2
Most read
3
Most read
17
Most read
Internet Security
Introduction… 
• The Internet represents an insecure channel for 
exchanging information leading to a high risk 
of intrusion or fraud, such as phishing. 
• Internet security is a branch of computer 
security specifically involving browser security but 
also network security on a more general level. 
• Its objective is to establish rules and measures to 
use against attacks over the Internet.
Need for Internet Security… 
• Today, internet is stuffed with different types of 
sensitive data 
• The internet is packed with threats from hackers. They 
can 
• crash your system, 
• Acquire access to your personal information and can 
result in monetary losses. 
So, 
• You need internet security to keep information and 
systems safe from malicious software and individuals.
What are the main security-related 
threats on the Internet 
Today? 
• Hijacked web servers 
• Denial-of-Service Attacks 
• Cross Site Scripting 
• Trap Doors 
• Email Spoofing
Hijacked web servers
Web Server Hijacking… 
• Attacker gains access and changes contents of web 
server. 
• Can be very bad: 
• Attacker can plant hostile applets. 
• Attacker can plant data sniffers 
• Attacker can use compromised machine to take over 
internal system. 
• Usually outsiders. 
• Nearly impossible to trace.
How do they do it? 
• Administrative passwords captured by a password 
sniffer. 
• Utilize known vulnerability: 
• Buffer overflow. 
• Use web server CGI script to steal /etc/passwd file, 
then crack passwords. 
• Mount the web server’s filesystem.
Defensive Measures… 
• Patch known bugs. 
• Don’t run unnecessary services on the web server. 
• Monitor system for signs of penetration 
• Intrusion detection systems 
• Make frequent backups. 
• Have a hot spare ready.
Denial-of-Service Attacks
What is Denial-of-Service 
attack? 
• A denial-of-service (DoS) attack is an attempt to 
make a machine or network resource unavailable 
to its intended users. 
• Although the means to carry out and targets of a 
DoS attack may vary, it generally consists of efforts 
to temporarily or indefinitely interrupt or suspend 
services of a host connected to the Internet. 
• Costs money and reputation 
• Lost Sales 
• Damage to reputation
How it is done? 
• Send a lot of requests 
(HTTP, or SMTP requests) 
• Easy to trace. 
• Relatively easy to defend against with TCP/IP blocking at 
router. 
• Attack routers 
• Attack DNS
Cross Site Scripting
Cross-Site Scripting… 
• Cross-site scripting (XSS) is a type of computer 
security vulnerability which enables attackers 
to inject client-side script into Web pages viewed 
by other users. 
• Cross-site scripting carried out on websites 
accounted for roughly 84% of all security threats 
documented by Symantec as of 2007. 
• Their effect may vary depending on the sensitivity 
of the data handled by the vulnerable site.
XSS Attacks - Stealing Cookie 
• What is cookie? 
• Used by the web applications for authenticating, 
tracking, and maintaining specific information 
about users 
• Once a cookie is saved on your computer, only the 
website that created the cookie can read it 
• How it is done? 
• Attacker injects script that reads the site’s cookie 
• Scripts sends the cookie to attacker 
• Attacker can now log into the site as the victim
Some other XSS Attacks… 
• Defacement 
• Attacker injects script that automatically redirects 
victims to attacker’s site 
<script> 
document.location = “http://evil.com”; 
</script> 
• Phishing 
• Fake page asks for user’s credentials or other sensitive 
information( e.g. fake paypal page) 
• The data is sent to the attacker’s site
Email Spoofing
Email Spoofing… 
• Email spoofing is the creation of email messages 
with a forged sender address - something which is 
simple to do because the core protocols do no 
authentication. 
• Spam and phishing emails typically use such 
spoofing to mislead the recipient about the origin 
of the message.
Prevention measures… 
• A number of measures to address spoofing are 
available, but it is likely that almost half of all 
domains still do not have such measures in place. 
• However, as of 2013, 60% of consumer mailboxes 
worldwide used measures to protect themselves 
against this. 
• Although email spoofing is often effective in forging 
the sender's real email address, the IP 
address source computer sending the mail can 
generally be identified from the "Received:" lines in 
the email header.
Trap Doors
Trap doors… 
• Method of bypassing normal authentication 
methods 
• Remains hidden to casual inspection 
• Can be a new program to be installed 
• Can modify an existing program 
• Also known as Back Doors
Trap Door Examples… 
• 2003, an attempt was made to create a backdoor in 
the Linux Kernel 
• Early versions of the Sobig Virus in 2003 installed 
backdoors to send its spam. 
• MyDoom virus in early 2004 created a backdoor on 
port 3127 to send spam
Conclusions
Conclusions… 
• Keep server and third-party applications and library 
up-to-date 
• Do not trust user input 
• Review code & design and identify possible 
weaknesses 
• Monitor run-time activity to detect ongoing 
attacks/probes
THANK YOU

