Presentation is loading. Please wait.

Presentation is loading. Please wait.

OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.

Similar presentations


Presentation on theme: "OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats."— Presentation transcript:

1 OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

2 OV 2- 2 Copyright © 2005 Element K Content LLC. All rights reserved. A Social Engineering Attack Attacker Target User name Password 2 2 1 1 1.Attacker obtains credentials from user 2.Attacker uses credentials to mount attack

3 OV 2- 3 Copyright © 2005 Element K Content LLC. All rights reserved. Hackers, Crackers, and Attackers CrackerAttackerHacker

4 OV 2- 4 Copyright © 2005 Element K Content LLC. All rights reserved. Attacker Types  Internal attacker  Hacktivist  Data thief  Script kiddie  Electronic vandal  Cyberterrorist

5 OV 2- 5 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Attack ApplicationOperating system Protocol

6 OV 2- 6 Copyright © 2005 Element K Content LLC. All rights reserved. A Port Scanning Attack PortProtocolState 21FTPOpen 53DNSClosed 80HTTPOpen 110POP3Closed 119NNTPClosed 443HTTPSOpen

7 OV 2- 7 Copyright © 2005 Element K Content LLC. All rights reserved. An Eavesdropping Attack

8 OV 2- 8 Copyright © 2005 Element K Content LLC. All rights reserved. An IP Spoofing Attack IP Packet Target 192.168.0.77 Real IP address: 10.10.10.25 Real IP address: 10.10.10.25 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77

9 OV 2- 9 Copyright © 2005 Element K Content LLC. All rights reserved. A Hijacking Attack

10 OV 2- 10 Copyright © 2005 Element K Content LLC. All rights reserved. A Replay Attack 10:00 A.M. 1:00 P.M.

11 OV 2- 11 Copyright © 2005 Element K Content LLC. All rights reserved. A Man-in-the-Middle Attack

12 OV 2- 12 Copyright © 2005 Element K Content LLC. All rights reserved. A DoS Attack

13 OV 2- 13 Copyright © 2005 Element K Content LLC. All rights reserved. A DDoS Attack Drones

14 OV 2- 14 Copyright © 2005 Element K Content LLC. All rights reserved. Types of DoS Attacks  Smurf  Buffer overflow  SYN flood

15 OV 2- 15 Copyright © 2005 Element K Content LLC. All rights reserved. A Malicious Code Attack

16 OV 2- 16 Copyright © 2005 Element K Content LLC. All rights reserved. Types of Malicious Code Viruses Worms Trojans Logic Bombs

17 OV 2- 17 Copyright © 2005 Element K Content LLC. All rights reserved. Default Security Attacks

18 OV 2- 18 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Exploitation Attack Known flaw

19 OV 2- 19 Copyright © 2005 Element K Content LLC. All rights reserved. Types of Software Exploitation Attacks  Buffer overflow  Mathematical  Weak keys

20 OV 2- 20 Copyright © 2005 Element K Content LLC. All rights reserved. Misuse of Privilege Attacks Administrative user

21 OV 2- 21 Copyright © 2005 Element K Content LLC. All rights reserved. A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234

22 OV 2- 22 Copyright © 2005 Element K Content LLC. All rights reserved. Types of Password Attacks  Guessing  Stealing  Brute force  Dictionary  Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234

23 OV 2- 23 Copyright © 2005 Element K Content LLC. All rights reserved. A Backdoor Attack Backdoor account

24 OV 2- 24 Copyright © 2005 Element K Content LLC. All rights reserved. Hardware Attacks

25 OV 2- 25 Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?


Download ppt "OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats."

Similar presentations


Ads by Google