Download presentation
Presentation is loading. Please wait.
1
Unit 1.6 Systems security Lesson 2
2
This lesson covers the following from specification 1
This lesson covers the following from specification 1.6 System Security: Forms of attack Threats posed to networks: Malware Phishing People as the weak point in secure systems (social engineering) Brute force attacks DDOS Data interception and theft SQL injection Poor network policy Identifying and preventing vulnerabilities Penetration testing Network forensics Network policies Anti-malware software Firewalls User access levels Passwords Encryption
3
Key Words Brute force attacks DDOS Botnet Exploit SQL injection
4
Big Picture What is a brute force attack?
5
Learning Objectives Understand the meaning of DDOS and brute force attacks Explain the effects of a DDOS attack Explain how to be protected against DDOS attacks Understand the concept of SQL injection Explain how a vulnerability can be exploited
6
Engagement Activity What DDOS attacks have you heard about in recent years? Who was involved? Who was affected by the attack (business, clients, customers)? Was there a motive around the attack?
7
Brute force attacks Trial and error method
Can be used for gaining access to password-based entry systems Consists of an attacker trying possible passwords and passphrases until a correct one is found
8
DDOS
9
DDOS Overloading a website with unwanted traffic
Uses a number of computers over a network of infected machines which send requests to a website which would bring it offline Used as a ‘botnet’
10
Activity 1 Answer the following questions: Extension:
Explain a recent DDOS attack and discuss the effects on customers and businesses. Research and describe a ’botnet’ and explain how they originate Extension: How can companies protect themselves from DDOS attacks?
11
SQL Injection Where an attacker can execute malicious SQL statements using software which controls a database management system Can affect websites that use SQL-based databases Companies that use SQL include Google, YouTube, PayPal, eBay, Cisco Exploits that have been identified must be patched quickly to reduce impact on businesses therefore important for organisations to update infrastructure regularly.
12
SQL Injection By exploiting the vulnerabilities of SQL through injection, attackers could access systems containing customer data, intellectual property and other sensitive information.
13
What is needed to carry out an SQL injection?
A relational database using SQL at the time of the attack Malicious code to be used in an SQL query when it is run in order for the injection attack to take place.
14
The effects of a successful attack
Should an attacker gain access to the database, they could: Bypass authentication procedures and impersonate specific users Execute queries, exposing data Altering data, resulting in data integrity issues Delete data
15
Activity 2 Create an informative leaflet for SQL administrators explaining the importance of protecting against SQL injection and how attackers can exploit vulnerabilities in SQL databases.
16
Plenary Paired quiz – best answer sharing What is a DDOS attack?
What are botnets? How does SQL injection work?
17
OCR Resources: the small print OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. © OCR This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work. OCR acknowledges the use of the following content: n/a Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications:
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.