100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

summary security

Rating
-
Sold
2
Pages
48
Uploaded on
27-12-2019
Written in
2019/2020

Summary Security that literally contains everything related to hacking and cyber security. It is made for the course Security at Leiden University, but it is very useful for other universities. Even if you just want to learn how to hack this summary is a must! PS: Only the first two pages are in dutch.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
December 27, 2019
Number of pages
48
Written in
2019/2020
Type
Summary

Subjects

Content preview

Samenvatting Security
Timo Kats, Informatica en Economie

,Inhoudsopgave:


1. Intro & Casussen
2. Application Security
3. Application Security – Assembly
4. Application Security – Shellcode
5. Application Secuirity – Exploitation techniques
6. Web security
7. Crypto
8. Application Securtity – Defences

,1: Intro & Casussen:


What is security according to ISO?
• Definitions from ISO/IEC 27000:2016
• Information security: preservation of confidentiality, integrity and
availability of information
• Confidentiality: property that information is not made available or
disclosed to unauthorized individuals, entities, or processes
• Integrity: property of accuracy and completeness
• Availability: property of being accessible and usable upon demand by an
authorized entity


Case 1: ILOVEYOU
1. Omschrijving: e-mail met daarin de claim dat het
een liefdesbrief is, maar eigenlijk was het een script.
Wanneer je het opent ‘corrupt’ het alle files en
stuurt het zichzelf door naar al je contacten.
2. Effect: 10% van het internet en miljarden aan
schade.
3. Techniek: Social Engineering
4. Niveau: Script kiddie




Case 2: Heartbleed
1. Omschrijving: Er werd gebruik gemaakt van een
tekortkoming in SSL.
2. Effect: Communicaties zijn waarschijnlijk onderschept
en iedereen moest zijn/haar wachtwoord veranderen.
3. Techniek: Verschil in ‘bounds’ (lengte request) en de
daadwerkelijke lengte van een request.
4. Niveau: skilled hacker

, Case 3: DDoS attack
1. Omschrijving: Dyn kreeg enorm veel aanvragen
waardoor de services zoals twitter onbereikbaar
werden.
2. Effect: Grote websites onbereikbaar.
3. Techniek: Veel onderdelen hadden standaard
wachtwoorden. Mirai (botnet) probeerde gewoon heel
veel gebruikelijke wachtwoorden.
4. Niveau: Script kiddie. Iedereen met met een botnet kan dit.




Case 4: Stuxnet
1. Omschrijving: Verspreid zich over het internet en via usb-
sticks. Het maakt gebruik van bugs (zero-days) in het
windows-systeem. Stuxnet heeft het iraanse
atoomporgramma aangevallen.
2. Effect:. Schade aan centrifuges van iraanse
kerncentrales.
3. Techniek: Erg complex. De veiligheidsdiensten hadden
nagenoeg oneindig veel middelen.
4. Niveau: MIVD/CIA/Mossad


Why is security hard?
• Asymmetry
- Attacker needs to find one weakness
- Developer needs to find all weaknesses
• Hard to convince managers
- Can increase cost
- Can decrease user friendliness
- Hard to measure, invisible until attacked
• Many levels
- Hardware, OS, framework, application, design, specification, …

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
tpakats Universiteit Leiden
Follow You need to be logged in order to follow users or courses
Sold
43
Member since
6 year
Number of followers
30
Documents
12
Last sold
11 months ago
Bachelor Informatica en Economie samenvattingen

4.8

5 reviews

5
4
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions