CompTIA Security+ Study Guide (SY0-501)

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Copyright © Pearson Education Limited Computer Fraud and Abuse Techniques Chapter
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Copyright © 2015 Pearson Education, Inc. Computer Fraud and Abuse Techniques Chapter
Introduction to Honeypot, Botnet, and Security Measurement
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Malicious Software.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
Chapter 1: Modern Network Security Threats
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
ARF DEFENSE OFFICIALS' DIALOGUE 13TH ARF SECURITY POLICY CONFERENCE REGIONAL CYBER SECURITY CHALLENGES DIR. NEBUCHADNEZZAR ALEJANDRINO CHIEF, CYBERSECURITY.
Comptia Security+ Eckel Technology Consultants. Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Mark Ryan Professor of Computer Security 25 November 2009
Computer Security Revision Week
Application Communities
Executive Director and Endowed Chair
Chapter 15: Security.
Chapter 7: Identifying Advanced Attacks
Network Security Fundamentals
Attacks and Malicious Code
Chapter 15: Security Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Intro to Information Assurance & Security
EN Lecture Notes Spring 2016
Various Types of Malware
Chapter 6: Protection & Security
BINF 711 Amr El Mougy Sherif Ismail
Cybersecurity EXERCISE (CE) ATD Scenario intro
Unit 32 – Networked Systems Security
Enhancing Malware Detection
Introduction to Security: Modern Network Security Threats
Complete CompTIA A+ Guide to PCs, 6e
CS4622: Computer Networking
Internet Worm propagation
Internet Security Threat Status
امنیت اطلاعات و ضرورت آن
1:53:58 AM.
Chapter Nineteen Security.
CS/IS 196 Final Exam Review
Malicious Software Network security Master:Mr jangjou
Cybersecurity ATD Scenario conclusion
Cyber Security Challenges
Networking for Home and Small Businesses – Chapter 8
Security-Related Language/s
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Chapter 14: Protection.
Presentation transcript:

CompTIA Security+ Study Guide (SY0-501) Chapter 9: Threats, Attacks, and Vulnerabilities

Chapter 9: Threats, Attacks, and Vulnerabilities Given a scenario, analyze indicators of compromise and determine the type of malware Compare and contrast types of attacks

Living in a World of Viruses Symptoms of a virus infection

Types of Viruses Armored Companion Macro Multipartite Phage Polymorphic Retrovirus Stealth

Malware and Crypto-Malware Worm Trojan Rootkit Keylogger Adware Spyware Bot DoS and DDoS RAT Logic bomb Backdoor

DDoS

Other Attacks Man-in-the-middle Buffer overflow Injection Cross-site scripting and request Forgery Privilege escalation

Other Types of Attacks DNS poisoning Domain hijacking ARP poisoning Amplification DNS poisoning Domain hijacking Man-in-the-browser Zero-day exploits Replay attacks

Other Types of Attacks Pass the hash Hijacking and related attacks Driver manipulation

MAC and IP Spoofing Attacks

Five Tasks for Finding Threats Passively testing security controls Interpreting results Identifying vulnerability Identifying lack of security controls Identifying common misconfigurations

Security Tools Vulnerability scanners Honeypots and honeynets Port scanner Banner grabbing

Risk Calculations/Assessment Types Baseline reporting Code review Determine attack surface Architecture Design review