OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Lesson 3-Hacker Techniques
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Taxonomy of Computer Security Incidents Yashodhan Fadnavis.
Chapter 8 Cybercrime, Cyberterrorism, and Cyberwarfare.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
BUSINESS PLUG-IN B6 Information Security.
Types of Attacks, Hackers Motivations and Methods
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals Summer 2006.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
Chapter 8 Cybercrime, Cyberterrorism, and Cyberwarfare.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Threats and Attacks Principles of Information Security, 2nd Edition
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Chapter Threats in Networks Network Security / G. Steffen.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Copyright © Center for Systems Security and Information Assurance
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security Threats and Attacks  Network-Based Security Threats and Attacks.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Types of Attacks and Malicious Software
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
The Need for Security Principles of Information Security Chapter 2.
Guide to TCP/IP Fourth Edition
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Guide to Firewalls and VPNs, 3 rd Edition Chapter One Introduction to Information Security.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Chapter 1: Modern Network Security Threats
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Chapter 2: Attackers and Their Attacks
Attacks and Malicious Code
Secure Software Confidentiality Integrity Data Security Authentication
CompTIA Security+ Study Guide (SY0-501)
Threats in Networks Jagdish S. Gangolly School of Business
Intrusion.
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 2 Copyright © 2005 Element K Content LLC. All rights reserved. A Social Engineering Attack Attacker Target User name Password Attacker obtains credentials from user 2.Attacker uses credentials to mount attack

OV 2- 3 Copyright © 2005 Element K Content LLC. All rights reserved. Hackers, Crackers, and Attackers CrackerAttackerHacker

OV 2- 4 Copyright © 2005 Element K Content LLC. All rights reserved. Attacker Types  Internal attacker  Hacktivist  Data thief  Script kiddie  Electronic vandal  Cyberterrorist

OV 2- 5 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Attack ApplicationOperating system Protocol

OV 2- 6 Copyright © 2005 Element K Content LLC. All rights reserved. A Port Scanning Attack PortProtocolState 21FTPOpen 53DNSClosed 80HTTPOpen 110POP3Closed 119NNTPClosed 443HTTPSOpen

OV 2- 7 Copyright © 2005 Element K Content LLC. All rights reserved. An Eavesdropping Attack

OV 2- 8 Copyright © 2005 Element K Content LLC. All rights reserved. An IP Spoofing Attack IP Packet Target Real IP address: Real IP address: Source IP address: Destination IP address: Source IP address: Destination IP address:

OV 2- 9 Copyright © 2005 Element K Content LLC. All rights reserved. A Hijacking Attack

OV Copyright © 2005 Element K Content LLC. All rights reserved. A Replay Attack 10:00 A.M. 1:00 P.M.

OV Copyright © 2005 Element K Content LLC. All rights reserved. A Man-in-the-Middle Attack

OV Copyright © 2005 Element K Content LLC. All rights reserved. A DoS Attack

OV Copyright © 2005 Element K Content LLC. All rights reserved. A DDoS Attack Drones

OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of DoS Attacks  Smurf  Buffer overflow  SYN flood

OV Copyright © 2005 Element K Content LLC. All rights reserved. A Malicious Code Attack

OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Malicious Code Viruses Worms Trojans Logic Bombs

OV Copyright © 2005 Element K Content LLC. All rights reserved. Default Security Attacks

OV Copyright © 2005 Element K Content LLC. All rights reserved. A Software Exploitation Attack Known flaw

OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Software Exploitation Attacks  Buffer overflow  Mathematical  Weak keys

OV Copyright © 2005 Element K Content LLC. All rights reserved. Misuse of Privilege Attacks Administrative user

OV Copyright © 2005 Element K Content LLC. All rights reserved. A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234

OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Password Attacks  Guessing  Stealing  Brute force  Dictionary  Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234

OV Copyright © 2005 Element K Content LLC. All rights reserved. A Backdoor Attack Backdoor account

OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardware Attacks

OV Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?