E-Mail Attachments
Download
Report
Transcript E-Mail Attachments
Network Security
Network security comprises authentication and
encryption
Authentication is typically accomplished through a
user name and password
Other forms of authentication are digital
certificates, smart cards, and biometrics
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Hackers, Crackers, and Intruders
Exact meaning of hacker depends on the context
in which it is used and by whom
Cracker typically means anyone who gains
access to a computer system with intent to do
harm or play pranks
For sake of clarity, the textbook uses term
intruder
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Unprotected Network Shares
Network shares with minimal or no security plus
remote access enabled on a computer are a
security breach waiting to happen
Hacker tools can probe and access available
network shares
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Social Engineering
Relies on the gullibility of a network user and his or her
respect for authority
Caller: Hello. This is Bob down at IMS operations
conducting as security check. We believe we may
have an intruder in our system.
Joe Gullible: Yes. What Can I do To help ?
Caller: Well Joe, I need to look at your PC files to
see if there have been any possible intrusions. I
need your username and password.
Joe Gullible : Sure. My username is Jgullible and
my Password is toocool
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Open Ports
Common way for intruders to gain access to a
system
Administrators should close all unused ports
Third-party utility or the netstat utility can be used
to check for open ports
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Zero Configuration (Zeroconf)
Standard Developed by the IEEE
Advantage
Enables a network device to automatically configure
itself for a network
Disadvantage
Makes a network less secure
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Denial of Service (DoS)
One of the most common attacks on a server
Can overload a server to the point that it crashes
or is not able to complete a legitimate user
request
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Man in the Middle (MITM)
Intruder intercepts network transmission, reads it,
then places it back on route to its destination
Contents may or may not be modified
MITM can also be used for a replay attack
Using an IP or MAC address from a previous
network transmission to make an unauthorized
connection.
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Spoofing
Example: Using a valid IP address to fool a server
Example: Using a bogus IP address and ID when
sending unsolicited e-mail
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Smurf Attack
A type of DoS
To deal with a DoS attack
Configure the computer firewall not to
respond to ICMP (Internet Control
Message Protocol) echo requests
Configure routers not to forward ICMP
echo requests to broadcast addresses in
the network
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Trojan Horse
Example: Free download that
contains malicious code
That code could contain virus,
worm, or backdoor
Example: Can imitate
legitimate logon screen
When user logs on, name and
password are sent to
unauthorized user
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
E-Mail Attachments
Source
of most commonly
encountered viruses
Malicious code can be programmed
into attachment
When recipient opens attachment,
malicious program is activated
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Applied Networking
As a network administrator, you are in charge of
educating company employees on the dangers of
e-mail attachments. What might you tell the
employees concerning e-mail attachments and the
prevention of infecting their computers and the
network with malware?
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Macro Virus
Series of common keystrokes can be linked to a
virus
Can be sent as e-mail attachment and is launched
when recipient opens attachment
May infect a template file like normal.dot and then
execute when user presses a certain combination
of keys
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Worm
Most common worm programs use e-mail to
replicate and spread to other computers
Common safeguard against worms is setting up a
dedicated mail server
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Phishing
E-mail can appear as if it’s from a legitimate
company, such as a credit card company
E-mail requests user’s personal information, such
as social security number or bank account PIN
Phony web sites that look authentic, but have
slightly different domain names
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
Applied Networking
As a network administrator, you are in charge of
educating company employees on the dangers of
phishing. What might you tell the employees
concerning detecting and handling a phishing
attack?
© Goodheart-Willcox Co., Inc.
Permission granted to reproduce for educational use only.
IN CLASS LAB
Roberts 72 & 73
NEXT CLASS
Labsim Homework 8.2.2-8.2.4