Download presentation
Presentation is loading. Please wait.
1
Threats By Dr. Shadi Masadeh
2
Security Threats and Attacks
A threat is a potential violation of security. Flaws in design, implementation, and operation. An attack is any action that violates security. Active adversary.
3
Types of Security Threats and Attacks Eavesdropping - Message Interception (Attack on Confidentiality) Unauthorized access to information Packet sniffers and wiretappers Illicit copying of files and programs R S Eavesdropper
4
Types of Security Threats and Attacks Integrity Attack - Tampering With Messages
Stop the flow of the message Delay and optionally modify the message Release the message again Interruption an asset becomes lost, unavailable, or unusable R S Perpetrator
5
Types of Security Threats and Attacks Authenticity Attack - Fabrication
Unauthorized assumption of other’s identity Generate and distribute objects under this identity R S Masquerader: from S
6
Types of Security Threats and Attacks Attack on Availability
Destroy hardware (cutting fiber) or software Modify software in a subtle way (alias commands) Corrupt packets in transit Blatant denial of service (DoS): Crashing the server Overwhelm the server (use up its resource) S R
7
Who are the Attackers 1. Elite Hackers White hat hackers
This is still illegal Break into system but notify firm or vendor of vulnerability Black hat hackers Do not hack to find and report vulnerabilities Gray hat hackers go back and forth between the two ways of hacking Hack but with code of ethics Codes of conduct are often amoral “Do not harm,” but delete log files, destroy security settings, etc. Distrust of evil businesses and government Still illegal
8
Who are the Attackers (Cont.)
2. Virus Writers and Releasers Virus writers versus virus releasers Only releasing viruses is punishable
9
Who are the Attackers (Cont.)
3. Script Kiddies Use prewritten attack scripts (kiddie scripts) Viewed as alamers and script kiddies Large numbers make dangerous Noise of kiddie script attacks makes more sophisticated attacks
10
Who are the Attackers (Cont.)
4. Criminals Many attackers are ordinary garden-variety criminals Credit card and identity theft Side note on threat to Credit Card #. How do attacker capture credit card information? Via “Sniffing” traffic? How many of the audience have worries when shopping online? How many of the audience ever used a credit card to pay for a restaurant meal? Stealing trade secrets (intellectual property) Extortion
11
Who are the Attackers (Cont.)
5. Corporate Employees Have access and knowledge Financial theft Theft of trade secrets (intellectual property) Sabotage Consultants and contractors IT and security staff are biggest danger
12
Who are the Attackers (Cont.)
6. Cyberterrorism and Cyberwar New level of danger Infrastructure destruction Attacks on IT infrastructure Use IT to establish physical infrastructure (energy, banks, etc.) Simultaneous multi-pronged attacks Cyberterrorists by terrorist groups versus cyberwar by national governments Amateur information warfare
13
Framework for Attacks Attacks Physical Access Attacks -- Wiretapping
Server Hacking Vandalism Social Engineering -- Opening Attachments Password Theft Information Theft Dialog Attacks -- Eavesdropping Impersonation Message Alteration Penetration Attacks Malware -- Viruses Worms Denial of Service Scanning (Probing) Break-in
14
Methods of Defense Encryption (DES and RSA)
Software Controls (access limitations in a data base, in operating system protect each user from other users) Hardware Controls (smartcard) Policies (frequent changes of passwords) Physical Controls (key lockers)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.