Download as pdf or txt
Download as pdf or txt
You are on page 1of 71

Federal Democratic Republic of Ethiopia

TVET INSTITUTE

Hardware and Network


Servicing Level III

Learning Guide 4
Course Title: Computer System and Network
Security
Module Title: Administering Network Infrastructure
Course Content: Determine Network Security
LO4- Determining network
Instruction
security

Security Computers have become an integral part of our life and network security threats are something
that we usually fear and hear about often. Whether it is a personal computer or a computer being used
in a huge corporate company, each computer needs to be protected from the computer network
security threats. The moment we have a computer ready to be used, we also have it readily exposed to
the network security threats such as various virus and bugs which can damage the functionality of the
computer. In addition to these network security threats the personal information of the owner which
might be stored in the computer is also at risk if the computer has not been protected from the hackers
who are ever ready to steal that stored information from your computer.

In order to protect our computers from the network security threats that it is exposed to, we need to
first understand the different types of threats that exist, only then we will be able to safeguard our
computer. The most common kind of network security threats that computers are exposed to, are the
threat of “Viruses”. It is important to know that a virus is usually sent as a downloadable attachment
which is in the form of an executable file. Once a person downloads a file and runs it, that’s when the
problem starts. The moment the executable file is “run” the computer gets affected by the network
security threats and a virus has now been downloaded by the user.

The function of the virus is usually related to corrupting the files which are on the system; this could be
the software related file or the actual hardware itself. There are certain viruses which are less harmful
and affect only certain types of software which are on the computer. However there are many
software’s which completely rash the hardware of the computer the moment that they are downloaded
and executed. Such viruses are listed as the top most computer network security threats.

When we talk about the network security threats that are posed by the different kinds of viruses, it is
important to understand that there are computer programs called “worms” which are basically subsets
of viruses and can cause massive amount of damage to your computer system. There are certain
network security threats and bugs which only cause the computer screen to have annoying pop-ups
every now and then; however some of the more deadly bugs cause permanent damage to the software
installed. There have been cases where “worms” have affected the computer in such a way that the
computer started automatically sending e-mails to all the addresses which are listed in the computer.
The most dangerous part about worms is that they don’t need to be in an executable format which
needs to be run.

People often store their personal information on their computers because most of us take care of our
bill payments, bank account transactions, and other important things through our computers. Imagining
the magnitude of the problem which can arise if your computer is hacked or crash can be a scary
thought. It is better that all of us secure our computers by installing good anti-virus software which can
safeguard our computers from the excessive computer network security threats.

While there are several free systems that you can use online that will safeguard your computer, they are
often times not as effective as the paid versions of network security threats software. They are usually
very limited and will not completely eliminate the network security threats such as the viruses and

Determining Network Security


Computer System and Network Security Page 2
worms that your computer is prone to getting if it was not protected. It is extremely important that you
choose a software wisely that is easy to install and will allow you to scan your computer for network
security threats as often as you would like.

This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics –

 Resource Sharing
 Security Threats
 Signature Files for Anti-virus

This guide will also assist you to attain the learning outcome stated in the cover page.

Specifically, upon completion of this Learning Guide, you will be able to –

 Share resources over the network


 Identify security threats and how to mitigate such threat
 Explain the importance of Signature Files

Learning Activities:

1. Read the specific objectives of this Learning Guide


2. Read the information written in the “Information Sheet 1”
3. Accomplish the “Self-check 1” on page 8.
4. If the result of your evaluation in “Self-check1” is satisfactory then you may proceed to “operation
sheet 1”
5. Perform and accomplish all the tasks in operation sheet 1.
6. Read the information written in the “Information Sheet 2”
7. Accomplish the “Self-check 2” on page 38.
8. If the result of your evaluation in “Self-check2” is satisfactory then you may proceed to “Operation
sheet 2”
9. Perform and accomplish all the tasks in operation sheet 2.
10. Read the information written in the “Information Sheet 3”
11. Accomplish the “Self-check 3” on page 54.
12. If the result of your evaluation in “Self-check3” is satisfactory then you may proceed to “operation
sheet 3”
13. Perform and accomplish all the tasks in operation sheet 3.
14. Complete LAP test

NOTE: Self-check answers are on page 70

*Your teacher will evaluate your output either satisfactory or not satisfactory. If not satisfactory, your
teacher shall advice you on additional work. But if satisfactory you can proceed to the next topic.

Determining Network Security


Computer System and Network Security Page 3
Information Sheet – 1 Resource sharing

In computing, a shared resource or network share is a device or piece of information on a computer


that can be remotely accessed from another computer, typically via a Local Area Network or an
enterprise Intranet, transparently as if it were a resource in the local machine.

Examples are shared file access (also known as disk sharing and folder sharing), shared printer access
(printer sharing), shared scanner access, etc. The shared resource is called a shared disk (also known as
mounted disk), shared drive volume, shared folder, shared file, shared document, shared printer or
shared scanner.

The term file sharing traditionally means shared file access, especially in the context of operating
systems and LAN and Intranet services, for example in Microsoft Windows documentation. Though, as
BitTorrent and similar applications became available in the early 2000's, the term file sharing
increasingly has become associated with peer-to-peer file sharing over the Internet.

Users can share resources over the network. You can share a single file, specific folders, or an entire
drive, as shown in Figure 1.

FIGURE 1. Shared Folder and Drive

Determining Network Security


Computer System and Network Security Page 4
Shared folder permissions are used to restrict access to a folder or file that is shared over a network.
Folder sharing is normally used to grant remote users access to files and folders over a network. Web
sharing grants remote user’s access to files from the Web if Internet Information Services (IIS) is
installed.

Members of the Administrators or Power Users group can share folders on a Windows member server.
Users have to be members of the Administrators or Server Operators group to share folders on a
domain’s domain controller. Users that have the Create Permanent Shared Objects user right are able to
share folders as well. To share folders on NTFS volumes, users have to minimally have the Read
permission.

When folders are shared, it is important to keep in mind that only folders can be shared, not files.
Shared folder permissions are irrelevant to users who are locally logged onto a computer. Shared folders
that are moved are no longer shared. When shared folders are copied, the copy is not shared. The
original shared folder however remains shared.

A few disadvantages associated with share permissions are listed below:

 Shared folder permissions do not have as many permission options as NTFS permissions. The only
shared folder permissions that can be assigned to users/groups are Read, Change, or Full Control.
 Share permissions are not inheritable.
 Users cannot back up or audit shared folder permissions.
 If the user moves or even renames a shared folder, the shared folder permissions for that
particular folder no longer exist.

Because of these disadvantages, shared folder permissions are typically utilized on drive volumes that
are FAT or FAT32 volumes.

Users can use Windows Explorer to share local folders only. In order to share local folders and remote
folders, use Computer Management. Use the File Server Management MMC snap-in to manage shared
folders.

The shared folder options that can be set when sharing a folder are listed below:

 Do Not Share This Folder: The folder can only be accessed locally.
 Share This Folder: The folder can be accessed locally and over the network. See Figure 2
 Share Name: The name users would see and utilize to access the folder.
 Description: Additional information on the shared folder.
 User Limit: The maximum number of connections that are concurrently permitted to the shared
folder.
 Permissions: The manner in which users are allowed to access the folder.
 Offline Settings: The manner in which folders are cached at times when the folder is offline.

