OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats
OV 2- 2 Copyright © 2005 Element K Content LLC. All rights reserved. A Social Engineering Attack Attacker Target User name Password Attacker obtains credentials from user 2.Attacker uses credentials to mount attack
OV 2- 3 Copyright © 2005 Element K Content LLC. All rights reserved. Hackers, Crackers, and Attackers CrackerAttackerHacker
OV 2- 4 Copyright © 2005 Element K Content LLC. All rights reserved. Attacker Types Internal attacker Hacktivist Data thief Script kiddie Electronic vandal Cyberterrorist
OV 2- 5 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Attack ApplicationOperating system Protocol
OV 2- 6 Copyright © 2005 Element K Content LLC. All rights reserved. A Port Scanning Attack PortProtocolState 21FTPOpen 53DNSClosed 80HTTPOpen 110POP3Closed 119NNTPClosed 443HTTPSOpen
OV 2- 7 Copyright © 2005 Element K Content LLC. All rights reserved. An Eavesdropping Attack
OV 2- 8 Copyright © 2005 Element K Content LLC. All rights reserved. An IP Spoofing Attack IP Packet Target Real IP address: Real IP address: Source IP address: Destination IP address: Source IP address: Destination IP address:
OV 2- 9 Copyright © 2005 Element K Content LLC. All rights reserved. A Hijacking Attack
OV Copyright © 2005 Element K Content LLC. All rights reserved. A Replay Attack 10:00 A.M. 1:00 P.M.
OV Copyright © 2005 Element K Content LLC. All rights reserved. A Man-in-the-Middle Attack
OV Copyright © 2005 Element K Content LLC. All rights reserved. A DoS Attack
OV Copyright © 2005 Element K Content LLC. All rights reserved. A DDoS Attack Drones
OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of DoS Attacks Smurf Buffer overflow SYN flood
OV Copyright © 2005 Element K Content LLC. All rights reserved. A Malicious Code Attack
OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Malicious Code Viruses Worms Trojans Logic Bombs
OV Copyright © 2005 Element K Content LLC. All rights reserved. Default Security Attacks
OV Copyright © 2005 Element K Content LLC. All rights reserved. A Software Exploitation Attack Known flaw
OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Software Exploitation Attacks Buffer overflow Mathematical Weak keys
OV Copyright © 2005 Element K Content LLC. All rights reserved. Misuse of Privilege Attacks Administrative user
OV Copyright © 2005 Element K Content LLC. All rights reserved. A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234
OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Password Attacks Guessing Stealing Brute force Dictionary Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234
OV Copyright © 2005 Element K Content LLC. All rights reserved. A Backdoor Attack Backdoor account
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardware Attacks
OV Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?