Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:01
Hello, everyone. My name is Peter Simple. Um, and this is the network security course.
00:06
This is going to be module for lesson three. The prerequisites for this course are modules 12 and three and the 1st 2 lessons of module four. So if you haven't seen any of these yet if you skipped Reynold. But I encourage you to pause this video and go back and check out the ones. You didn't see it
00:27
in this video. We're going to take a look at some common attack vectors on the network and some Web filtering techniques for mitigation.
00:39
So let's talk about some common attack factors here. One of the most common and most popular and the most successful are phishing and spoofing efficient spoofing. They are extremely similar. So I'm putting them together. Even there are some small differences, but basically,
00:55
this is the process of pretending to be someone or something. You are not through false information.
01:02
What the whole job of phishing and spoofing is to trick you into think you are doing something for the good, or they think you're going to a Spencer a certain spot when in reality you are not. It's not really ah threat per se, but it's a tool used to make threats.
01:19
An example of this is a picture on the right.
01:23
So this website looks very similar
01:26
to the customer portal for Amazon. But as you can see from the u. R. L, there are two ends. This in fact, is a spoofing website. So
01:40
when people either click on a link to get redirected here, they think this is the Amazon website. So they enter in their credentials
01:48
for Amazon
01:49
and then it redirects them to the actual Amazon website with the message that says credentials and valid. Please try to walk and again.
01:57
So they log in again and then they're in Amazon and they think that nothing had ever happened when a reality, this is what happened.
02:05
Ah, subset of spoofing is DNs cache poisoning where you can
02:12
reroute people based on former DNs request that have been made. So they go to websites such as this
02:23
denial of service, also known as DOS. This is is an attack which seeks to make a machine or a network resource unavailable.
02:31
So basically, in a dos attack, it's when a machine like an evil machine makes a request to the server. Obviously the server can process it. But if there is enough requests that are made to server, the server can't always handle all of them. And so it basically just
02:50
shuts down because the server doesn't know what else to do.
02:53
Ah, form of this is known as Adidas Attack, which is a distributed denial of service. Same thing is a DOS attack, but the only difference being there are multiple machines being used against the server instead of one.
03:07
These multiple sheens are also known as a botnet because they're all under the control of one person
03:15
who is known as a bought master. On a subset of this is a D authentication attack.
03:22
This attack applies mainly to WiFi networks, but it's where this attack kicks everyone off the WiFi and makes the WiFi access point unavailable for them to get back on
03:38
man in the middle attack. This is an attack where a person gets in between a normal network conversation and intercepts the traffic
03:47
so we can see at the top. We could see the original connection between the user and the Web application, and they're going back and forth
03:54
Now the man in the middle has hijacked the conversation and now has rerouted all the traffic through him.
04:02
So the traffic from the user to the Web application still gets to the Web application on the information that the Web application sends still gets back to the user. The only difference being
04:15
that it goes through the man in the middle who can read all of the information.
04:23
Brute force. This a technique where every possible combination
04:28
is applied. So if you're trying to break into some type of number, lock
04:32
gets a pass code, you try every single possible combination. Doesn't this attack? Does not take any real intelligence, but it's still a very dangerous attack simply because computers were really powerful. They can try millions upon billions of attempts every second.
04:49
So that's why it's very important to have very strong passwords.
04:56
Delicious insiders. This is a form of physical threats, thes air current or former employees who gained unauthorized access to a network.
05:05
These are the old, proverbial wolves in sheep's clothing. These the people who are slightly disgruntled, who might have some sort of beef or anger towards the organization or at their job or something like that, and so they want to cause harm to the network from the inside out.
05:24
This is one of the most toughest network attacks to determine
05:28
simply because you normally know who the malicious insiders are without knowing that they are, in fact, malicious insiders.
05:39
So it's still got some Web filtering techniques for mitigating some of these attacks. Three main areas aren't firewalls, Diem's is, and access control was
05:48
firewalls, as you can see, filter Web traffic because everything goes through them from everything. All traffic information from the Internet coming in and information from the land going out
06:02
have to pass through the far wall. And they are then that Web traffic is then inspected to make sure it is secure and make sure it is safe. There's also the D M Z, which is a concept which filters information coming into the land.
06:18
So if you need to make a special request or get some, resource is,
06:23
you can get them from the D M Z and not necessarily actual land itself. If you only need access to some of the resource is
06:30
and then finally, there's access control. US. Access control lists will usually sit inside firewalls and determine what kind of traffic is through and what does not get through
06:42
on example of an access control list is the picture down below. And there are. This is really where the rules are applied so you can see
06:50
actions include, allow and deny. Depending on where the information is coming from, where is it going and what ports It's coming in and out off.
07:03
In this video, we discussed common attack vectors and Web filtering technologies.
07:13
Quiz time.
07:14
This attack methods, swarms, network machines and resource is by sending so many requests that it becomes unavailable.
07:21
Is it a d das
07:24
Be brute force, See spoofing or d man in the middle?
07:30
If you said a Adidas than you are correct, remember, did a stands for distributed denial of service that means many computers or many machines all send requests to a server or network machine or resource at the same time. And there are so many requests that
07:48
the target machine does not know what to do, so it simply shuts down. It becomes unavailable.
07:55
Thanks for watching guys. I hope you learned a lot in this video, and I'll see you next time

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor