lecture 2 - Network Recon

lecture 2 - Network Recon - Network Security CS 6823...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 6823 - Network Security 1 Network Security CS 6823 – Lecture 2 Attacks - Network Recon and Scanning Keith O’Brien keith@keithobrien.org ]
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CS 6823 - Network Security Examples of Threats Targeted Hacking Vulnerability Exploitation Malware Outbreaks Economic Espionage Intellectual Property Theft or Loss Network Access Abuse Theft of IT Resources
Background image of page 2
CS 6823 - Network Security Why? Fame - Not so much anymore (more on this with Trends) Money - The root of all evil… War - A battlefront just as real as the air, land, and sea
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CS 6823 - Network Security Exploiting Systems – Why Teach? Much controversy over teaching “how to hack” Why should we learn this? You have to know how networks are attacked in order mount an effective defense. “Know your enemy” However, with this knowledge comes responsibility. Much like if you learn how to fire a weapon you only do it at the pistol range not in the middle of the street. Likewise, skills taught here are to only be used in the confines of a controlled computer security research lab. If you go out and do something stupid – you will end up in jail. 4
Background image of page 4
CS 6823 - Network Security Types of Attacks and Computer Crimes Denial of Service Destruction of Information Dumpster Diving Emanation Eavesdropping Embezzlement Espionage Fraud Information Warfare Illegal Content of Material Malicious Code Masquerading Social Engineering 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CS 6823 - Network Security Types of Attacks and Computer Crimes (cont) Software Piracy IP Address Spoofing Terrorism Theft of Passwords Use of exploit scripts Network Intrusions 6
Background image of page 6
CS 6823 - Network Security US Federal Computer Crime Laws (consult legal council for official advice) 1970 US Fair Credit Reporting Act – Regulates the collection, dissemination and use of consumer credit information. 1970 US Racketeer Influenced and Corrupt Organization Act (RICO) – extends criminal and cival penalties for acts performed as part of a criminal organization 1973 US Code of Fair Information Practices. Five underlying principals: - No personal data recordkeeping systems whose exisitance is secret - Must be a way for a person to find out what information about them is in a record and how it is used 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
U.S. Federal Laws (cont) - There must be a way for a person to prevent information obtained for a specific purpose from being used for another purpose without the subjects consent. - There must be a way for a person to correct a record of information about them. - Any organization creating, maintaining, using or disseminating records of personal data must assure the reliability of the data and take prudent measures to protect this data. 8
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 71

lecture 2 - Network Recon - Network Security CS 6823...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online