Determining Network Security


Computer System and Network Security Page 5
FIGURE 2. Network Sharing and Security

Shared folders basically enable users to access folders over the network. Shared folder permissions
specify those users that are allowed to access or connect to a shared folder over the network. Unlike
NTFS permissions, shared folder permissions do not utilize access control lists (ACLs) to limit access to
resources and cannot be assigned to both folders and files. Shared folder permissions can only be
specified for folders, but can be specified for folders stored on volumes formatted with a file system
other than NTFS.

The shared folder permissions that can be configured are summarized below:

 Read: The Read permission allows users to view folder and file names, file data, and file attributes.
Users are also able to access the shared folder’s subfolders, and run program files and scripts.
 Change: Those who are granted the Change permission can perform all of the functions that the
Read permissions grant as well as create and delete files and subfolders. Users are also able to
change file attributes, change the data in files, and append data to files.
 Full Control: Users that are granted the Full Control permission can perform all the tasks that the
Change permissions enable, take ownership of files, and change file permissions.

Determining Network Security


Computer System and Network Security Page 6
FIGURE 2. Permissions Window of a Shared Folder

Windows XP Professional and Windows Vista Business are limited to a maximum of 10 simultaneous file-
sharing connections.

Determining Network Security


Computer System and Network Security Page 7
Self-Check 1 Written Test

Name: __________________________________ Date: ______________

Directions: Match the definition on the left with a term on the right. Write the letter only. All
definitions and terms are used exactly one time.

DEFINITIONS TERMS
a. A folder option that can only be accessed
locally. _______1. Share this folder
b. Used to restrict access to a folder or file
that is shared over a network _______2. Permission
c. Can perform all the tasks that the Change
permissions enable, take ownership of _______3. Shared Folder Permission
files, and change file permissions.
d. A folder option in which users are allowed _______4. Read
to access the folder.
e. Can perform all of the functions that the _______5. Offline Settings
Read permissions grant as well as create
and delete files and subfolders _______6. Change
f. The maximum number of connections that
are concurrently permitted to the shared _______7. Do not share this folder
folder.
g. The name users would see and utilize to _______8. User limit
access the folder
h. Permission allows users to view folder and _______9. Full control
file names, file data, and file attributes.
i. The manner in which folders are cached at _______10. Share name
times when the folder is offline
j. A folder option that can be accessed
locally and over the network

Note: Satisfactory rating – 9 points and above / Not satisfactory - below 9


points

Determining Network Security


Computer System and Network Security Page 8
Operation 1 Share a Folder, Share a Printer, and Set Share
Permissions in Windows XP

In this activity, you will create and share a folder, share a printer, and set permissions for the
shares.

Recommended Equipment

 Two computers running Windows XP Professional that are directly connected to each other
or through a switch or hub

 A printer installed on one of the two computers

Step 1: Choose My Computer > Tools > Folder Options


Click the View tab

Uncheck the “Use Simple File Sharing (Recommended)” checkbox, and then click OK.

Determining Network Security


Computer System and Network Security Page 9
Step 2: Right-click the desktop, and then choose New > Folder.
Type Example, and then press the Return key.

Open WordPad. Type “This is an example document.”.

Save the file in the “Example” folder with the name “Brief.doc”, and then close WordPad.

Step 3: Right-click the Example folder, and then choose Sharing and Security
Click the Share this folder radio button, and then click OK.

What is the icon of the “Example” folder? _______________________________

Determining Network Security


Computer System and Network Security Page 10
On the computer with the shared folder, right-click My Computer, and then click the
Computer Name tab.

What is the name of the computer? ______________________________________

Step 4: On the other computer, choose Start > Run.


Type \\computername\Example, where computername is the name of the computer with
the “Example” folder, and then press the Enter key.

Open the “Brief.doc” file.

Delete the text in the “Brief.doc” file, and then choose File > Save.

What happens? ______________________________________________________________

Click OK.

Close WordPad, and then choose NO when prompted to save changes to the file.

Step 5: Return to the computer with the shared folder.


Right-click Example folder > Sharing and Security, and then click Permissions.

What are the default permissions?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Step 6: Open the Control Panel on the computer with the attached printer.
Choose Printers and Other Hardware > Printers and Faxes.

Right-click the icon of the installed printer, and then choose Sharing….

Click the Share this printer radio button, and then click OK.

Determining Network Security


Computer System and Network Security Page 11
Step 7: Return to the computer that is not directly connected to a printer.
Open the Control Panel. Choose Printers and Other Hardware > Printers and Faxes.

Choose File > Add Printer on the screen below.

Determining Network Security


Computer System and Network Security Page 12
The “Add Printer Wizard” window appears.

Click Next.

The Local or Network Printer of the Add Printer Wizard window appears. Click the A
network printer, or a printer attached to another computer radio button, and then click
Next.

Determining Network Security


Computer System and Network Security Page 13
The “Specify a Printer” window appears.
Click the Connect to this printer radio button, and then click Next.

The Browse for a Printer window appears.

Determining Network Security


Computer System and Network Security Page 14
Expand “Shared printers”.

Choose the printer from the list, and then click Next.

The “Default Printer” screen of the “Add Printer Wizard” appears.

Click Next.

The “Completing the Add Printer Wizard” window appears.

Click Finish.

Determining Network Security


Computer System and Network Security Page 15
Step 8: Choose Start > Printers and Faxes.
Right-click the printer you installed, and then choose Properties.

The “Printer Properties” window appears.

Choose the General Tab, and then click Print Test Page.

Determining Network Security


Computer System and Network Security Page 16
Click OK in the confirmation dialog box, and then click OK to close the printer properties
window.

Determining Network Security


Computer System and Network Security Page 17
Information sheet 2 Security Threats

A Network attack or security or security incident is defined as a threat, intrusion, denial of service or
other attack on a network infrastructure that will analyze your network and gain information to
eventually cause your network to crash or to become corrupted. In many cases, the attacker might not
only be interested in exploiting software applications, but also try to obtain unauthorized access to
network devices. Unmonitored network devices are the main source of information leakage in
organizations. In most organizations, every email message, every web page request, every user logon,
and every transmittable file is handled by a network device. Under some setups, telephone service and
voice messaging are also handled by network devices. If the attacker is able to "own" your network
devices, then they "own" your entire network. Network attacks cut across all categories of software and
platform type.

There are at least eight types of network attacks.

1. Spoofing.
2. Sniffing.
3. Mapping.
4. Hijacking.
5. Trojans.
6. DoS and DDoS.
7. Social engineering.
8. Phishing

1. Spoofing (Identity spoofing or IP Address Spoofing)

FIGURE 1. Spoofing

Determining Network Security


Computer System and Network Security Page 18
Any internet connected device necessarily sends IP datagrams into the network. Such internet data
packets carry the sender's IP address as well as application-layer data. If the attacker obtains control
over the software running on a network device, they can then easily modify the device's protocols to
place an arbitrary IP address into the data packet's source address field. This is known as IP spoofing,
which makes any payload appear to come from any source. With a spoofed source IP address on a
datagram, it is difficult to find the host that actually sent the datagram.

The countermeasure for spoofing is ingress filtering. Routers usually perform this. Routers that
perform ingress filtering check the IP address of incoming datagrams and determine whether the
source addresses that are known to be reachable via that interface. If the source addresses that are
known to be reachable via that interface. If the source address is not in the valid range, then such
packets will be discarded.

