20CS17 – INFORMATION SECURITY
LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING (AUTONOMOUS) Accredited by NAAC & NBA (Under Tier - I) ISO 9001:2015 Certified Institution Approved by AICTE, New Delhi. and Affiliated to JNTUK, Kakinada L.B. REDDY NAGAR, MYLAVARAM, KRISHNA DIST., A.P.-521 230. DEPARTMENT OF INFORMATION TECHNOLOGY |
INTRUDERS
Program & Semester: B.Tech & VI SEM
Section: IT-A
Academic Year: 2024 - 25
By
Mr. M. Vijay Kumar
Sr Assistant Professor
Dept.of IT, LBRCE
Intruders
Intruders
.
Intrusion Techniques
Password Guessing
Password Capture
Intrusion Detection
Approaches to Intrusion Detection
Audit Records
Statistical Anomaly Detection
Audit Record Analysis
Rule-Based Intrusion Detection
Rule-Based Intrusion Detection
Base-Rate Fallacy
Distributed Intrusion Detection
Distributed Intrusion Detection - Architecture
Distributed Intrusion Detection – Agent Implementation
.
Honeypots
Password Management
Password Studies
Managing Passwords - Education
Managing Passwords - Computer Generated
Managing Passwords - Reactive Checking
Managing Passwords - Proactive Checking
Summary
Viruses and Other Malicious Content
Malicious Software
Backdoor or Trapdoor
Logic Bomb
Trojan Horse
Zombie
Viruses
Virus Operation
Virus Structure
program V :=
{goto main;
1234567;
subroutine infect-executable := {loop:
file := get-random-executable-file;
if (first-line-of-file = 1234567) then goto loop
else prepend V to file; }
subroutine do-damage := {whatever damage is to be done}
subroutine trigger-pulled := {return true if condition holds}
main: main-program := {infect-executable;
if trigger-pulled then do-damage;
goto next;}
next:
}
Types of Viruses
Macro Virus
Email Virus
Worms
Worm Operation
Morris Worm
Recent Worm Attacks
Worm Techology
Virus Countermeasures
Anti-Virus Software
Advanced Anti-Virus Techniques
Digital Immune System
Behavior-Blocking Software
Distributed Denial of Service Attacks (DDoS)
Distributed Denial of Service Attacks (DDoS)
Contructing the DDoS Attack Network
DDoS Countermeasures
Summary
Firewalls
The function of a strong position is to make the forces holding it practically unassailable
—On War, Carl Von Clausewitz
Introduction
What is a Firewall?
Firewall Limitations
Firewalls – Packet Filters
Firewalls – Packet Filters
Firewalls – Packet Filters
Attacks on Packet Filters
Firewalls – Stateful Packet Filters
Firewalls - Application Level Gateway (or Proxy)
Firewalls - Application Level Gateway (or Proxy)
Firewalls - Circuit Level Gateway
Firewalls - Circuit Level Gateway
Bastion Host
Firewall Configurations
Firewall Configurations
Firewall Configurations
Access Control
Access Control Matrix
Trusted Computer Systems
Bell LaPadula (BLP) Model
Reference Monitor
Evaluated Computer Systems
Common Criteria
Common Criteria
Common Criteria Requirements
Common Criteria
Common Criteria
Summary
Introduction to Database Security Issues
84
Three Basic Concepts
85
85
Introduction to Database Security Issue(2)
86
Threats to Computer Systems
87
Scope of Data Security Needs
88
Introduction to Database Security Issues (3)
89
Introduction to Database Security Issues (4)
90
Introduction to Database Security Issues 5)
91
Introduction to Database Security Issues (6)
92
Introduction to Database Security Issues (7)
93
Introduction to Database Security Issues (8)
94
��Database Authorization
Authorization