Presentation is loading. Please wait.

Presentation is loading. Please wait.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,

Similar presentations


Presentation on theme: "FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,"— Presentation transcript:

1 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,
2nd Edition Chapter 1 Introduction to Information Security

2 Learning Objectives Upon completion of this chapter, you should be able to: Explain the relationship among the component parts of information security, especially network security Define the key terms and critical concepts of information and network security Describe the organizational roles of information and network security professionals Understand the business need for information and network security Identify the threats posed to information and network security, as well as the common attacks associated with those threats Differentiate threats to information within systems from attacks against information within systems Learning Objectives Upon completion of this chapter you should be able to: Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets Know and understand the definition and key characteristics of information security Know and understand the definition and key characteristics of leadership and management Recognize the characteristics that differentiate information security management from general management Firewalls & Network Security, 2nd ed. - Chapter 1 Firewalls & Network Security, 2nd ed. - Chapter 1

3 Introduction Firewalls and network security are critical components in securing day-to-day operations of nearly every organization in business today Before learning to plan, design, and implement firewalls and network security, it is important to understand the larger topic of information security and how these two components fit into it Firewalls and network security have become critical components in securing the day-to-day operations of nearly every organization in business today. Before learning how to plan, design, and implement firewalls and network security, it is important to understand the larger topic of information security and how these two components of security - firewalls and network security - fit into this topic. Firewalls & Network Security, 2nd ed. - Chapter 1

4 What Is Information Security?
Information security (InfoSec) is defined by standards published by CNSS as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information To protect information and related systems, organizations must implement policy, awareness training and education, and technology Information security (InfoSec) is defined by the standards published by the CNSS as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. To protect information and its related systems, organizations must implement such tools as policy, awareness training and education, and technology. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 4

5 Figure 1-1 Components of Information Security
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 5

6 What is Information Security? (continued)
C.I.A. triangle consists of Confidentiality, Integrity, and Availability List of characteristics has expanded over time, but these three remain central Successful organization maintains multiple layers of security: Network security Physical security Personal security Operations security Communications security The C.I.A. triangle is made up of Confidentiality, Integrity, and Availability. Over time the list of characteristics has expanded, but these three remain central. A successful organization should have in place the following multiple layers of security: Network security, Physical security, Personal security, Operations security and Communications security. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 6

7 Critical Characteristics of Information
Availability enables authorized users to access information without interference or obstruction and to receive it in required format Accuracy means information is free from error and has the value the end user expects Authenticity is quality or state of being genuine or original, rather than reproduced or fabricated; information is authentic when it is what was originally created, placed, stored, or transferred Availability enables authorized users—persons or computer systems—to access information without interference or obstruction, and to receive it in the required format. Accuracy means that information is free from mistakes or errors and it has the value that the end user expects. Authenticity of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, or transferred. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 7

8 Critical Characteristics of Information (continued)
Confidentiality is when information is protected from exposure to unauthorized entities Integrity is when information remains whole, complete, and uncorrupted Utility of information is quality or state of having value for some end purpose; information must be in a format meaningful to end user Possession is ownership or control of some object or item; information is in one’s possession if one obtains it, independent of format or other characteristics Confidentiality is when information is protected from disclosure or exposure to unauthorized individuals or systems. This means that only those with the rights and privileges to access information are able to do so. To protect any breach in the confidentiality of information, a number of measures can be used: Information classification, Secure document storage, Application of general security policies, Education of information custodians and end users. Integrity is when information remains whole, complete, and uncorrupted. Utility of information is the quality or state of having value for some purpose or end. To have utility, information must be in a format meaningful to the end user. Possession of information is the ownership or control of some object or item. Information is said to be in one’s possession if one obtains it, independent of format or other characteristics. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 8

9 Figure 1-2 The CIA Triad and the McCumber Cube
Figure 1-2 NSTISSC Security Model The NSTISSC security model, as shown in Figure 1-2, illustrates three dimensions central to the discussion of information security. If we extend the relationship among the three dimensions represented by the axes, we end up with a 3 × 3 × 3 cube with 27 cells. Each of these cells represents an area of intersection among these three dimensions that must be addressed to secure information systems. When using this model to design or review any information security program, you must make sure that each of the 27 cells is properly addressed by each of the three communities of interest. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 9