2. Sniffing

FIGURE 2. Sniffing

Packet sniffing is the interception of data packets traversing a network. A sniffer program works at
the Ethernet layer in combination with network interface cards (NIC) to capture all traffic traveling
to and from internet host site. Further, if any of the Ethernet NIC cards are in promiscuous mode,
the sniffer program will pick up all communication packets floating by anywhere near the internet
host site. A sniffer placed on any backbone device, inter-network link or network aggregation point
will therefore be able to monitor a whole lot of traffic. Most of packet sniffers are passive and they
listen all data link layer frames passing by the device's network interface. There are dozens of freely
available packet sniffer programs on the internet. The more sophisticated ones allow more active
intrusion.

Determining Network Security


Computer System and Network Security Page 19
The key to detecting packet sniffing is to detect network interfaces that are running in promiscuous
mode. Sniffing can be detected two ways:

1. Host-based: Software commands exist that can be run on individual host machines to tell if the
NIC is running in promiscuous mode.
2. Network-based: Solutions tend to check for the presence of running processes and log files,
which sniffer programs consume a lot of. However, sophisticated intruders almost always hide
their tracks by disguising the process and cleaning up the log files.

The best countermeasure against sniffing is end-to-end or user-to-user encryption.

3. Mapping (Eavesdropping)

FIGURE 3. Eavesdropping

Before attacking a network, attackers would like to know the IP address of machines on the
network, the operating systems they use, and the services that they offer. With this information,
their attacks can be more focused and are less likely to cause alarm. The process of gathering this
information is known as mapping.

In general, the majority of network communications occur in an unsecured or "clear text" format,
which allows an attacker who has gained access to data paths in your network to "listen in" or
interpret the traffic. When an attacker is eavesdropping on your communications, it is referred to as
sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest
security problem that administrators face in an enterprise.

Counter measures are strong encryption services that are based on cryptography only. Otherwise
your data can be read by others as it traverses the network.

Determining Network Security


Computer System and Network Security Page 20
4. Hijacking (man-in-the-middle)

FIGURE 4. Hijacking

This is a technique that takes advantage of a weakness in the TCP/IP protocol stack, and the way
headers are constructed. Hijacking occurs when someone between you and the person with whom
you are communicating is actively monitoring, capturing, and controlling your communication
transparently. For example, the attacker can re-route a data exchange. When computers are
communicating at low levels of the network layer, the computers might not be able to determine
with whom they are exchanging data.

Man-in-middle attacks are like someone assuming your identity in order to read your message. The
person on the other end might believe it is you, because the attacker might be actively replying as
you, to keep the exchange going and gain more information.

Determining Network Security


Computer System and Network Security Page 21
5. Trojans

FIGURE 5. Trojans

These are programs that look like ordinary software, but actually perform unintended or malicious
actions behind the scenes when launched. Most remote control spyware programs are of this type.
The number of trojan techniques are only limited by the attacker's imagination. A torjanizes file will
look, operate, and appear to be the same size as the compromised system file.

The only protection is early use of a cryptographic checksum or binary digital signature procedure.

6. Denial-of-Service (DoS) and Distributed-Denial-of-Service (DDoS)

FIGURE 6. DoS and DDoS

Determining Network Security


Computer System and Network Security Page 22
A denial of service attack is a special kind of Internet attack aimed at large websites. It is a type of
attack on a network that is designed to bring the network to its knees by flooding it with useless
traffic. Denial of Service can result when a system, such as a Web server, has been flooded with
illegitimate requests, thus making it impossible to respond to real requests or taks. Yahoo! and e-
bay were both victims of such attacks in February 2000.

A Dos attack can be perpetrated in a number of ways. There are three basic types of attack.

* Consumption of computational resources, such as band width, disk space or CPU time.
* Disruption of configuration information, such as routing information.
* Disruption of physical network components.

The consequences of a DoS attack are the following:

* Unusually slow network performance.


* Unavailability of a particular web site.
* Inability to access any web site.
* Dramatic increase in the amount of spam you receive in your account.

Common forms of denial of service attacks are,

a. Buffer Overflow Attacks

FIGURE 7. Buffer Overflow

Determining Network Security


Computer System and Network Security Page 23
The most common kind of DoS attack is simply to send more traffic to a network address than the programmer's
expectation on size of buffers. A few of the better known attacks based on the buffer characteristics of a program or
system include:

 Sending e-mail messages that have attachments with 256 character file names to Netscape and Microsoft
mail programs.
 Sending oversized Internet Control Message Protocol (ICMP) packets.
 Ending to a user of an e-mail program a message with a "From" address longer than 256 characters.

b. Smurf Attack

FIGURE 8. Smurf Attack

In this attack, the perpetrator sends an IP ping request to a receiving site. The ping packet
specifies that, it is broadcast to a number of hosts within the receiving site's local network. The
packet also indicates that the request is from another site, which is the target site that is to
receive the denial of service attack. The result will be lots of ping replies flooding back to the
innocent, spoofed host. If the flood is great enough, the spoofed host will no longer be able to
receive or distinguish real traffic.

Determining Network Security


Computer System and Network Security Page 24
C. SYN floods

FIGURE 9. SYN floods attack

When a computer wants to make a TCP/IP connection to another computer, usually a server, an
exchange of TCP/SYN and TCP/ACK packets of information occur. The computer requesting the
connection, usually the client's or user's computer sends a TCP/SYN packet which asks the
server if it can connect. If the server is ready, it sends a TCP/SYN-ACK packet back to the client to
say "Yes, you may connect" and reserves a space for the connection, waiting for the client to
respond with a TCP/ACK packet. In a SYN flood, the address of the client is often forged so that
when the server sends a TCP/SYN-ACK packet back to the client, the message is never received
from client because the client either doesn't exist or wasn't expecting the packet and
subsequently ignores it. This leaves the server with a dead connection, reserved for a client that
will never respond. Usually this is done to one server many times in order to reserve all the
connections for unresolved clients, which keeps legitimate clients from making connections.

Determining Network Security


Computer System and Network Security Page 25
Distributed Denial-of-Service

FIGURE 10. DDoS attack

A distributed denial of service attack (DDoS) occurs when multiple compromised systems or multiple
attackers flood the bandwidth or resources of a targeted system with useless traffic. These systems are
compromised by attackers using a variety of methods.

In DDoS attacks, the attacker first gains access to user accounts on numerous hosts across the Internet.
The attacker then installs and runs a slave program at each compromised site that quietly waits for
commands from a master program running, the master program then contacts the slave programs,
instructing each of them to launch a denial-of-service attack directed at the same target host. The
resulting coordinated attack is particularly devastating, since it comes from so many attacking hosts at
the same time.

Here also ingress filtering only can control DoS attack and that too to a small extent.

Determining Network Security


Computer System and Network Security Page 26
7. Social Engineering

FIGURE 11. Social Engineering Attack

Social engineering is the use of persuasion or deception to gain access to information systems. The
medium is usually a telephone or e-mail message. The attacker usually pretends to be a director or
manager in the company traveling on business with a deadline to get some important data left on their
network drive. They pressure the help desk to give them the toll-free number of the RAS server to dial
and sometimes get their password reset. The main purpose behind social engineering is to place the
human element in the network-breaching loop and use it as a weapon. The human element has been
referred to as the weakest link in network security.

