Forensics Week 12
Agenda Forensic Plan Timing Outsider Threat Final Project Option 1 – Final and Presentation Due (4/24) Option 2 – Presentation (4/24) and Final (5/1-Study Day) Outsider Threat
Definition of External Threat The threat from outside the organization, who have no legitimate rights to corporate system or information.
In Class Assignment Design and attack against your companies system… From the Inside From the Outside
Types of external threats
Social Engineering In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
Denial of Service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems flooding the targeted system with traffic.
Virus, Worm and Trojans A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. A worm is similar to a virus by design and is considered to be a sub- class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.
Organizational Attacks
Automated attacks A very common attack used by hackers is known as the Automated Attack – An attack that automatically scans IP ranges and ISPs endings. Most of the attacks know how to spot if there is a firewall active, combined with Trojans that allow information theft or backdoor that allows full access to the victim’s computer.