lab1 - CSE 4481 Computer Security Lab Mark Shtern...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 4481 Computer Security Lab Mark Shtern
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
INTRODUCTION
Background image of page 2
Security Our life depends on computer systems Traffic control Banking Medical equipment Internet Social networks Growing number of attacks on computer systems
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Results from malicious attack Financial loss Loss of reputation A drop in the value of a company’s stock Legal issues Hacker may not be a computer expert Numerous attacking scripts / tools available Hacker training material also available
Background image of page 4
Movie
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Statistics (2009) 85% of attacks were not considered highly difficult 96% of breaches were avoidable through simple or intermediate control 48% involved privileges misuse 86% of victims had evidence of the breach in their log files
Background image of page 6
Course Objectives Hands on experience in various security topics Execution of popular attacks Attack prevention and risk mitigation
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Attack Examples Network (sniffing, session hijacking) Password Cracking Web Code injection Overflows (Buffer, Number)
Background image of page 8
Defence Techniques Auditing Vulnerability scanners Firewalls (Network and application) Intrusion Preventions and Detections Honeypots
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ATTACK LAB Orientation
Background image of page 10
Attack Lab Isolated Lab accessed through an IP KVM Attack Lab consists of Physical equipment, such as servers, workstations and network switches Virtual equipment, such as virtual machines and virtual switches Attack Lab has monitoring software that audits student activity
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/13/2012 for the course CSE 1520 taught by Professor Kemeny during the Fall '08 term at York University.

Page1 / 35

lab1 - CSE 4481 Computer Security Lab Mark Shtern...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online