Examples of social engineering:

1. Faked Email: The social engineer sends a message to one or more users in a domain that "this is
the system administrator and your password must be reset to user 123” for a temporary period of
time. The hacker then continuously monitors for the change and then exploits the whole system.
2. Fictitious Competition: The social engineer manipulates a group of users to participate in some
fake competition for a jackpot prize, with the ultimate purpose of eventually extracting
confidential information about network and password security.
3. The Helpful Help Desk: The help desk gets a call from the social engineer impersonating a user
reporting a forgotten password. In many cases the help desk will change the user's password over
the phone. The hacker now has a legitimate user name and password to work with. To avoid
problems from the original user, the social engineer will then call the user who was impersonated

Determining Network Security


Computer System and Network Security Page 27
and say something like “This is Vivek from MIS department. We had some problems with security
today, so we have changed your password. Your new password is angel123."

8. Phishing

FIGURE 12. Phishing attack

Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an
attempt to gather personal and financial information from recipients. Typically, the messages appear to
come from well-known and trustworthy Web sites. Web sites that are frequently spoofed by phishers
include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing
expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few
of the prey that encounter the bait.

Most people associate phishing with e-mail messages that spoof, or mimic, banks, credit card companies
or other business like Amazon and eBay. These messages look authentic and attempt to get victims to
reveal their personal information. But e-mail messages are only one small piece of a phishing scam.

From beginning to end, the process involves:

1. Planning. Phishers decide which business to target and determine how to get e-mail addresses for
the customers of that business. They often use the same mass-mailing and address collection
techniques as spammers.
2. Setup. Once they know which business to spoof and who their victims are, phishers create
methods for delivering the message and collecting the data. Most often, this involves e-mail
addresses and a Web page.
3. Attack. This is the step people are most familiar with -- the phisher sends a phony message that
appears to be from a reputable source.
4. Collection. Phishers record the information victims enter into Web pages or popup windows.
5. Identity Theft and Fraud. The phishers use the information they've gathered to make illegal
purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover

Determining Network Security


Computer System and Network Security Page 28
If the phisher wants to coordinate another attack, he evaluates the successes and failures of the
completed scam and begins the cycle again.

Phishing scams take advantages of software and security weaknesses on both the client and server
sides. But even the most high-tech phishing scams work like old-fashioned con jobs, in which a hustler
convinces his mark that he is reliable and trustworthy.

The Importance of Logging and Traffic Monitoring for Information Security

If you ask yourself how you can get a complete view for your network, the answer will be almost
through using a complete logging system and through using almost all the available traffic monitoring
tools. All of them can combine with each other to give you a complete and a clear picture about the
traffic passing through your network.

From monitoring you can detect hacking attempts, virus or worm infections and propagation,
configuration problems, exploits, hardware problems and many others. Monitoring is an important
factor to maintain stability for the network.

Information security focuses on ensuring confidentiality, integrity and availability. From network
monitoring you can detect attempts to access forbidden information or resources such as unauthorized
access, which in turn ensure confidentiality. You can detect attempts to change or alter information
such as file modification, which ensure integrity. And you can detect any kind of problems that can
affect the availability of the information such as DOS or DDOS attack.

FIGURE 13. Security Process Model

Determining Network Security


Computer System and Network Security Page 29
Figure 13 shows the steps required to implement secure information system and to maintain it as secure
as possible. The steps are as follow

1- Develop a security procedure that is suitable for your network. And that covers all the
security issues related to your network.
2- Secure the network by implementing the developed security procedure.
3- Monitor the network & respond to attacks.
4- Test the existing network security. Check the security holes that you detect through
monitoring.
5- Manage and improve the security procedure and the implementation.
6- Then you have to return back to step (3) to monitor, test and improve.

It is clear that the security process is a dynamic process. You must keep yourself updated with any new
technology that can assist your security. And you must always check that your security policy is good
implemented and in effect by periodic monitoring and testing.

Network monitoring gives the ability to monitor the activities of the applications and the devices to
ensure expected and normal operations. On the other hand it helps to detect problems and take the
necessary actions to correct them. It can guide you to discover the security holes opened through your
network intentionally by attackers or unintentionally such as disabled or unused suspicious services that
may be enabled by mistake.

Anyone can easily notice that attacks have become more sophisticated in the last several years as the
level of attack automation has increased. You can obtain Sample and fully functional attack software
easily from the Internet. Precompiled and ready to use programs allow any user to launch relatively
large-scale attacks with little knowledge of the underlying security exploits. Because of that, Attack
monitoring is a crucial part of the information system operation. The attack monitoring and detection
can be achieved through network monitoring.

Network monitoring could be achieved through the following:

 Using an accurate and complete logging system for almost all devices.
 Using almost all the available traffic monitoring tools including bandwidth monitoring,
packet sniffing, IDSs.

Logging can give detailed information about any access or change for any of the network resources.
Frequently, uses of traffic monitoring tools help you to distinguish between normal traffic and suspicious
one.

There are many free network-monitoring tools. That can help you to easily enhance your security; you
do not have to care too much about the budget. The free tools are such as kiwi syslog daemon, backlog

Determining Network Security


Computer System and Network Security Page 30
for logging purposes and ethereal, MRTG, Snort (IDS), for traffic monitoring purposes. We will give a hint
about some of them later.

It is not an easy job to perfectly monitor the network. At the beginning you may face many difficulties in
understanding and analyzing your logs and your network traffic. You also consume a lot of time to do
that. By time you can gain the required experience to do your job quickly and easily. This can be
achieved through being familiar with the normal logs and traffic passed through your network.

A. Logging

Logging can be a security administrator’s best friend. It’s like an administrative partner that is always at
work, never complains, never gets tired, and is always on top of things. If properly instructed, this
partner can provide the time and place of every event that has occurred in your network or system.

Each network device or system has its own logging system such as UNIX servers, Windows servers,
firewalls, routers, cache engines, IDSs, applications. You must monitor and analyze almost all the logs
from your network devices and systems.

Centralized logging facilitates the process of monitoring and analyzing log messages. It is good practice
to use a centralized syslog server for each type of devices, as an example:

 syslog server for all the UNIX servers


 syslog server for all the windows servers
 syslog server for all the firewalls

But at the end the decision depends on the size of the monitored network. It is important for every
security or network administrator to review the content of log files for suspicious entries indicating that
a potential attack has occurred, or in the process of occurring in daily basis. Doing that, will help him to
enhance and maintain the security process.

Logging Management Technique

Logging management is very important, to have a good event logs you must have two main
characteristics:

 Synchronized time stamp for each event.


 Sufficient logging level activity to produce detailed events of system activity.
 Sufficient archived logging information to be available if needed.

Determining Network Security


Computer System and Network Security Page 31
Logging and Network Time Protocol (NTP)

Logs are dependent on time, it is very important that your network devices, systems and your
logging servers have an accurate time. To help ensure this, the Network Time Protocol (NTP)
service is used.

Time synchronization is a must to have accurate and useful logging system, all your systems and
network devices must have synchronized time stamp. If you look at any log message you will
find that the time stamp is a basic part of it. If you have an accurate time for your logs you will
be able to relate logging messages from different systems and network devices. In case of attack
or any other network problem you could be able to analyze the logs from all the systems and
the network devices based on correct time. This could help to detect the attack or the cause of
the problem and to solve it.

Choosing Logging Level

There are different logging levels (severity0-severity7), which are defined as Emergency, Alert,
Critical, Error, Warning, Notice, Informational and Debug.

The level of the syslog message specifies the type of messages sent to the syslog host.

Logging level is an important parameter that must be taken into consideration. You must choose
the minimum level that gives you sufficient information. Choosing the suitable logging level
helps you to maintain the stability of the network and to ensure that there will not be losses for
required logging information. As an example if you set the logging level to be the highest logging
level, which is debugging, there will be huge number of logging messages that require a
substantial amount of disk space, high performance system, and adequate network bandwidth
(especially if there is remote logging). In normal situation the error or the warning logging level
could be enough. In situations that depend on or require more information you can increase the
logging level as needed

Logging Archival

Log server needs to have adequate amount of disk storage in order to hold all of the log
messages that it is going to receive. As you look at your logging hosts you will notice that
they are starting to fill up your storage media quickly, especially if you are in an active
environment. Archiving your logs will help prevent your logging hosts from crashing due
to storage limits being reached; which in turn leads to loss logging information. Using
industry standard archive software, in combination with tape storage devices, network
shares, CD-R, CD-RW, or Zip/Jazz drives; you can easily archive the logs. Logging archival
is one step to have good and complete logs. It helps you to return back to the old logs if
you are in situation requires reviewing them.

Determining Network Security


Computer System and Network Security Page 32
Syslog Servers

The log message is a useful mean to view troubleshooting messages and to watch for network
events such as attacks, service denials. The syslog server is a server listen to different log
messages from different servers. Using the syslog server you can establish a centralized logging
system.

The RFC 3164 states that the syslog protocol provides a transport to allow a machine to send
event notification messages across IP networks to event message collectors, also known as
syslog server. Syslog server uses the user datagram protocol (UDP) as its underlying transport
layer mechanism. The UDP port that is assigned to the syslog is 514.

As an example of syslog servers is Kiwi Syslog Daemon. Kiwi syslog site defines it as a freeware
server for Windows (you can use the basic features for free). It receives logs, displays and
forwards syslog messages from hosts such as routers, switches, UNIX hosts and any other syslog-
enabled device. Using it you can archive the received messages into files in daily, weekly,
monthly or custom basis.

Traffic Monitoring

There are many types of traffic monitoring tools that can be combined to monitor the traffic for the
network devices, systems and applications. Frequently use of traffic monitoring tools helps you to be
familiar with your normal traffic and as a result you can detect any suspicious traffic passing through
your network.

The following are some types of the traffic monitoring tools:

 Bandwidth monitoring

As an example of the bandwidth monitoring tools is the Multi Router Traffic Grapher
(MRTG). MRTG homepage states that it is a tool to monitor the traffic load on network-links.
MRTG generates HTML pages containing graphical images, which provide a live visual
representation of this traffic.

MRTG consists of a Perl script which uses SNMP to read the traffic counters of your routers
and a fast C program which logs the traffic data and creates beautiful graphs representing
the traffic on the monitored network connection.

These graphs are embedded into Web Pages, which can be viewed, from any modern Web-
browser. As an example, Figure 14 and 15 are two graphs for the daily utilization of 1Mb
bandwidth network. If you monitor the graph frequently, you can distinguish between
normal and abnormal traffic.

Determining Network Security


Computer System and Network Security Page 33
The X-axis represents the hours of the day and the Y-axis represents the bandwidth
utilization in Kbytes.

FIGURE 14. Bandwidth Utilization 1

Figure 14 shows the normal use for the network bandwidth

FIGURE 15. Bandwidth Utilization 2

Figure 15 shows abnormal use for the network bandwidth. There is a suspicious traffic
passing through the network. You can notice the difference easily the shape of the
graph gives a clear view. Using MRTG gives a global overview for your network traffic. It
could be used as a first step to check and monitor your traffic. From which you can take
further steps to detect suspicious traffic or problems.

 Packet Sniffing

As an example of the packet sniffing tools is Ethereal. Ethereal homepage states that it is a
free network protocol analyzer for UNIX and Windows. It allows you to examine data from a
live network or from a capture file on disk.

You can interactively browse the capture data, viewing summary and detail information for
each packet. If you have doubt that there is suspicious traffic passing through your network
or you have a problem and you want to know the source address, the destination address,
the source port, the destination port, and the protocol for that traffic or problem, Ethereal
could be of great help to you. At that point you could have all the information required to
detect the attack and stop it or to detect the cause of the problem and correct it.
Determining Network Security
Computer System and Network Security Page 34
 Network-based IDS

Intrusion Detection is the process of monitoring the events occurring in an IT system and
analyzing them for signs of intrusions. These intrusions are the results of attackers accessing
systems from the Internet, authorized users of the systems who attempt to gain additional
unauthorized privileges, and authorized users who misuse the privileges given to them.

There are different types of Intrusion Detection Systems (IDS). There are Network-based IDS
(NIDS), Network Node IDS (NNIDS), and Host-based IDS (HIDS). We will talk briefly about one of
them, which is the Network-based ID system. It works like burglar alarm, alerting security people
if an attack is taking place so that they can respond accordingly. It can detect intrusion by using
signature/pattern analysis (signatures that are characteristics of an attack), or by using
anomaly/heuristic analysis.

It is very important to notice that the IDS must be updated with the new attack signatures as
soon as possible; most of the hackers try to use the new attacks to be able to compromise the
systems before the administrator can patch them or apply the new updates.

IDS can do the following

o Identify attacks that firewall legitimately allow through (such as http attacks against web
servers).
o Identify attempts such as port scan or ping sweep.
o Notice insider hacking.
o Provide additional checks for holes/ports opened through firewalls, intentionally or
unintentionally

Snort is an example of the free available IDS. The IDS capture each packet passing through a
network segment and detects suspicious ones. It gives information about the source address,
the destination address, the source port, the destination port, the attack type, the time of
attack, it could also give advice about the required software upgrade or patches that could be
used to prevent this attacks, and more other useful information. From the above you can see
that the IDS can help you to detect the attacks that are already happened or in the process of
happening through your network. It can help also to detect failed trials of attackers. And this can
lead you to take the required actions to protect your network.

 Worm Detection

Every day start by checking the MRTG graph for bandwidth utilization. The shape of the graph
oscillations gives an indication about the network traffic if it is normal or not.

Determining Network Security


Computer System and Network Security Page 35
The steps toward detecting Worm problem:

o Check the MRTG graph


o The next step was to check the firewall log file size. The firewall log file was about 9
times multiple of the usual size.
o Using Ethereal to be able to quickly detect the cause of the problem, there was a high
percentage of ICMP traffic passing through the network.

Worm detection is done through network monitoring:

o Using bandwidth monitoring tool


o Using logging, daily monitoring
o Using packet sniffing tool

Suggested Method for Network Monitoring

After the above overview about the logging and the traffic monitoring tools, and about some of the
detected cases from the network monitoring, it is time to suggest a method that could be used daily to
monitor the network.

1- Use a traffic-monitoring tool like MRTG to have a general idea about your bandwidth
utilization. Bandwidth monitoring gives you a quick overview of the traffic leaving and
entering your network. It can guide you to the next step that you can follow in case of
detecting abnormal traffic.

2- Take a quick look for your logs, check the log file size if possible it can give an indication
about attacks or errors. Start by looking at the firewall logs and then the servers.

3- Keep monitoring the IDS logs. There is much more information that we can’t mention
about how to analyze your IDS logs. We will talk briefly about some of the guidelines
that you can follow to monitor your IDS events.

First of all you must have a good archiving mechanism for your IDS logging. Professional
attackers always try to hide their steps and this can be done by scheduling the process
of attacking to be executed on different days, good archiving enables you to easily
monitor the events and to detect previous hacking attempts.

