Professional Documents
Culture Documents
Lecture 03 Network Security
Lecture 03 Network Security
Malware
Malware is a general term for any type of intrusive computer software with malicious intent against the user.
DDoS
The acronym stands for Distributed Denial of Service and is a favorite Black Hat tool. Using multiple hosts and users,
hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to
temporarily shut down.
DDoS
A Denial of Service (DoS) or Distributed
Denial of Service (DDoS) attack is when
one or more compromised systems launch
a flooding attack on a remote target(s), in
an attempt to overload network resources
and disrupt service. Some DDoS attacks
have caused prolonged, complete service
shutdowns of major online operators.
Encryption Coding used to protect your information from hackers
An attack on the “middleman”, in this case, defined as the Wi-Fi system that connects users to the Internet.
Hackers who commit Man in the Middle Attacks can break the Wi-Fi’s encryption and use this as a means
of stealing your personal data because they’re now in the system.
Ransomware (Cryptolocker)
A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to
unlock everything. In other words, it kidnaps your computer and holds it for ransom, hence the clever name.
Spoofing
The ability to inject packets into the Internet with a false source address is known as IP spoofing, it is one of many
ways in which one user can masquerade as another user.
Virus
Malware which changes, corrupts, or destroys information, and is then passed on to other systems,
usually by otherwise benign means (e.g. sending an email). In some cases, a virus can actually cause physical damage.
VPN
An acronym standing for Virtual Private Network, a VPN is a method of connecting a series of computers and
devices in a private encrypted network, with each user’s IP address being replaced by the VPN’s IP address.
Users get Internet anonymity, making it difficult for hackers to attack.
Worm
Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
Particularly nasty, worms can either be simply a means of slowing down a system by eating up resources, or
by committing exploits such as installing back doors or stealing data.
Packet Sniffer A passive receiver that records a copy of every packet that flies by is called a packet
sniffer. Because packet sniffers are passive—that is, they do not inject packets into the channel—they are
difficult to detect. So, when we send packets into a wireless channel, we must accept the possibility that
some bad guy may be recording copies of our packets. As you may have guessed, some of the best
defenses against packet sniffing involve cryptography.
Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic
1. select target
2. break into hosts around the
network (see botnet)
3. send packets to target from
compromised hosts
target
Bad guys can sniff packets
Packet Sniffer A passive receiver that
records a copy of every packet that flies
packet “sniffing”: by is called a packet sniffer.
• broadcast media (shared ethernet, wireless) Because packet sniffers are passive—
that is, they do not inject packets into
• promiscuous network interface reads/records all packets (e.g., the channel—they are difficult to detect.
including passwords!) passing by So, when we send packets into a wireless
channel, we must accept the possibility tha
some bad guy may be recording copies of
A C our packets. As you may have guessed,
some of the best defenses against packet
sniffing involve cryptography.