"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issuses.
Weaknesses and Targets - An Overview | 01:05:48 | |
---|---|---|
Internet Security - A first Example | 00:10:12 | |
Nowadys' Internet | 00:14:18 | |
Internet is an easy Target | 00:12:43 | |
Complexity of the Internet | 00:08:35 | |
Most Common Attacks | 00:07:01 | |
General Risks of Interconnected IT-Systems | 00:12:58 |
First Understanding of Internet and WWW | 01:27:34 | |
---|---|---|
Introduction | 00:09:42 | |
Classification of Computer Networks | 00:10:33 | |
Internet and Internet Protocols | 00:19:31 | |
TCP/IP Protocol Stack | 00:16:14 | |
WWW - World Wide Web | 00:11:52 | |
WWW-Browser and WWW-Server | 00:19:35 |
Risk Analysis | 01:02:53 | |
---|---|---|
Introduction | 00:02:42 | |
Risks in Internetworking IT-Systems | 00:11:26 | |
Risk Definition | 00:09:29 | |
Evaluation of Risks | 00:10:33 | |
Construction of a Risk-Matrix | 00:11:19 | |
Basic Risks of Internet | 00:17:24 |
Cyber Crime: Potential Attackers | 00:23:37 | |
---|---|---|
Potential Attackers | 00:10:57 | |
Hackers - Craclers of Computer-Underground | 00:12:40 |
Hackers and Viruses | 01:16:27 | |
---|---|---|
First Generation of Hackers | 00:11:57 | |
Underground Mailboxes | 00:02:35 | |
Viruses, Worms, Trojan Horses | 00:13:19 | |
Well-Known Security Incidents in History | 00:17:52 | |
Incidents of the year 2000 | 00:13:59 | |
Incidents of the year 2008 | 00:12:14 | |
Financial Losses by Cyber Crime | 00:04:31 |
Human Factor and Technical Failures | 00:33:32 | |
---|---|---|
Technical Failures | 00:06:36 | |
Defective Design | 00:06:47 | |
Lack of Knowledge, Awerenes and Carelessness | 00:05:03 | |
Social Hacking | 00:15:06 |
(Online) Reconnaissance | 00:28:19 | |
---|---|---|
Introduction | 00:05:44 | |
Passive Recon | 00:09:43 | |
Web Recon | 00:08:56 | |
Active Recon | 00:03:56 |
OS Fingerprinting | 00:26:07 | |
---|---|---|
Introduction | 00:03:09 | |
Telnet Session Negotiation | 00:14:09 | |
TCP/IP Timeout Detection | 00:04:37 | |
Fuzzy OS-Fingerprinting | 00:04:12 |
Attacks on Accounts and Passwords | 00:59:58 | |
---|---|---|
Introduction | 00:07:46 | |
Password Guessing | 00:07:34 | |
Password Cracking | 00:09:57 | |
Rainbow Tables | 00:15:05 | |
Password Sniffing | 00:03:24 | |
Phishing - Password Fishing | 00:11:55 | |
Protecting against Password Theft | 00:04:17 |
Weaknesses of Internet Protocols 1/2 | 01:27:55 | |
---|---|---|
Introduction | 00:14:00 | |
ARP-Attacks | 00:18:14 | |
IP-Address Spoofing | 00:05:59 | |
ICMP-Attack | 00:20:59 | |
Internet Routing-Attacks | 00:11:46 | |
IP-Fragmentaton Attack | 00:09:56 | |
IP-Bombing | 00:06:33 |
Weaknesses of Internet Protocols 2/2 | 01:23:58 | |
---|---|---|
Introduction | 00:07:55 | |
Attack Scenarios | 00:11:31 | |
TCP-Sequence-Number Attack | 00:15:02 | |
Cancel / Hijack TCP-Connections | 00:07:55 | |
Attacks on TLS/SSL | 00:09:30 | |
DNS-Attacks | 00:14:30 | |
FTP-Attacks | 00:17:35 |
Design and Programming Errors | 00:32:53 | |
---|---|---|
Introduction | 00:02:34 | |
Buffer Overflow | 00:17:58 | |
Defective Syntax Check | 00:05:54 | |
Race Conditions | 00:06:27 |
Weaknesses of Unix / Linux - Attacks and Exploits | 01:17:32 | |
---|---|---|
Introduction | 00:02:55 | |
Security Architecture of Unix | 00:11:01 | |
Password Attacks in Unix | 00:06:16 | |
Abuse of Symbolic Links | 00:07:50 | |
Network and Application Attacks | 00:15:13 | |
Network Attacks via NTP | 00:11:34 | |
Strategies to protect Linux Systems | 00:22:43 |
Weaknesses in Windows and Mac OS X | 01:35:38 | |
---|---|---|
Introduction | 00:10:13 | |
SMB Protocol and Attacks | 00:16:39 | |
UPnP Attack & Remote Desktop Attacks | 00:21:32 | |
Kerberos Authentication | 00:17:30 | |
Cross-Domain Network Resources | 00:19:43 | |
Weaknesses in Mac OS X | 00:10:00 |
Weaknesses in the World Wide Web 1/2 | 01:16:37 | |
---|---|---|
Introduction | 00:10:37 | |
Spying Out Personal Data | 00:16:40 | |
Java | 00:19:33 | |
JavaScript | 00:12:39 | |
ActiveX | 00:11:08 | |
Protective Measures for Web-Browsers | 00:06:00 |
Weaknesses in the World Wide Web 2/2 | 01:19:37 | |
---|---|---|
Introduction | 00:04:37 | |
Break into Web-Servers | 00:15:07 | |
SQL-Injection | 00:14:20 | |
Cross-Site-Scripting | 00:20:12 | |
Current Challenges of Web Services and SOA Security | 00:05:19 | |
WS-Security Standard | 00:20:02 |
Wireless Security | 01:26:03 | |
---|---|---|
Introduction | 00:03:32 | |
IEEE 802.11 Wireless LAN - WLAN | 00:13:59 | |
WLAN Parameters | 00:10:14 | |
WLAN Security Weaknesses | 00:10:50 | |
WLAN Security with IEEE 802.1X | 00:10:57 | |
Extended WLAN Security | 00:14:12 | |
WLAN Security in Practice | 00:06:15 | |
Cellular Phone Technologies | 00:16:04 |
Detection of Attacks and Intrusions | 01:30:37 | |
---|---|---|
Introduction | 00:14:13 | |
Anomalies and Attack Signature | 00:22:28 | |
Anti-Virus Software and Implementation of IDS | 00:18:28 | |
Reactions on Detected Attacks | 00:10:22 | |
Event Correlation | 00:10:42 | |
Existing Solutions: IDS/IPS and SIEM | 00:14:24 |
Internet Security - Law and Ethics | 01:14:30 | |
---|---|---|
Introduction | 00:05:43 | |
Legal Systems | 00:18:29 | |
Case Studies | 00:14:55 | |
Ethical Issues | 00:11:23 | |
Case Studies 2 | 00:05:47 | |
Code of Ethics | 00:06:13 | |
Recently Discovered Insights | 00:12:00 |