It is better to care about the following when you monitor your IDS alerts:

o The total number of alarms coming from one source address


o The number of attack types coming from one source address

Determining Network Security


Computer System and Network Security Page 36
o The total number of destination addresses receiving attacks from
o one source address
o The new attack types
o The attacks that is rarely or not appear before.
o The time period in which the attack events happened.

If the total number of alarms received from one source address is high this may be an
indication of attack from that source address. If the number of attack signature types
coming from one source address is high this may be an indication of attack from that
source address, some well-known attack programs have a certain set of signature types
that you can detect by frequently monitoring the IDS. If there is a number of
destinations receive the same type of attack signatures from one source address this
may be an indication of attack. Most professional attackers use the new attacks to
compromise systems so you must care about new attacks, update your IDS with the new
signature. Also you must notice the old attacks that you do not use to see them when
monitoring your IDS. The time at which the attack happened could give some help, most
attackers trying to hack systems in the nonworking hours to be sure that there is no one
monitoring or watching them. The time period also is an important factor it can help you
to guess if the attacker is using automated tool to hack the system, usually it takes small
period of time if they use automated tools. All of the above factors can be combined to
help you to detect if the alarms are false ones or they are indication of actual attacks.

4- Use a packet-sniffing tool like Ethereal to see if your traffic is normal or abnormal. Using
packet sniffing tools can help you to be aware of the different protocols passing through
your network, you can know the percentage traffic omitted from each protocol, and you
can know the source and the destination addresses for all traffic. Packet sniffing tools
require great amount of disk storage because it receives a copy of each packet passing
through the network. You do not have to operate the packet sniffing software all the
time, but it is preferable to have it available when you need to use it.

Determining Network Security


Computer System and Network Security Page 37
Self-Check 2 Written Test

Name: __________________________________ Date: ______________

Directions: Match the definition on the left with a term on the right. Write the letter only. All
definitions and terms are used exactly one time.

DEFINITIONS TERMS
a. is the interception of data packets
traversing a network _________1. Packet sniffing
b. is the process of monitoring the events
occurring in an IT system and analyzing _________2. Intrusion Detection
them for signs of intrusions
c. is carried out by attackers that manage to _________3. Man-in-the-middle
position themselves between two
legitimate hosts. _________4. Syslog server
d. is a server listen to different log messages
from different servers. _________5. Trojans
e. These are programs that look like ordinary
software, but actually perform unintended _________6. Log message
or malicious actions behind the scenes
when launched _________7. DoS
f. is a must to have accurate and useful
logging system, all your systems and _________8. Time Synchronization
network devices must have synchronized
time stamp _________9.Social Engineering
g. is a useful mean to view troubleshooting
messages and to watch for network events _________10. Phishing
such as attacks, service denials
h. It is a type of attack on a network that is
designed to bring the network to its knees
by flooding it with useless traffic
i. is an e-mail fraud method in which the
perpetrator sends out legitimate-looking
email in an attempt to gather personal and
financial information from recipients.
j. is the use of persuasion or deception to
gain access to information systems. The
medium is usually a telephone or e-mail
message

Note: Satisfactory rating – 9 points and above / Not satisfactory - below 9


points

Determining Network Security


Computer System and Network Security Page 38
Operation 2 Capturing Sniffing Traffic using Wireshark

Name: _____________________________ Date: ______________

Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network
troubleshooting, analysis, software and protocol development, and education. Before June 2006,
Wireshark was known as Ethereal.

A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can
intercept and log data traffic passing over a data network. As data streams travel back and forth over
the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its
content according to the appropriate RFC or other specifications.

Wireshark is programmed to recognize the structure of different network protocols. This enables it to
display the encapsulation and individual fields of a PDU and interpret their meaning. It is a useful tool for
anyone working with networks for data analysis and troubleshooting.

For information and to download the program go to - http://www.Wireshark.org

Scenario

To capture PDUs the computer on which Wireshark is installed must have a working connection to the
network and Wireshark must be running before any data can be captured.

When Wireshark is launched, the screen below is displayed.

Determining Network Security


Computer System and Network Security Page 39
To start data capture it is first necessary to go to the Capture menu and select the Options choice. The
Options dialog provides a range of settings and filters which determines which and how much data
traffic is captured.

Determining Network Security


Computer System and Network Security Page 40
First, it is necessary to ensure that Wireshark is set to monitor the correct interface. From the Interface
drop down list, select the network adapter in use. Typically, for a computer this will be the connected
Ethernet Adapter.

Then other Options can be set. Among those available in Capture Options, the two highlighted below
are worth examination.

Determining Network Security


Computer System and Network Security Page 41
Setting Wireshark to capture packets in promiscuous mode

If this feature is NOT checked, only PDUs destined for this computer will be captured. If this feature is
checked, all PDUs destined for this computer AND all those detected by the computer NIC on the same
network segment (i.e., those that "pass by" the NIC but are not destined for the computer) are captured.

Note: The capturing of these other PDUs depends on the intermediary device connecting the end device
computers on this network. As you use different intermediary devices (hubs, switches, routers)
throughout these courses, you will experience the different Wireshark results.

Determining Network Security


Computer System and Network Security Page 42
Setting Wireshark for network name resolution

This option allows you to control whether or not Wireshark translates network addresses found in PDUs
into names. Although this is a useful feature, the name resolution process may add extra PDUs to your
captured data perhaps distorting the analysis.

There are also a number of other capture filtering and process settings available. Clicking on the Start
button starts the data capture process and a message box displays the progress of this process.

As data PDUs are captured, the types and number are indicated in the message box

Determining Network Security


Computer System and Network Security Page 43
The examples above show the capture of a ping process and then accessing a web page.

When the Stop button is clicked, the capture process is terminated and the main screen is displayed.

This main display window of Wireshark has three panes.

Determining Network Security


Computer System and Network Security Page 44
The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet captured. By
clicking on packets in this pane, you control what is displayed in the other two panes.

The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in the Packet
List Pane in more detail.

The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (in hexadecimal
form representing the actual binary) from the packet selected in the Packet List Pane, and highlights the
field selected in the Packet Details Pane.

Each line in the Packet List corresponds to one PDU or packet of the captured data. If you select a line in
this pane, more details will be displayed in the "Packet Details" and "Packet Bytes" panes. The example
above shows the PDUs captured when the ping utility was used and http://www.Wireshark.org was
accessed. Packet number 1 is selected in this pane.

The Packet Details pane shows the current packet (selected in the "Packet List" pane) in a more detailed
form. This pane shows the protocols and protocol fields of the selected packet. The protocols and fields
of the packet are displayed using a tree, which can be expanded and collapsed.

The Packet Bytes pane shows the data of the current packet (selected in the "Packet List" pane) in what
is known as "hexdump" style. In this lab, this pane will not be examined in detail. However, when a more
in-depth analysis is required this displayed information is useful for examining the binary values and
content of PDUs.

The information captured for the data PDUs can be saved in a file. This file can then be opened in
Wireshark for analysis some time in the future without the need to re-capture the same data traffic
again. The information displayed when a capture file is opened is the same as the original capture.

When closing a data capture screen or exiting Wireshark you are prompted to save the captured PDUs.

Clicking on Continue without Saving closes the file or exits Wireshark without saving the displayed
captured data.

Determining Network Security


Computer System and Network Security Page 45
Task 1: Ping PDU Capture

Step 1: After ensuring that the standard lab topology and configuration is correct, launch Wireshark on
a computer in a lab pod.

