12.02.2014 Views

Lectures for 2008 - KTH

Lectures for 2008 - KTH

Lectures for 2008 - KTH

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

KURSKOMPENDIUM NÄTVERKSSÄKERHETSKURS<br />

___________________________________________________________________________<br />

Innehållsförteckning<br />

Figurförteckning.....................................................................................................................5<br />

1 Introduktion och grundläggande koncept ..........................................................................7<br />

1.1 Vad är in<strong>for</strong>mation?...................................................................................................7<br />

1.1.1 In<strong>for</strong>mationssamhället.........................................................................................8<br />

1.2 Varianter av säkerhet .................................................................................................9<br />

1.2.1 Fysisk säkerhet....................................................................................................9<br />

1.2.2 Logisk säkerhet...................................................................................................9<br />

1.2.3 In<strong>for</strong>mationssäkerhet.........................................................................................10<br />

1.2.4 Nätverkssäkerhet...............................................................................................11<br />

1.3 Principiella skydds- och säkerhetsåtgärder ...............................................................12<br />

1.3.1 Autentisering.....................................................................................................12<br />

1.3.2 Auktorisering ....................................................................................................16<br />

1.3.3 Sekretess...........................................................................................................16<br />

1.3.4 Riktighet ...........................................................................................................17<br />

1.3.5 Spårbarhet.........................................................................................................17<br />

1.3.6 Oavvislighet......................................................................................................17<br />

1.3.7 Tillgänglighet....................................................................................................18<br />

1.4 In<strong>for</strong>mationssäkerhet ur ett historiskt perspektiv ......................................................18<br />

2 Hotbeskrivningar............................................................................................................21<br />

2.1 Viktiga begrepp relaterat till hot och risk .................................................................21<br />

2.2 Hackers, Crackers och hackerkultur.........................................................................24<br />

2.3 In<strong>for</strong>mationsinsamling .............................................................................................26<br />

2.3.1 Port- och nätverksscanning................................................................................27<br />

2.4 Säkerhetsproblem ....................................................................................................28<br />

2.4.1 Trafikanalys......................................................................................................29<br />

2.4.2 Avlyssning........................................................................................................30<br />

2.4.3 Uppträdande under falsk identitet......................................................................31<br />

2.4.4 Återuppspelningsattack .....................................................................................32<br />

2.4.5 Buffertöverskrivning.........................................................................................32<br />

2.4.6 Intrång ..............................................................................................................33<br />

2.4.7 Omdirigeringsattack..........................................................................................35<br />

2.4.8 Överlastning och resursmissbruk.......................................................................35<br />

2.4.9 Mannen-i-mittenattacker ...................................................................................35<br />

2.4.10 Race conditions...............................................................................................36<br />

2.4.11 Datamanipulation............................................................................................36<br />

2.4.12 Trunkeringsattack............................................................................................36<br />

2.4.13 Omarrangeringsattack .....................................................................................36<br />

2.4.14 Klipp-och-klistra-attack...................................................................................37<br />

2.4.15 Övertagande av session ...................................................................................37<br />

2.4.16 Datadrivna attacker .........................................................................................37<br />

2.5 Att leta säkerhetshål.................................................................................................38<br />

2.5.1 Security by obscurity.........................................................................................38<br />

2.5.2 Källkodsgranskning ..........................................................................................39<br />

2.5.3 Baklängeskonstruktion......................................................................................39<br />

2.5.4 Fuzzing .............................................................................................................40<br />

2.5.5 Testexekvering samt introspektion ....................................................................41<br />

2.6 Andra typer av tekniska hot .....................................................................................41<br />

2.6.1 Övertro till tekniska lösningar ...........................................................................41<br />

Copyright (c) 2003-<strong>2008</strong> Robert Malmgren AB. All rights reserved Sid 2 (139)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!