Stealing Credentials.

Slides:



Advertisements
Similar presentations
ISRT IS 376 OCTOBER 28, 2014 INTERNET SECURITY THREAT REPORT  2014.
Advertisements

P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
7 Effective Habits when using the Internet Philip O’Kane 1.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Computer Basics Rabie A. Ramadan, PhD 6. Viruses, Worms, Zombies, and others 2.
Hack Firefox to steal web-secrets Sunil Arora. How many of you use Firefox ?
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Introduction to Security Computer Networks Computer Networks Term B10.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Phishing – Read Behind The Lines Veljko Pejović
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Cyber Crimes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Larry Clark My webpage:
Databases and security continued CMSC 461 Michael Wilson.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security at NCAR David Mitchell February 20th, 2007.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
CS 3723 Programming Languages
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Information Systems Design and Development Security Risks Computing Science.
Best ways to Hack Facebook Account Now a days Facebook becomes the number 1 social networking portal that touches every one’s life. People are now a days.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
How To Remove Flooders?-Get Help Website:
Social Engineering: The Human Element of Computer Security
Web Application Penetration Testing ‘17
IT Security  .
Employee clicks on fake
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson Objectives Aims You should be able to:
TYPES OF SERVER. TYPES OF SERVER What is a server.
Phishing is a form of social engineering that attempts to steal sensitive information.
How to Protect your Identity Online PIYUSH HARSH
Malware, Phishing and Network Policies
Phishing.
Information Security Awareness
Computer Security.
Security Hardening through Awareness August 2018
WJEC GCSE Computer Science
What devices use the internet?
Week 7 - Wednesday CS363.
Presentation transcript:

Stealing Credentials

Breaking in Without Bugs Many attackers steal users’ passwords This is done for both random and targeted attacks How is it done? cybersec

Phishing Trick the user into going to a bad website Profit cybersec

Spear-Phishing Send email targeted to particular users Do research first to see what useful emails might be “Jane Doe has asked to be added to your class. Please accept or reject the invitation via SSOL.” Profit cybersec

Not a Phishing Attack cybersec

Exploiting Browser or Mailer Bugs Send an email or otherwise lure a target to a malware- bearing site Or: compromise a web site that your class of targets will frequent (“watering hole attack”) Place a malware-bearing ad on a site your target visits Exploit a mailer or browser bug to penetrate the victim’s computer and install a keystroke logger Wait for the victim to log in to a site useful to you cybersec

Compromised Servers Hack a server and steal its password file Run a password-guessing attack Most sites do not store passwords in the clear With good probability, many users will have guessable passwords Many users share passwords between sites cybersec