Set the Capture Options as described above in the overview and start the capture process.

From the command line of the computer, ping the IP address of another network connected
and powered on end. Make sure to remember the IP address.

After receiving the successful replies to the ping in the command line window, stop the packet
capture.

Step 2: Examine the Packet List pane.

The Packet List pane on Wireshark should now look something like this:

Look at the packets listed above; we are interested in packet numbers 6, 7, 8, 9, 11, 12, 14 and
15. (NOTE: numbers may vary)

Locate the equivalent packets on the packet list on your computer.

If you performed Step 1 above match the messages displayed in the command line window
when the ping was issued with the six packets captured by Wireshark.
From the Wireshark Packet List answer the following:
What protocol is used by ping? ______________________________
What is the full protocol name? ______________________________
What are the names of the two ping messages? ______________________________
_____________________________________________________________________
Are the listed source and destination IP addresses what you expected? Yes / No
Why? ___________________________________

Determining Network Security


Computer System and Network Security Page 46
Step 3: Select (highlight) the first echo request packet on the list with the mouse.

The Packet Detail pane will now display something similar to:

Click on each of the four "+" to expand the information.

The packet Detail Pane will now be similar to:

As you can see, the details for each section and protocol can be expanded further. Spend some
time scrolling through this information. At this stage of the course, you may not fully understand
the information displayed but make a note of the information you do recognize.

Locate the two different types of 'Source" and "Destination". Why are there two types?
__________________________________________________________________

What protocols are in the Ethernet frame?


____________________________________________________________

Determining Network Security


Computer System and Network Security Page 47
As you select a line in the Packets Detail pane all or part of the information in the Packet Bytes
pane also becomes highlighted.
For example, if the second line (+ Ethernet II) is highlighted in the Details pane the Bytes pane
now highlights the corresponding values.

This shows the particular binary values that represent that information in the PDU. At this stage
of the course, it is not necessary to understand this information in detail.

Step 4: Go to the File menu and select Close.

Click on Continue without Saving when this message box appears.

Task 2: HTTP PDU Capture

Step 1: Start packet capture.


Assuming Wireshark is still running from the previous steps, start packet capture by clicking on
the Start
option on the Capture menu of Wireshark.

Note: Capture Options do not have to be set if continuing from previous steps of this lab.

Launch a web browser on the computer that is running Wireshark.


Enter the URL www.wireshark.org
When the webpage has fully downloaded, stop the Wireshark packet capture.

Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed.
Locate and identify the TCP and HTTP packets associated with the webpage download.
Determining Network Security
Computer System and Network Security Page 48
Step 3: In the Packet List pane, highlight an HTTP packet that has the notation "(text/html)" in the
Info column.

In the Packet Detail pane click on the "+" next to "Line-based text data: html"
When this information expands what is displayed?
___________________________________________________________________

Examine the highlighted portion of the Byte Panel.


This shows the HTML data carried by the packet.

When finished close the Wireshark file and continue without saving

Task 3: Reflection

Consider the encapsulation information pertaining to captured network data Wireshark can provide.
Relate this to the OSI and TCP/IP layer models. It is important that you can recognize and link both the
protocols represented and the protocol layer and encapsulation types of the models with the
information provided by Wireshark.

Task 4: Challenge
Discuss how you could use a protocol analyzer such as Wireshark to:

(1) Troubleshoot the failure of a webpage to download successfully to a browser on a computer.


and
(2) Identify data traffic on a network that is requested by users.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

Task 5: Cleanup
Unless instructed otherwise by your instructor, exit Wireshark and properly shutdown the computer.

Determining Network Security


Computer System and Network Security Page 49
Information Sheet – 3 Signature Files for Anti-Virus Software

Threats to security from viruses and worms are always present. Attackers constantly look for new ways
to infiltrate computers and networks. Because new viruses are always being developed, security
software must be continually updated. This process can be performed automatically, but a technician
should know how to manually update any type of protection software and all customer application
programs. See Figure 1

FIGURE 1. Signature File Update

1. Set Windows Restore Point – if the file you load is corrupt, setting a restore point will allow
you to go back to the way things were. See Figure 2

Determining Network Security


Computer System and Network Security Page 50
FIGURE 2. Restore Point

2. Open the anti-virus or anti-spyware program – if the program is set to execute or obtain
updates automatically, you may need to turn the automatic feature off to perform these
steps manually. See Figure 3

FIGURE 3. AVG Anti-virus Software

Determining Network Security


Computer System and Network Security Page 51
3. Locate the update control button and select it – you may be asked to select one of several
download sites. Pick the one closest to you, or the one which is the fastest. You may have to
update both the program and its database.
4. After the program is updated, use it to scan your computer – some ant-virus or anti-spyware
programs allow you to select which disk drives of folders you wish to scan for viruses.
5. When the scan is complete, check the report for viruses or other problems that could not be
treated and delete them yourself – some viruses are written in a way that anti-virus
programs cannot clean them automatically. You may need to delete it yourself; it may help
to change the name of the offending file before you delete it.
6. Set the anti-virus or anti-spyware program to automatically update and to run on a
scheduled basis – to protect your computer automatically, most anti-virus programs can be
set to scan your computer as a scheduled time each day. Some anti-virus programs can be
set to provide continuous protection by scanning each new file that enters the computer.
You can also schedule the program to look for updates automatically. This helps to
overcome the “Day Zero” problems posed by new attacks and viruses.

Virus, spyware, and adware detection programs look for patterns in the programming code of the
software in a computer. These patterns are determined by analyzing viruses that are intercepted on the
Internet and on LANs. These code patterns are called signatures. The publishers of protection software
compile the signatures into virus definition tables. To update signature files for anti-virus and spyware
software, first check to see if the signature files are the most recent files. This can be done by navigating
to the about option of the protection software, or by launching the update tool for the protection
software. If the signature files are out of date, update them manually with the Update Now option on
most protection software.

You should always retrieve the signature files from the manufacturer’s website to make sure the update
is authentic and not corrupted by viruses. This can put great demand on the manufacturer's website,
especially when new viruses are released. To avoid creating too much traffic at a single website, some
manufacturers distribute their signature files for download to multiple download sites. These download
sites are called mirrors.

CAUTION: When downloading the signature files from a mirror, ensure that the mirror site is a
legitimate site. Always link to the mirror site from the manufacturer's website.

Viruses and worms can be difficult to remove from a computer. Software tools are required to remove
viruses and repair the computer code that the virus has modified. These software tools are provided by
operating system manufacturers and security software companies. Make sure that you download these
tools from a legitimate site.

Patches are code updates that manufacturers provide to prevent a newly discovered virus or worm from
making a successful attack. From time to time, manufacturers combine patches and upgrades into a
Determining Network Security
Computer System and Network Security Page 52
comprehensive update application called a service pack. Many infamous and devastating virus attacks
could have been much less severe if more users had downloaded and installed the latest service pack.

The Windows operating system routinely checks the Windows Update website for high-priority updates
that can help protect a computer from the latest security threat. These updates can include security
updates, critical updates, and service packs. Depending on the setting you choose, Windows
automatically downloads and installs any high-priority updates that your computer needs, or notifies
you as these updates become available.

FIGURE 4. Windows XP Update

Updates must be installed, not just downloaded. If you use the Automatic setting, you can schedule the
time and day. Otherwise, new updates are installed at 3 a.m. by default. If your computer is turned off
during a scheduled update, updates are installed the next time you start your computer. You can also
choose to have Windows notify you when a new update is available and install the update yourself.

