Download presentation
Presentation is loading. Please wait.
Published byDarren Elliott Modified over 9 years ago
1
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats
2
OV 2- 2 Copyright © 2005 Element K Content LLC. All rights reserved. A Social Engineering Attack Attacker Target User name Password 2 2 1 1 1.Attacker obtains credentials from user 2.Attacker uses credentials to mount attack
3
OV 2- 3 Copyright © 2005 Element K Content LLC. All rights reserved. Hackers, Crackers, and Attackers CrackerAttackerHacker
4
OV 2- 4 Copyright © 2005 Element K Content LLC. All rights reserved. Attacker Types Internal attacker Hacktivist Data thief Script kiddie Electronic vandal Cyberterrorist
5
OV 2- 5 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Attack ApplicationOperating system Protocol
6
OV 2- 6 Copyright © 2005 Element K Content LLC. All rights reserved. A Port Scanning Attack PortProtocolState 21FTPOpen 53DNSClosed 80HTTPOpen 110POP3Closed 119NNTPClosed 443HTTPSOpen
7
OV 2- 7 Copyright © 2005 Element K Content LLC. All rights reserved. An Eavesdropping Attack
8
OV 2- 8 Copyright © 2005 Element K Content LLC. All rights reserved. An IP Spoofing Attack IP Packet Target 192.168.0.77 Real IP address: 10.10.10.25 Real IP address: 10.10.10.25 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77
9
OV 2- 9 Copyright © 2005 Element K Content LLC. All rights reserved. A Hijacking Attack
10
OV 2- 10 Copyright © 2005 Element K Content LLC. All rights reserved. A Replay Attack 10:00 A.M. 1:00 P.M.
11
OV 2- 11 Copyright © 2005 Element K Content LLC. All rights reserved. A Man-in-the-Middle Attack
12
OV 2- 12 Copyright © 2005 Element K Content LLC. All rights reserved. A DoS Attack
13
OV 2- 13 Copyright © 2005 Element K Content LLC. All rights reserved. A DDoS Attack Drones
14
OV 2- 14 Copyright © 2005 Element K Content LLC. All rights reserved. Types of DoS Attacks Smurf Buffer overflow SYN flood
15
OV 2- 15 Copyright © 2005 Element K Content LLC. All rights reserved. A Malicious Code Attack
16
OV 2- 16 Copyright © 2005 Element K Content LLC. All rights reserved. Types of Malicious Code Viruses Worms Trojans Logic Bombs
17
OV 2- 17 Copyright © 2005 Element K Content LLC. All rights reserved. Default Security Attacks
18
OV 2- 18 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Exploitation Attack Known flaw
19
OV 2- 19 Copyright © 2005 Element K Content LLC. All rights reserved. Types of Software Exploitation Attacks Buffer overflow Mathematical Weak keys
20
OV 2- 20 Copyright © 2005 Element K Content LLC. All rights reserved. Misuse of Privilege Attacks Administrative user
21
OV 2- 21 Copyright © 2005 Element K Content LLC. All rights reserved. A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234
22
OV 2- 22 Copyright © 2005 Element K Content LLC. All rights reserved. Types of Password Attacks Guessing Stealing Brute force Dictionary Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234
23
OV 2- 23 Copyright © 2005 Element K Content LLC. All rights reserved. A Backdoor Attack Backdoor account
24
OV 2- 24 Copyright © 2005 Element K Content LLC. All rights reserved. Hardware Attacks
25
OV 2- 25 Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.