Principles of Information Security, 2nd Edition1 Threats and Attacks.

Slides:



Advertisements
Similar presentations
Principles of Information Security, 2nd Edition2 Learning Objectives Upon completion of this material, you should be able to: Understand how an organizations.
Advertisements

Law & Ethics, Policies & Guidelines, and Security Awareness
Chapter 12: Inheritance and Composition
Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking.
4 Information Security.
Ethics, Privacy and Information Security
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1Principles of Information Security – Lecture by Sulafa Talha2012 The Need for Security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Principles of Information Security, 3rd Edition2  Recognize that organizations have a business need for information security  Understand that a successful.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,
Handling Security Incidents
Threats and Attacks Principles of Information Security, 2nd Edition
The Need for Security Chapter 2 Our bad neighbor makes us early stirrers, Which is both healthful and good husbandry. -- William Shakespeare (1564–1616),
Principles of Information Security, 4 th Edition 2 Introduction  Primary mission of information security is to ensure systems and contents stay the same.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Learning Objectives Upon completion of this material, you should be able to: Demonstrate that organizations have a business need for information security.
Computer Crime and Information Technology Security
Principals of Information Security, Fourth Edition
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Viruses & Destructive Programs
Asst.Prof. Dr. Surasak Mungsing. CIS511 สถาปัตยกรรมระบบสารสนเทศ Description: หลักการทำงานของคอมพิวเตอร์ การวัดขนาดและสมรรถนะ คอมพิวเตอร์ วิวัฒนาการของระบบคอมพิวเตอร์
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
The Need for Security Principles of Information Security Chapter 2.
CE3031 The Need for Security Slides based on Whitman, M. and Mattord, H., Principles of Information Security; Thomson Course Technology 2003.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Guide to Firewalls and VPNs, 3 rd Edition Chapter One Introduction to Information Security.
SECURITY IN E-COMMERCE Sheetal Chhabra. Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Topic 5: Basic Security.
The Need For Security. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions for an organization:
Principles of Information Security, 2nd Edition2  Understand the business need for information security  Understand a successful information security.
Principals of Information Security, Fourth Edition Chapter 2 The Need for Security.
Chap1: Is there a Security Problem in Computing?.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
The Need for Information Security(1) Lecture 2. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions.
Principles of Information Security, Fourth Edition 39
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
IT Security  .
Learning Objectives Upon completion of this material, you should be able to:
Introduction Primary mission of information security is to ensure systems and contents stay the same If no threats existed, resources could be focused.
Level 2 Diploma Unit 11 IT Security
TOPIC 2 NEED FOR SECURITY
CHAPTER 4 Information Security.
Learning Objectives Upon completion of this material, you should be able to:
Threats and Attacks Principles of Information Security, 2nd Edition
Presentation transcript:

Principles of Information Security, 2nd Edition1 Threats and Attacks

Principles of Information Security, 2nd Edition2  Identify and understand the threats posed to information security  Identify and understand the more common attacks associated with those threats Learning Objectives Upon completion of this material, you should be able to:

Principles of Information Security, 2nd Edition3 Threats  Threat: an object, person, or other entity that represents a constant danger to an asset  Management must be informed of the different threats facing the organization  By examining each threat category, management effectively protects information through policy, education, training, and technology controls

Principles of Information Security, 2nd Edition4 Threats (continued)  The 2004 Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) survey found:  79 percent of organizations reported cyber security breaches within the last 12 months  54 percent of those organizations reported financial losses totaling over $141 million

Principles of Information Security, 2nd Edition5 Threats to Information Security

Principles of Information Security, 2nd Edition6 Acts of Human Error or Failure  Includes acts performed without malicious intent  Causes include:  Inexperience  Improper training  Incorrect assumptions  Employees are among the greatest threats to an organization’s data

Principles of Information Security, 2nd Edition7 Acts of Human Error or Failure (continued)  Employee mistakes can easily lead to:  Revelation of classified data  Entry of erroneous data  Accidental data deletion or modification  Data storage in unprotected areas  Failure to protect information  Many of these threats can be prevented with controls

Principles of Information Security, 2nd Edition8 Figure 2-1 – Acts of Human Error or Failure