10 Securing Components When computer is subject of an attack, it is used as active tool to conduct attack When computer is object of an attack, it is entity being attacked Direct attack is when hacker uses a computer to break into a system Indirect attack is when a system is compromised and used to attack other systems, such as a botnet or other distributed denial-of-service attack When a computer is the subject of an attack, it is used as an active tool to conduct the attack. When a computer is the object of an attack, it is the entity being attacked. A direct attack is when a hacker uses a personal computer to break into a system. An indirect attack is when a system is compromised and used to attack other systems, such as in a botnet or other distributed denial-of-service attack. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 10

11 Figure 1-3 Computer as the Subject and Object of an Attack
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 11

12 Balancing Information Access and Security
Information security cannot be an absolute; it is a process, not a goal Information security should balance protection and availability To achieve balance—to operate information system to satisfaction of users and security professionals—level of security must allow reasonable access, yet protect against threats Information security cannot be an absolute: it is a process, not a goal. Information security should balance protection and availability. To achieve balance—that is, to operate an information system to the satisfaction of the user and the security professional—the level of security must allow reasonable access, yet protect against threats. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 12

13 Security Professionals and the Organization
Chief Information Officer Senior technology officer Primarily responsible for advising senior executive(s) for strategic planning Chief Information Security Officer Individual primarily responsible for assessment, management, and implementation of securing information in the organization May also be referred to as Manager for Security, Security Administrator, or a similar title Chief Information Officer the senior technology officer primarily responsible for advising the senior executive(s) for strategic planning Chief Information Security Officer the individual primarily responsible for the assessment, management, and implementation of securing the information in the organization may also be referred to as the Manager for Security, the Security Administrator, or a similar title Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 13

14 Security Professionals and the Organization (continued)
Information security project team should consist of individuals experienced in one or more facets of vast array of technical and nontechnical areas: Champion Team leader Security policy developers Risk assessment specialists Security professionals System, network, and storage administrators End users The information security project team should consist of a number of individuals who are experienced in one or more facets of the vast array of technical and nontechnical areas: Champion Team leader Security policy developers Risk assessment specialists Security professionals System, network and storage administrators End users Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 14

15 Data Ownership Data owner: responsible for the security and use of a particular set of information Data custodian: responsible for the storage, maintenance, and protection of the information Data users: the end systems users who work with the information to perform their daily jobs supporting the mission of the organization Data Ownership Now that you understand the responsibilities of both senior management and the security project team, we can define the roles of those who own and safeguard the data. Data Owner - responsible for the security and use of a particular set of information. Data owners usually determine the level of data classification associated with the data, as well as changes to that classification required by organization change. Data Custodian - responsible for the storage, maintenance, and protection of the information. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans, and reporting to the data owner. Data Users - the end systems users who work with the information to perform their daily jobs supporting the mission of the organization. Everyone in the organization is responsible for the security of data, so data users are included here as individuals with an information security role. Firewalls & Network Security, 2nd ed. - Chapter 1 15

16 Threats Sun Tzu Wu: “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 16

17 Threats (continued) To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems—that is, the enemy In the context of information security, a threat is an object, person, or other entity that represents a constant danger to an asset To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems—that is, the enemy. In the context of information security, a threat is an object, person, or other entity that represents a constant danger to an asset. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 17

