Hasso-Plattner-Institut
 
    • de
 

Lecture/course - english - Summer 2004

The lecture course "Internet Security II - Weaknesses and Targets" is based on the lecture course "Internet Security I - Internet Technology" and gives a detailed introduction into problems concerning Internet and Intranet security. After starting with a some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion of possibilities to detect attacks and intrusions, and ethical issuses.

 

Authors

Prof. Dr. Christoph Meinel

Relevant Links

  • Homepage
  • Informatik Trier
  • Universität Trier

Duration

16:00 hours

0 Foreword

Internet Bridge-series

00:23:32 hours | play >

1 Introduction

1.0 Introduction

Internet Security
- WandT-1

Nowadays' Internet Risks for Interconnected Information Systems
Systematic Problems with Internet Security
The Internet is an easy Target
Changing Nature of The Threats
Who are the Intruders
Improved Opportunities for Intrusion
Direction of Internet Security
Complexity of Internet
Most Common Attacks
Futher Attacks
Computer Crimes and Damage
Main Security Necessities

01:26:42 hours | play >

1.1 Risk Analysis

Internet Security
- WandT-2

Introduction
(1) Risks for information systems
(2) New risks with internet connection
(3) Security risks in intranet's
(4) Risk analysis
(5) Phases of Risk analysis: Overview
Phase 1: Fixing of the analysis domain
Phase 2: Acquisition of the risks
Phase 3: Evaluation of Risks
(6) Basic risks by using internet

01:29:21 hours | play >

1.2 Computer Crime: Criminals and Motives

Internet Security
- WandT-3

Potential attackers
(1) Staff of the Own Enterprise
(2) Hackers from High-Schools and Universities
(3) Hackers of the Computer-Underground
(4) Ordinary Criminals
(5) Cyber Crime: Professional Hackers

01:31:59 hours | play >

1.3 Hackers and Viruses

Internet Security - WandT-4

(1) The First Hackers
(2) Unterground-Mailboxes
(3) From First Virus to Worms and Trojan Horses
(4) Small Chronology of Computer-Crime
(5) Computer-Crime and the following Costs

01:01:55 hours | play >

Weaknesses and Targets

Human Factor and Technical Failures

Internet Security - WandT-21

(1) Technical Failures
(2) Defective Protocol Design
(3) Defective Software Design
(4) Lack of Knowledge and Carelessness
(5) Social Hacking
(6) Defective Organisation
(7) Unprotected Hardware
(8) Hit list of Break-in Methods

00:52:05 hours | play >

Spy Out Network Infrastructure

Internet Security - WandT-22

(1) Introduction
(2) Address Scanner
(3) Port Scanner
(4) Protocol-Analyzers
(5) Banners

00:37:38 hours | play >

Attacks on Accounts and Passwords

Internet Security - WandT-23

(1) Introduction
(2) Password Guessing
(3) Password Cracking
(4) Password Sniffing
(5) Password Monitoring
(6) Password "Fishing" with Trojan Horses
(7) Protection Against Password Theft

00:47:19 hours | play >

Attacking Internet Protocols (I)

Internet Security - WandT-24

(1) Introduction
(2) IP Address Spoofing
(3) ICMP-Attacks

00:38:30 hours | play >

Attacking Internet Protocols (II)

Internet
Security - WandT-25

(4) Internet-Routing-Attacks
(5) ARP-Attacks
(6) IP-Fragmenting-Attack
(7) IP-Bombing
(8) SYN-Flooding
(9) TCP-Sequence Numbers Attacks
(10) UDP Attacks

01:18:27 hours | play >

Attacking Internet Protocols (III)

Internet Security - WandT-26

(11) DNS-Attacks
(12) SMTP-Attacks
(13) Telnet-Attacks
(14) FTP-Attacks
(15) NNTP-Attacks

00:34:24 hours | play >

Misuse of Design and Programming Errors

Internet Security - WandT-27

(1) Introduction
(2) Buffer Overflow
(3) Defective Syntax Check
(4) Race Condition

00:36:11 hours | play >

Weaknesses in Unix/Linux (I)

Internet
Security - WandT-28

(1) Introduction
(2) Security Architecture of Unix
(3) Password Attacks in Unix
(4) Networks Attacks in Unix

01:27:27 hours | play >

Weaknesses in Unix/Linux (II)

Internet
Security - WandT-29

(5) Attacks over Unix-Applications
(6) Strategies for Protecting Unix
(7) Information for Unix-Security
(8) Strategies for Protecting Linux
(9) Security-Software for Linux

01:10:57 hours | play >

Weaknesses in Windows NT/2000 (I)

Internet
Security - WandT-30

(1) Introduction
(2) Security architecture of Windows NT/2000
(3) Account- and Password attacks
(4) Network attacks

01:14:20 hours | play >

Weaknesses in Windows NT/2000 (II)

Internet
Security - WandT-31

(5) Attacks over NT-Applications
(6) NT-Denial-of-Service-Attacks
(7) Strategies for security of NT-Systems
(8) Windows 3.11 / 95/ 98-Clients
(9) Information about NT-Security
(10) Windows 2000

00:49:34 hours | play >