0% found this document useful (0 votes)
49 views17 pages

Introduction To Information Systems and Network Vulnerabilities

The document outlines the definitions, types of vulnerabilities, and threats related to network security. It explains that vulnerabilities are weaknesses in systems that can be exploited by various threats, such as viruses, worms, and denial-of-service attacks. Additionally, it highlights that human factors often pose the greatest risk to network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views17 pages

Introduction To Information Systems and Network Vulnerabilities

The document outlines the definitions, types of vulnerabilities, and threats related to network security. It explains that vulnerabilities are weaknesses in systems that can be exploited by various threats, such as viruses, worms, and denial-of-service attacks. Additionally, it highlights that human factors often pose the greatest risk to network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

VULNERABILITIES AND THREATS

OF NETWORK SECURITY
CONTENTS
•Definitions
•Vulnerabilities
•Types of Vulnerabilities
•Types of Threats
DEFINITIONS
• THREAT:A threat is anything that can disrupt the
operation, functioning, integrity, or availability of a
network or system. This can take any form and can be
malevolent, accidental, or simply an act of nature.
• VULNERABILITY:A vulnerability is an inherent
weakness in the design, configuration,
implementation, or management of a network or
system that renders it susceptible to a threat.
• ATTACK: An attack is a specific technique used to
exploit a vulnerability.
• For example, a threat could be a denial of service. A
vulnerability is in the design of the operating system,
and an attack could be a "ping of death.“
• There are two general categories of attacks, passive
and active.
• Passive attacks are very difficult to detect.
Example: packet sniffing
VULNERABILITIES
• A vulnerability is an inherent weakness in the design,
configuration, or implementation of a network or
system that renders it susceptible to a threat.
• Most vulnerabilities can usually be traced back to one
of three sources:
• Poor design: Hardware and software systems that
contain design flaws that can be exploited.
example: the "sendmail" flaws in early versions of
Unix
Contd…..
• Poor implementation: Systems that are incorrectly
configured, and therefore vulnerable to attack.
• This type of vulnerability usually results from
inexperience, insufficient training.
Example: unristricted access privileges on critical
executable files.
• Poor Maintenance: security measures need to be
documented and monitored.
• Daily backup of a system needs to be verified.
Types of Vulnerabilities
• Physical Vulnerabilities: Central hosts and servers
should be kept in secure rooms that can only be
entered by authorized personal.
• Routers and communications equipment should also
kept in secure locations with restricted access.
• Hardware and Software Vulnerabilities: Design flaws
in hardware or software can render systems
vulnerable to attack or affect the availability of
systems
Contd…..

• Media Vulnerabilities:
• Disks, tapes, and other media can be stolen, lost, or
damaged. Information can be copied and removed
from an organization's facilities without detection.
• Accordingly, companies need to ensure the safety of
all media that contains or stores vital information
assets.
Contd……

• Human Vulnerabilities:
• Human stupidity, carelessness, laziness, greed, and
anger represent the greatest threats to networks and
systems and will do more damage than the rest of the
others combined.
• Moreover, human vulnerabilities and the risks
associated with them are the most difficult to defend
against.
Types of Threats
• Virus: virus is a computer programme that attaches
itself to another legitimate program and causes
damages to the computer system or to the network.
• Worm: worm does not perform any destructive
actions and instead, only consumes system resources
to to bring it down.
• It replicates itself again and again.
Contd…

• Trojan horse: It is a hidden piece of code, like virus.


• It allows an attacker to obtain some confidential about
a computer or a network.
• Example: getting login user id and pwd.
• Packet sniffing: is a passive attack on an ongoing
conversation.
• An attacker need not hijack a conversation, but
instead, can simply observe packets as they pass by.
• Prevention can be by data encode or transmission link
encode.
Contd..
• Packet spoofing: In this technique, an attacker sends
packets with a false source address.
• When it happens, the receiver would inadvertently
send replies back to this forged address not to
attacker. his can lead to three possible cases
• The attacker can intercept the reply:
• The attacker need not see the reply:
• The attacker does not want the reply:
Contd…

• IP Address Spoofing:IP address spoofing takes


advantage of systems and networks that rely on the IP
address of the connecting system or device for
authentication.
• For example, packet-filtering routers are sometimes
used to protect an internal network from an external
untrusted network.
Contd…

• Trap doors: A trap door or back door is an


undocumented way of gaining access to a system that
is built into the system by its designer(s).
• It can also be a program that has been altered to
allow someone to gain privileged access to a system or
process.
• There have been numerous stories of vendors utilizing
trap doors in disputes with customers.
Contd…

• Logic Bombs: A logic bomb is a program or subsection


of a program designed with malevolent intent.
• It is referred to as a logic bomb, because the program
is triggered when certain logical conditions are met.
• This type of attack is almost always perpetrated by an
insider with privileged access to the network.
• The perpetrator could be a programmer or a vendor
that supplies software.
Contd…

• Denial of Service: Denial-of-service attacks are


designed to shut down or render inoperable a system
or network.
• The goal of the denial-of-service attack is not to gain
access or information but to make a network or
system unavailable for use by other users.
• It is called a denial-of-service attack, because the end
result is to deny legitimate users access to network
services.
Contd..
• Ping of Death:
• ping is a TCP/IP command that simply sends out an IP
packet to a specified IP address or host name to see if
there is a response from the address or host.
• It is often used to determine if a host is on the
network or alive.
• ICMP is part of the IP of TCP/IP and operates at the
Internet layer using the IP datagram to deliver
messages.
• Many operating systems were or are vulnerable to
larger-than-normal ICMP packets.
• As a result, specifying a large packet in a ping
command can cause an overflow in some system’s
internals that can result in system crashes.

You might also like