18 Threats (continued) Firewalls & Network Security, 2nd ed. - Chapter 1
Slide 18

19 Figure 1-5 Human Error or Failure
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 19

20 Figure 1-6 Shoulder Surfing
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 20

21 Figure 1-7 Hacker Profiles
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 21

22 Espionage or Trespass (continued)
Generally two skill levels among hackers: Expert hacker Develops software scripts and codes exploits Usually a master of many skills Often creates attack software to share with others Unskilled hackers (script kiddies) Hackers of limited skill Use expert-written software to exploit a system Do not usually fully understand systems they hack Deliberate Acts of Espionage or Trespass There are generally two skill levels among hackers. The first is the expert hacker, who develops software scripts and codes exploits used by the second category, the novice, or unskilled hacker. The expert hacker is usually a master of several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system. However, expert hackers have now become bored with directly attacking systems, and have turned to writing software. The software they are writing is automated exploits that allow novice hackers to become script kiddies, hackers of limited skill who use expert-written software to exploit a system, but do not fully understand or appreciate the systems they hack. As a result of preparation and continued vigilance, attacks conducted by scripts are usually predictable, and can be adequately defended against. There are other terms for system rule breakers : The term cracker is now commonly associated with an individual who “cracks” or removes the software protection from an application designed to prevent unauthorized duplication. A phreaker hacks the public telephone network to make free calls, disrupt services, and generally wreak havoc. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 22

23 Espionage or Trespass (continued)
Other terms for system rule breakers: Cracker: “cracks” or removes protection designed to prevent unauthorized duplication Phreaker: hacks the public telephone network Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 23

24 Information Extortion
Information extortion is an attacker or formerly trusted insider stealing information from a computer system and demanding compensation for its return or non-use Extortion found in credit card number theft Deliberate Acts of Information Extortion The threat of information extortion is the possibility of an attacker or formerly trusted insider stealing information from a computer system and demanding compensation for its return or for an agreement to not disclose the information. Extortion is common in credit card number theft. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 24

25 Software Attacks When an individual or group designs software to attack systems, they create malicious code called malware Designed to damage, destroy, or deny service to target systems Includes: Virus (macro virus or boot virus ) Worms Trojan horses Back door or trap door Polymorphic Virus and worm “hoaxes” Deliberate Software Attacks Deliberate software attacks occur when an individual or group designs software to attack an unsuspecting system. Most of this software is referred to as malicious code or malicious software, or sometimes malware. These software components or programs are designed to damage, destroy, or deny service to the target systems. Some of the more common instances of malicious code are viruses and worms, Trojan horses, logic-bombs, back doors, and denial-of-services attacks. Computer viruses are segments of code that perform malicious actions. This code behaves very much like a virus pathogen attacking animals and plants, using the cell’s own replication machinery to propagate and attack. The code attaches itself to the existing program and takes control of that program’s access to the targeted computer. The virus-controlled target program then carries out the virus’s plan, by replicating itself into additional targeted systems. The macro virus is embedded in the automatically executing macro code, common in office productivity software like word processors, spread sheets, and database applications. The boot virus, infects the key operating systems files located in a computer’s boot sector. Worms - malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. Trojan horses - software programs that hide their true nature, and reveal their designed behavior only when activated. Trojan horses are frequently disguised as helpful, interesting or necessary pieces of software, such as readme.exe files often included with shareware or freeware packages. Back door or Trap door - A virus or worm can have a payload that installs a back door or trap door component in a system. This allows the attacker to access the system at will with special privileges. Polymorphism - A threat that changes its apparent shape over time, representing a new threat not detectable by techniques that are looking for a pre-configured signature. These threats actually evolve variations in size and appearance to elude detection by anti-virus software programs, making detection more of a challenge. Virus and Worm Hoaxes - As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus hoaxes. Well-meaning people spread the viruses and worms when they send s warning of fictitious or virus laden threats. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 25

26 Figure 1-8 Trojan Horse Attack
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 26

27 Forces of Nature Forces of nature, force majeure, or acts of God are dangerous because they are unexpected and can occur with very little warning Can disrupt not only the lives of individuals, but also the storage, transmission, and use of information Include fire, flood, earthquake, and lightning as well as electrostatic discharge Since it is not possible to avoid many of these threats, management must implement controls to limit damage and also prepare contingency plans for continued operations Forces of Nature Forces of nature, force majeure, or acts of God pose the most dangerous threats, because they are unexpected and can occur with very little warning. These threats can disrupt not only the lives of individuals, but also the storage, transmission, and use of information. These include fire, flood, earthquake, and lightning as well as volcanic eruption and insect infestation. Since it is not possible to avoid many of these threats, management must implement controls to limit damage and also prepare contingency plans for continued operations. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 27

