Employee clicks on fake

Slides:



Advertisements
Similar presentations
Chapter 1: Computers and Digital Basics 1 Computers and Digital Basics Chapter 1.
Advertisements

CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Browser Exploitation Framework (BeEF) Lab
Chapter 12: Anatomy of an Attack
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
1 Enabling Secure Internet Access with ISA Server.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Proxy servers By Akshit Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients to make indirect.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
REMOTE ACCESS Research Data Management. On Campus There are two networks – the staff network and the student network. Staff network: Access to the shared.
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
Module 1: Web Application Security Overview 1. Overview How Data is stored in a Web Application Types of Data that need to be secured Overview of common.
Introduction to InfoSec – Recitation 15 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Team Viewer & Computer Networking Concept. Connection Exchange Data File Media Why Network ?
Connecting to USF Network for Web Site SSH Secure Shell is the FTP program you will use to download your http files onto the USF server. To get the SSH.
® Microsoft Office 2010 Appendix A: Introduction to SkyDrive and Office Web Apps.
Apache + Tomcat. Apache + Tomcat Download mod_webapp.so:
Introduction of Internet security Sui Wang IS300.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Legal Recourse for International Economic Espionage Activities Thomas Finch.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Why are links important to a website? Web Design Course.
DATABASE TOOLS CS 260 Database Systems. Overview  Database accounts  Oracle SQL Developer  MySQL Workbench.
Using the remote access option on the lab computers Fall 2005.
XP Browser and Basics COM111 Introduction to Computer Applications.
1 National Technology Committee 2008 TaxWise and VISTA There are several issues that need to be addressed when using computers with the Windows VISTA Operating.
Introduction to Taverna Online and Interaction service Aleksandra Pawlik University of Manchester.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Attention After changing your internet browser (proxy) settings, you can only access those web sites allowed/directed by KHU Library. In order to browse.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
How the Web Works Jenny Burson Courtesy of About Internet for Beginners Learn the Web
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Understand Malware LESSON Security Fundamentals.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet  ’60 = an invention of the US army  Universities and libraries also start to use this communication tool  Protocol + physical network=> backbone.
Module 4 Creating EMC Files, Uploading EMC Files and Downloading Reports PC-ACE Pro32.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted July 2011.
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
WEB APPLICATION TESTING
Personal spaces.
CNIT131 Internet Basics & Beginning HTML
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Viruses and Other Malicious Content
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
CALL AOL Customer Support Number. How to Download and Install AOL Desktop Gold We are discussing a problem related to AOL where the users failed.
How to Troubleshoot Downloading Issue of Norton Antivirus?
Stealing Credentials.
Install DoD CA Certificate Instructions for IE
How to use WEBDAV in CIRCABC Pierre Beauregard
Install DoD CA Certificate Instructions for Firefox
At Software Download Help, you will get to know about all the processes from downloading to installation at just one place without wasting even a bit of.
Configuring Internet-related services
Game Mark Shtern.
Computer Security.
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
WJEC GCSE Computer Science
Presentation transcript:

Employee clicks on fake email browser Outbound connection Exploit server Exploit response Phase 1: Exploit penetrates user workstation A. B. D. C.

Phase 2: Backdoor program is installed browser Exploit makes second outbound connection Payload Server Backdoor program is downloaded Phase 2: Backdoor program is installed A. B. C.

Hacker’s control server Backdoor connects to hacker Hacker’s control server Hacker explores internal network Phase 3: Remote access A. B. C.

Hacker collects intellectual property Hacker’s control server B. Hacker downloads stolen data Phase 4: Information theft

Web server that has been compromised by hacker Backdoor connects to compromised web server Web server that has been compromised by hacker Backdoor downloads base64 encoded file containing instructions Command and Control A. B. D. C.

Instructions specify where to connect to Hacker Command and Control (Detail) C. Hacker’s control server Web server that has been compromised by hacker A. B.