More Related Content

PPTX
AAA Implementation
PPTX
Internet security
PPTX
Email Spoofing.pptx
PPTX
Brute Force Attack and Its Prevention.pptx
PPTX
Security threats
PPTX
Introduction to cyber security
PPTX
Secure communication
PPT
Computer security: hackers and Viruses
AAA Implementation
Internet security
Email Spoofing.pptx
Brute Force Attack and Its Prevention.pptx
Security threats
Introduction to cyber security
Secure communication
Computer security: hackers and Viruses

What's hot (20)

PPTX
Cyber Crime and Security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber Security Introduction.pptx
PPTX
Phishing ppt
PPTX
cyber security
PPTX
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
PPTX
Cyber security
PPTX
Cyber attack
PPTX
Spyware powerpoint
PPTX
Types of cyber attacks
PDF
Malicious software
PPT
Cyber security standards
PPTX
Basics of Denial of Service Attacks
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber security
PPTX
Virus
PPT
Network Security Threats and Solutions
PPTX
Phishing attack seminar presentation
PPT
Computer Worms
Cyber Crime and Security
Network security (vulnerabilities, threats, and attacks)
Cyber Security Introduction.pptx
Phishing ppt
cyber security
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Cyber security
Cyber attack
Spyware powerpoint
Types of cyber attacks
Malicious software
Cyber security standards
Basics of Denial of Service Attacks
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber security
Virus
Network Security Threats and Solutions
Phishing attack seminar presentation
Computer Worms
Ad

Viewers also liked (19)

PDF
Internet Security
PPTX
Internet security powerpoint
PPTX
Internet Security
PPT
Tutorial 9 - Security on the Internet
 
PPTX
Library On Internet Security
PDF
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
PPT
Internet security
PDF
Internet of Things: Challenges and Issues
PPT
Internet Security
PDF
Computer Security
PDF
TOP 6 Security Challenges of Internet of Things
DOCX
Financial analysis final project
PPT
Data Flow Diagram
PPTX
Different types of attacks in internet
PPTX
Dfd examples
PPTX
Library management system
PPTX
Data Flow Diagrams
PDF
Social Media for Business
PDF
Mobile-First SEO - The Marketers Edition #3XEDigital
Internet Security
Internet security powerpoint
Internet Security
Tutorial 9 - Security on the Internet
 
Library On Internet Security
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
Internet security
Internet of Things: Challenges and Issues
Internet Security
Computer Security
TOP 6 Security Challenges of Internet of Things
Financial analysis final project
Data Flow Diagram
Different types of attacks in internet
Dfd examples
Library management system
Data Flow Diagrams
Social Media for Business
Mobile-First SEO - The Marketers Edition #3XEDigital
Ad

Similar to Internet Security (20)

PDF
Ethical Hacking and Cyber Security
PDF
Sip 140208055023-phpapp02
PPT
Web security
PPTX
Cyber Security By Preetish Panda
PDF
Invited Talk - Cyber Security and Open Source
PPTX
Computer security and privacy
PPTX
Web Application Vulnerabilities
PPT
hacking lecture 3c.ppt
PPTX
Cyber crime &amp; security
PPTX
APpresebtstuobvghgftytfhyrfyttrfgPT.pptx
PPT
PPT
Hacking
PPTX
Network security and firewalls
PPT
2hacking.ppt
PPTX
bhumi verma dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
PDF
Secure Coding BSSN Semarang Material.pdf
PPTX
Security vulnerabilities - 2018
PPT
3 Most Common Threats Of Information Security
PPTX
Cyber.pptx
Ethical Hacking and Cyber Security
Sip 140208055023-phpapp02
Web security
Cyber Security By Preetish Panda
Invited Talk - Cyber Security and Open Source
Computer security and privacy
Web Application Vulnerabilities
hacking lecture 3c.ppt
Cyber crime &amp; security
APpresebtstuobvghgftytfhyrfyttrfgPT.pptx
Hacking
Network security and firewalls
2hacking.ppt
bhumi verma dentition in mammals -aman.pptxhhdbshdbsbdhsdbhdbhs
Secure Coding BSSN Semarang Material.pdf
Security vulnerabilities - 2018
3 Most Common Threats Of Information Security
Cyber.pptx

Recently uploaded (20)