28 Deviations in Quality of Service
Situations of product or services not delivered as expected Information system depends on many inter-dependent support systems Service issues that dramatically affect the availability of information and systems include: Internet service Communications service Power irregularities Potential Deviations in Quality of Service by Service Providers This category represents situations in which a product or services are not delivered to the organization as expected. The organization’s information system depends on the successful operation of many inter-dependent support systems including, power grids, telecom networks, parts suppliers, service vendors, and even the janitorial staff and garbage haulers. Internet service, communications, and power irregularities are three sets of service issues that dramatically affect the availability of information and systems. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 28

29 Power Irregularities Power irregularities are common and lead to fluctuations such as: Spike: momentary increase Surge: prolonged increase Sag: momentary low voltage Brownout: prolonged drop Fault: momentary loss of power Blackout: prolonged loss Electronic equipment is susceptible to fluctuations; controls can be applied to manage power quality Power Irregularities The threat of irregularities from power utilities are common and can lead to fluctuations such as power excesses, power shortages, and power losses. In the U.S., buildings are “fed” 120-volt, 60-cycle power usually through 15 and 20 amp circuits. Voltage levels can: spike – momentary increase or surge – prolonged increase; sag – momentary low voltage, or brownout – prolonged drop; fault – momentary loss of power, or blackout – prolonged loss; Since sensitive electronic equipment, especially networking equipment, computers, and computer-based systems are susceptible to fluctuations, controls can be applied to manage power quality. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 29

30 Malicious Code This kind of attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information The state of the art in attacking systems is the multi-vector worm using up to six attack vectors to exploit a variety of vulnerabilities in commonly found information system devices Malicious Code This kind of attack includes the execution of viruses, worms, Trojan horses, and active web scripts with the intent to destroy or steal information. The state of the art in attacking systems in 2002 is the multi-vector worm. These attack programs use up to six known attack vectors to exploit a variety of vulnerabilities in commonly found information system devices. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 30

31 Table 1-2 Attack Replication Vectors
New Table Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 31

32 Attack Descriptions “Hoaxes”: a more devious approach to attacking computer systems is transmission of a virus hoax, with a real virus attached Back doors: using a known or previously unknown and newly discovered access mechanism, an attacker can gain access to a system or network resource Password crack: attempting to reverse calculate a password Attack Descriptions Back Doors - Using a known or previously unknown and newly discovered access mechanism, an attacker can gain access to a system or network resource. Password Crack - Attempting to reverse calculate a password. Brute Force - The application of computing and network resources to try every possible combination of options of a password. Dictionary - The dictionary password attack narrows the field by selecting specific accounts to attack and uses a list of commonly used passwords (the dictionary) to guess with. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 32

33 Attack Descriptions (continued)
Brute force: the application of computing and network resources to try every possible combination of options of a password Dictionary: the dictionary password attack narrows the field by selecting specific accounts to attack and uses a list of commonly used passwords (the dictionary) to guide guesses Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 33

34 Attack Descriptions (continued)
Denial-of-service (DoS): attacker sends a large number of connection or information requests to a target; so many requests are made that the target system cannot handle them successfully along with other, legitimate requests for service May result in a system crash or merely an inability to perform ordinary functions Distributed denial-of-service (DDoS): attack in which a coordinated stream of requests is launched against a target from many locations at the same time Attack Descriptions Denial-of-service (DoS) - the attacker sends a large number of connection or information requests to a target. So many requests are made that the target system cannot handle them successfully along with other, legitimate requests for service. This may result in a system crash, or merely an inability to perform ordinary functions. Distributed Denial-of-service (DDoS) - an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 34

35 Figure 1-9 Denial-of-Service Attacks
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 35

36 Attack Descriptions (continued)
Spoofing: technique used to gain unauthorized access whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host Man-in-the-Middle: in this attack, an attacker sniffs packets from the network, modifies them, and inserts them back into the network; also called TCP hijacking Spam: unsolicited commercial ; while many consider spam a nuisance rather than an attack, it is emerging as a vector for some attacks Attack Descriptions Spoofing - a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. Man-in-the-Middle - In the man-in-the-middle or TCP hijacking attack, an attacker sniffs packets from the network, modifies them, and inserts them back into the network. Spam - unsolicited commercial . While many consider Spam a nuisance rather than an attack, it is emerging as a vector for some attacks. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 36

