/
Carrie  Estes Collin Donaldson Carrie  Estes Collin Donaldson

Carrie Estes Collin Donaldson - PowerPoint Presentation

vivian
vivian . @vivian
Follow
27 views
Uploaded On 2024-02-09

Carrie Estes Collin Donaldson - PPT Presentation

Network Security Fundamentals 2 Zero day attacks zero day Web application attacks Signing up for a class Hardening the web server Enhancing the security May not prevent against web attacks ID: 1045994

attack web session attacks web attack attacks session buffer computer token user markup attempts app input network language overflow

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Carrie Estes Collin Donaldson" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. Carrie EstesCollin DonaldsonNetwork Security Fundamentals 2

2. Zero day attacks“zero day”Web application attacksSigning up for a classHardening the web serverEnhancing the securityMay not prevent against web attacksProtecting the networkTraditional network security devices can block traditional attacks, but not always web app attacksApplication Attacks

3. Injects scripts into a web app serverDirect attacks at clientsDoes not attack web app to steal content or deface itVictim goes to website, instructions sent to victims computer, instructions executeRequires two criteriaIt accepts input from the user without validationIt uses the input in a response without encoding itCross-Site Scripting (XSS)

4. Structured Query LanguageView and manipulate data in a relational databaseTargets SQL serversAttacker using SQL wouldbraden.thomas@fakemail.com’If “Email address unknown” pops up, entries are being filteredIf “Server failure” pops up, entries are not being filteredSQL Injection

5. A markup language is a method for adding annotations to the text so that the additions can be distinguished from the text itselfHTML is also a markup languageIt uses tags embedded in brackets so the browser can format correctlyExtensible Markup Language XML carries data and tags are user madeXML and SQL injection attacks are very similarA specific type is Xpath injection Attempts to exploit XML Path Language queries that are built from user input Markup Languages

6. Persistent CookieSecure CookieFirst Party CookieThird Party CookieSession CookieCookies

7. An attack in which an attacker attempts to impersonate the user by using his session token.An attacker can eavesdrop on the transmission to steal the session token cookie. A second option is to attempt to guess the session token cookie. Session Token: A form of verification used when accessing a secure web application.Session Hijacking

8. A buffer overflow occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.Attackers use buffer overflow to compromise a computer. Buffer Overflow attacks

9. Denial of Service: Makes attempts to keep a computer from performing its normal functions. DDOS attack: Uses multiple computers.Ping flood: Uses the ICMP to flood the victim with packets. The computer is overwhelmed and cannot respond quickly enough. This causes it to drop legitimate connections to other clients.Smurf attack: An attack that broadcasts a ping request to all computers on the network yet changes the address from which the request came to that of the target. Network Attacks

10. Angie is a high school studentShe is doing poorly in math classHer teacher sends her parents a letterAngie waits for the letter and replaces it with a different letterHer teacher wonders why her parents do not respond to having a conference.Man in the middle attack

11. Asset IdentificationThreat EvaluationRisk mitigationDiminish the riskTransfer the riskAccept the riskVulnerability Assessment