Determining Network Security


Computer System and Network Security Page 53
Self-Check 3 Written Test

Name: __________________________________ Date: ______________

Direction: Answer the following questions.

A. List down the steps, in order, on what to do during software update.

1. __________________________________________________________________

2. __________________________________________________________________

3. __________________________________________________________________

4. __________________________________________________________________

5. __________________________________________________________________

6. __________________________________________________________________

Note: Satisfactory rating – 6 points / Not satisfactory - below 6 points

Determining Network Security


Computer System and Network Security Page 54
Operation 3 Restore Points in Windows XP

Name: _________________________ Date: _____________

In this activity, you will create a restore point and return your computer back to that point in time.

Recommended Equipment:

The following equipment is required for this exercise:


o A computer system running Windows XP
o The Windows XP installation CD

Step 1

Click Start > All Programs > Accessories > System Tools > System Restore.

Click the Create a restore point radio button.

Click Next.

Determining Network Security


Computer System and Network Security Page 55
Step 2

In the “Restore point description” field, type Application Installed.

Click Create

Step 3

The “Restore Point Created” window appears.

Click Close.

Determining Network Security


Computer System and Network Security Page 56
Step 4

Click Start > Control Panel > Add or Remove Programs.

Click the Add or Remove Programs icon.

Determining Network Security


Computer System and Network Security Page 57
Step 5

Click Add/Remove Windows Components

Step 6

Click the Internet Information Services (IIS) checkbox.

Click Next.

Determining Network Security


Computer System and Network Security Page 58
Step 7

Place the Windows XP installation CD into the optical drive.

Click OK.

Determining Network Security


Computer System and Network Security Page 59
Step 8

The “Files Needed” window appears.

Click OK.

The “Configuring Components” progress window appears.

Determining Network Security


Computer System and Network Security Page 60
Step 9

The “Completing the Windows Components Wizard” window appears.

Click Finish.

Determining Network Security


Computer System and Network Security Page 61
Step 10

The “System Settings Change” dialog box appears.

Remove the Windows XP installation disk from the optical drive.

Click Yes.

Step 11

Log on to Windows as yourself.

Open the Notepad application by clicking Start > All Programs > Accessories > Notepad.

Type This is a test of the Restore Points in the Notepad application.

Click File > Save As….

Click My Documents.

Type Restore Point Test file in the “File Name:” field.

Click Save.

Click File > Exit.

Determining Network Security


Computer System and Network Security Page 62
Step 12

Open IIS to confirm that you have successfully installed this service.

Click Start > All Programs > Administrative Tools > Internet Information Services.

Click File > Exit.

Step 13

Click Start > All Programs > Accessories > System Tools > System Restore.

Select the Restore my computer to an earlier time radio button.

Click Next.

Determining Network Security


Computer System and Network Security Page 63
Step 14

Select today’s date from the calendar on the left.

Select Application Installed from the list on the right.

Click Next.

Step 15

The “Confirm Restore Point Selection” window appears.

NOTE: When you click Next, Windows will restart the computer. Close all applications before
you click Next.

Click Next.

The operating system restores to the point before the IIS application was installed.

Determining Network Security


Computer System and Network Security Page 64
Step 16

The “Restoration Complete” window appears. Click OK

Determining Network Security


Computer System and Network Security Page 65
Step 17

Click Start > All Programs > Administrative Tools.

Is the Internet Information Services application listed?

Step 18

Navigate to the “My Documents” folder.

Open the “Restore Point Test file.txt” file.

Are the contents the same?

Determining Network Security


Computer System and Network Security Page 66
LAP Test Practical and Written Test

Name: ____________________________________ Date: ________

Time started: ______________________________ Time finished: ______________

Instructions: You are required to answer the following individually with the presence of your teacher

A. In this activity, you will use the Internet, a newspaper, or magazines to gather information to help
you become familiar with computer crime and security attacks in your area.

1. Briefly describe one article dealing with computer crime or a security attack.

2. Based on your research, could this incident have been prevented? List the precautions that
might have prevented this attack.

Determining Network Security


Computer System and Network Security Page 67
NOTE: BEFORE YOU CONTINUE WITH YOUR PRACTIAL TEST, MAKE SURE DISCONNECT YOUR INTERNET
ACCESS

B. Choose the correct answer by encircling the letter/s of choice.

1. Which two threats are physical threats? (Choose Two)

a. Laptops are stored in an unlocked cabinet


b. Anti-virus software has outdated virus definitions
c. All users use one generic username and password to connect to the network
d. The network server and network equipment are kept in the corner of the office for easy access
e. The computers are secured to the desks of each user

2. Which type of security threat installs to a computer without the user’s knowledge and then monitors
all computer activity?

a. Adware
b. Grayware
c. Malware
d. Spyware

3. Which type of security threat uses e-mail that appears to be from a legitimate sender and asks the e-
mail recipient to visit a website to enter confidential information?

a. Badware
b. Phishing
c. Stealth virus
d. Worm

4. Which method of authentication uses physical characteristics of the user?

a. Card keys
b. Password keys
c. Alarm triggers
d. Biometrics

Determining Network Security


Computer System and Network Security Page 68
5. Which two solutions will prevent users with external flash drives from infecting computers on the
network with viruses? (Choose two)

a. Upgrade the network security to WPA


b. Prohibit use of removable media on network computers
c. Configure the software firewall policy to prevent the use og removable flash media
d. Set virus protection software to scan removable media when data is accessed
e. Set MAC address filtering to allow only authorized removable media to connect to network
device

B. When you receive an email from your bank requesting you go to a website and confirm your
personal details and passwords. This website is normally spoofed and will then enable the
fraudster to gain your personal bank details and allow them to commit fraud.” What is this kind of
threat called? What is the best way to avoid this type of threat?

C. Nowadays, many companies have customers fill out personal or financial information for
registrations. There is a possibility that your computer would have grayware. What is the best
option for you to complete the registration form and send back to the company?

Determining Network Security


Computer System and Network Security Page 69
ANSWER KEY

 Self-check 1

1. J
2. D
3. B
4. H
5. I
6. E
7. A
8. F
9. C
10. G

 Self-check 2

1. A
2. B
3. C
4. D
5. E
6. G
7. H
8. F
9. J
10. I

 Self-check 3

1. Set windows restore point


2. Open the anti-virus or anti-spyware program
3. Locate the update control button and select it
4. After the program is updated, use it to scan your computer
5. When the scan is complete, check the report for viruses or other problems that
could not be treated and delete them yourself
6. Set the anti-virus or anti-spyware program to automatically update and to run on a
scheduled basis

Determining Network Security


Computer System and Network Security Page 70
List of Resource Materials

 CCNA Exploration 4 Accessing the WAN Companion Guide


 CCNA Security Companion Guide
 IT Essentials PC Hardware and Software Version 4.0
 http://www.tech-faq.com/shared-folder-permissions.html
 http://www.informit.com/articles/article.aspx?p=30421
 http://ayurveda.hubpages.com/hub/Types-of-Network-Attacks
 http://searchsecurity.techtarget.com/definition/phishing
 http://computer.howstuffworks.com/phishing.htm
 http://www.networksecuritythreats.org/network-security/network-security-threats-explained/
 The Importance of Logging and Traffic Monitoring for Information Security by SANS Institute

Determining Network Security


Computer System and Network Security Page 71

You might also like