PDF
Course Overview and Agenda cloud security
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
Introduction: Living in the IT ERA.pptx
PDF
How Technology Shapes Our Information Age
PPTX
Introduction to networking local area networking
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PPTX
Networking2-LECTURE2 this is our lessons
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PPTX
Basic understanding of cloud computing one need
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
Computer Networking, Internet, Casting in Network
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
Course Overview and Agenda cloud security
AI AppSec Threats and Defenses 20250822.ppsx
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
Viva Digitally Software-Defined Wide Area Network.pptx
Artificial_Intelligence_Basics use in our daily life
Introduction: Living in the IT ERA.pptx
How Technology Shapes Our Information Age
Introduction to networking local area networking
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
Networking2-LECTURE2 this is our lessons
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Basic understanding of cloud computing one need
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Computer Networking, Internet, Casting in Network
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
COPD_Management_Exacerbation_Detailed_Placeholders.pptx

Internet Security

  • 2. Introduction… • The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. • Internet security is a branch of computer security specifically involving browser security but also network security on a more general level. • Its objective is to establish rules and measures to use against attacks over the Internet.
  • 3. Need for Internet Security… • Today, internet is stuffed with different types of sensitive data • The internet is packed with threats from hackers. They can • crash your system, • Acquire access to your personal information and can result in monetary losses. So, • You need internet security to keep information and systems safe from malicious software and individuals.
  • 4. What are the main security-related threats on the Internet Today? • Hijacked web servers • Denial-of-Service Attacks • Cross Site Scripting • Trap Doors • Email Spoofing
  • 6. Web Server Hijacking… • Attacker gains access and changes contents of web server. • Can be very bad: • Attacker can plant hostile applets. • Attacker can plant data sniffers • Attacker can use compromised machine to take over internal system. • Usually outsiders. • Nearly impossible to trace.
  • 7. How do they do it? • Administrative passwords captured by a password sniffer. • Utilize known vulnerability: • Buffer overflow. • Use web server CGI script to steal /etc/passwd file, then crack passwords. • Mount the web server’s filesystem.
  • 8. Defensive Measures… • Patch known bugs. • Don’t run unnecessary services on the web server. • Monitor system for signs of penetration • Intrusion detection systems • Make frequent backups. • Have a hot spare ready.
  • 10. What is Denial-of-Service attack? • A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. • Although the means to carry out and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. • Costs money and reputation • Lost Sales • Damage to reputation
  • 11. How it is done? • Send a lot of requests (HTTP, or SMTP requests) • Easy to trace. • Relatively easy to defend against with TCP/IP blocking at router. • Attack routers • Attack DNS
  • 13. Cross-Site Scripting… • Cross-site scripting (XSS) is a type of computer security vulnerability which enables attackers to inject client-side script into Web pages viewed by other users. • Cross-site scripting carried out on websites accounted for roughly 84% of all security threats documented by Symantec as of 2007. • Their effect may vary depending on the sensitivity of the data handled by the vulnerable site.
  • 14. XSS Attacks - Stealing Cookie • What is cookie? • Used by the web applications for authenticating, tracking, and maintaining specific information about users • Once a cookie is saved on your computer, only the website that created the cookie can read it • How it is done? • Attacker injects script that reads the site’s cookie • Scripts sends the cookie to attacker • Attacker can now log into the site as the victim
  • 15. Some other XSS Attacks… • Defacement • Attacker injects script that automatically redirects victims to attacker’s site <script> document.location = “http://evil.com”; </script> • Phishing • Fake page asks for user’s credentials or other sensitive information( e.g. fake paypal page) • The data is sent to the attacker’s site
  • 17. Email Spoofing… • Email spoofing is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no authentication. • Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.
  • 18. Prevention measures… • A number of measures to address spoofing are available, but it is likely that almost half of all domains still do not have such measures in place. • However, as of 2013, 60% of consumer mailboxes worldwide used measures to protect themselves against this. • Although email spoofing is often effective in forging the sender's real email address, the IP address source computer sending the mail can generally be identified from the "Received:" lines in the email header.
  • 20. Trap doors… • Method of bypassing normal authentication methods • Remains hidden to casual inspection • Can be a new program to be installed • Can modify an existing program • Also known as Back Doors
  • 21. Trap Door Examples… • 2003, an attempt was made to create a backdoor in the Linux Kernel • Early versions of the Sobig Virus in 2003 installed backdoors to send its spam. • MyDoom virus in early 2004 created a backdoor on port 3127 to send spam
  • 23. Conclusions… • Keep server and third-party applications and library up-to-date • Do not trust user input • Review code & design and identify possible weaknesses • Monitor run-time activity to detect ongoing attacks/probes