Principles of Information Security, 2nd Edition9 Deliberate Acts of Espionage or Trespass  Access of protected information by unauthorized individuals  Competitive intelligence (legal) vs. industrial espionage (illegal)  Shoulder surfing occurs anywhere a person accesses confidential information  Controls let trespassers know they are encroaching on organization’s cyberspace  Hackers uses skill, guile, or fraud to bypass controls protecting others’ information

Principles of Information Security, 2nd Edition10

Principles of Information Security, 2nd Edition11 Deliberate Acts of Theft  Illegal taking of another’s physical, electronic, or intellectual property  Physical theft is controlled relatively easily  Electronic theft is more complex problem; evidence of crime not readily apparent

Principles of Information Security, 2nd Edition12 Deliberate Software Attacks  Malicious software (malware) designed to damage, destroy, or deny service to target systems  Includes viruses, worms, Trojan horses, logic bombs, back doors, and denial-of-services attacks

Principles of Information Security, 2nd Edition13

Principles of Information Security, 2nd Edition14 Forces of Nature  Forces of nature are among the most dangerous threats  Disrupt not only individual lives, but also storage, transmission, and use of information  Organizations must implement controls to limit damage and prepare contingency plans for continued operations

Principles of Information Security, 2nd Edition15 Deviations in Quality of Service  Includes situations where products or services not delivered as expected  Information system depends on many interdependent support systems  Internet service, communications, and power irregularities dramatically affect availability of information and systems

Principles of Information Security, 2nd Edition16 Internet Service Issues  Internet service provider (ISP) failures can considerably undermine availability of information  Outsourced Web hosting provider assumes responsibility for all Internet services as well as hardware and Web site operating system software

Principles of Information Security, 2nd Edition17 Attacks  Act or action that exploits vulnerability (i.e., an identified weakness) in controlled system  Accomplished by threat agent which damages or steals organization’s information

Principles of Information Security, 2nd Edition18 Table Attack Replication Vectors New Table

Principles of Information Security, 2nd Edition19 Attacks (continued)  Malicious code: includes execution of viruses, worms, Trojan horses, and active Web scripts with intent to destroy or steal information  Back door: gaining access to system or network using known or previously unknown/newly discovered access mechanism

Principles of Information Security, 2nd Edition20 Attacks (continued)  Password crack: attempting to reverse calculate a password  Brute force: trying every possible combination of options of a password  Dictionary: selects specific accounts to attack and uses commonly used passwords (i.e., the dictionary) to guide guesses

Principles of Information Security, 2nd Edition21 Attacks (continued)  Spoofing: technique used to gain unauthorized access; intruder assumes a trusted IP address  Man-in-the-middle: attacker monitors network packets, modifies them, and inserts them back into network  Spam: unsolicited commercial ; more a nuisance than an attack, though is emerging as a vector for some attacks

Principles of Information Security, 2nd Edition22

Principles of Information Security, 2nd Edition23 Figure Man-in-the-Middle

Principles of Information Security, 2nd Edition24 Attacks (continued)  Mail bombing: also a DoS; attacker routes large quantities of to target  Sniffers: program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network  Social engineering: using social skills to convince people to reveal access credentials or other valuable information to attacker

Principles of Information Security, 2nd Edition25 Attacks (continued)  Buffer overflow: application error occurring when more data is sent to a buffer than can be handled  Timing attack: relatively new; works by exploring contents of a Web browser’s cache to create malicious cookie

Principles of Information Security, 2nd Edition26 Attacks (continued)  Denial-of-service (DoS): attacker sends large number of connection or information requests to a target  Target system cannot handle successfully along with other, legitimate service requests  May result in system crash or inability to perform ordinary functions  Distributed denial-of-service (DDoS): coordinated stream of requests is launched against target from many locations simultaneously

Principles of Information Security, 2nd Edition27 Figure Denial-of-Service Attacks

CSE551 Handout on DDoS and Worm28

CSE551 Handout on DDoS and Worm29

CSE551 Handout on DDoS and Worm30

CSE551 Handout on DDoS and Worm31 What Makes DDoS Attacks Possible?  Internet was designed with functionality & not security in mind  Internet security is highly interdependent  Internet resources are limited  Power of many is greater than power of a few

Principles of Information Security, 2nd Edition32 Summary  Threat: object, person, or other entity representing a constant danger to an asset  Attack: a deliberate act that exploits vulnerability