximum network and application availability? ........................................................ 4 3. Does your intrusion security solution offer the performance needed to deeply inspect traffic without slowing down your network or business applications? ............................................................... 4 4. Does your intrusion security solution protect not just your network perimeter but also key points in the core of your network? ............... 4 5. Does your intrusion security solution provide attack coverage that is broad and deep? ............................................................. 5 6. How accurate is your attack coverage? Does it block bad traffic without blocking good traffic? ...................................................... 6 7. How timely and up to date is the attack coverage? .......................... 6 8. Can your security vendor refer you to customers...
Words: 2842 - Pages: 12
...Seminar Report Security Issues in MANETs Abhishek Seth 04329001 November12 ,2004 Abstract Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic differences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure. problems of secuirity in MANETs. Further sections deals with some of the solutions to these problems. Finally Section 10 concludes this article. 2 2.1 Mobile Adhoc Networks Introduction 1 Introduction Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others needs the aid of intermediate nodes to route their packets. These networks are fully distributed, and can work at any place without the help of any infrastructure. This property makes these networks highly flexible and robost...
Words: 7859 - Pages: 32
...Security Issues in MANET.pdf (Size: 182.57 KB / Downloads: 225) Security Issues in MANETs Presented By: Abhishek Seth 04329001 Abstract Mobile Ad hoc Networks (MANET) has become an ex¬citing and important technology in recent years because of the rapid proliferation of wireless devices. A mo¬bile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help ofother intermediate nodes to establish communication channels. In such an environment, malicious interme¬diate nodes can be a threat to the security of conver¬sation between mobile nodes. The security experience from the Wired Network world is oflittle use in Wire¬less Mobile Ad hoc networks, due to some basic differ¬ences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure. 1 Introduction A Mobile Adhoc Network is a group of wireless mo¬bile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Application such as military excercises, disaster relief, and mine site operation may benefit from adhoc networking, but secure and reliable communication is a necessary pre¬requisite for such applications. MANETS are more vulnerable to attacks than wired networks due to open medium, dynamically changing network topology, cooperative algorithms, lack of cen-tralized...
Words: 8182 - Pages: 33
...CASE You may have heard of Man in the Middle attacks, meet Man in the Browser attacks (MitB). The term has been around since 2005, but not used much. That's changing, thanks to current crimeware, considered a form of MitB attack. According to Wikipedia, MitB is: "A trojan that infects a web browser and has the ability to modify pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place." I covered an instance where crimeware played a part in stealing almost a half million dollars in this post. In my next article, I discussed Zeus and URLZone, possibly the crimeware used in the half million dollar hoist. In this article, I would like to dig deeper into possible solutions. Protect ourselves Since it's our money, we need to take the initiative. Doing everything we can to protect our hard-earned savings. Once we have our personal situations in the best shape possible, we can bug the banks to get their act together. The obviously solution is to not bank on-line. That's a great idea, but what about our service personnel or anyone who cannot physically get to their bank? Besides, we should not have to succumb to cybercriminals. With that in mind, let's look at some of the solutions, you the members have come up with. I...
Words: 708 - Pages: 3