37 Figure 1-10 IP Spoofing Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 37

38 Figure 1-11 Man-in-the-Middle
Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 38

39 Attack Descriptions (continued)
Mail-bombing: another form of attack that is also a DoS, in which an attacker routes large quantities of to the target Sniffer: program and/or device that can monitor data traveling over a network; can be used for both legitimate network management and for stealing information from a network Social engineering: within the context of information security, the process of using social skills to convince people to reveal access credentials or other valuable information Attack Descriptions Mail-bombing - Another form of attack that is also a DoS, in which an attacker routes large quantities of to the target. Sniffers - a program and/or device that can monitor data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. Social Engineering - Within the context of information security, the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 39

40 Attack Descriptions (continued)
“People are the weakest link. You can have the best technology; firewalls, intrusion-detection systems, biometric devices ... and somebody can call an unsuspecting employee. That's all she wrote, baby. They got everything.” “Brick attack”: the best configured firewall in the world can’t stand up to a well-placed brick Attack Descriptions “People are the weakest link. You can have the best technology; firewalls, intrusion-detection systems, biometric devices ... and somebody can call an unsuspecting employee. That's all she wrote, baby. They got everything.” “brick attack” – the best configured firewall in the world can’t stand up to a well placed brick. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 40

41 Attack Descriptions (continued)
Buffer overflow: application error occurs when more data is sent to buffer than it can handle; when buffer overflows, attacker can make target system execute instructions or attacker can take advantage of some other unintended consequence of the failure Timing attack: relatively new, works by exploring contents of Web browser’s cache; can allow collection of information on access to password-protected sites Another attack by the same name involves attempting to intercept cryptographic elements to determine keys and encryption algorithms Attack Descriptions Buffer Overflow - an application error that occurs when more data is sent to a buffer than it can handle. When the buffer overflows, the attacker can make the target system execute instructions, or the attacker can take advantage of some other unintended consequence of the failure. Timing Attack - relatively new, works by exploring the contents of a web browser’s cache. This could allow the designer to collect information on access to password-protected sites. Another attack by the same name involves attempting to intercept cryptographic elements to determine keys and encryption algorithms. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 41

42 Chapter Summary Firewalls and network security are essential components for securing systems that businesses use to run day-to-day operations Information security is protection of information and its critical elements, including systems and hardware that use, store, and transmit that data C.I.A. triangle based on confidentiality, integrity, availability of info and systems that process it CNSS Security model (McCumber Cube) provides graphical description of approach used in computer and information security Firewalls and network security have become essential components for securing the systems businesses use to run their day-to-day operations. Information security is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. The C.I.A. triangle is based on the confidentiality, integrity, and availability of information and the systems that process it. The value of information comes from the characteristics it possesses. The CNSS Security model is known as the McCumber Cube and provides a graphical description of the architectural approach widely used in computer and information security. Firewalls & Network Security, 2nd ed. - Chapter 1 42

43 Chapter Summary (continued)
Computer can be subject of attack or object of attack; two types of attacks: direct and indirect Information security not an absolute: a process, not a goal; should balance reasonable access and availability while protecting against threats Information security performs four functions: Protects organization’s ability to function Enables safe operation of applications implemented on organization’s IT systems Protects data that organization collects and uses Safeguards technology assets of organization A computer can be the subject of an attack, or the object of an attack. There are also two types of attacks: direct attacks and indirect attacks. Information security cannot be an absolute: it is a process, not a goal. Information security should balance protection and availability. To achieve balance—that is, to operate an information system to the satisfaction of the user and the security professional—the level of security must allow reasonable access, yet protect against threats. Information security performs four important organizational functions: Protects the organization’s ability to function, enables the safe operation of applications implemented on the organization’s IT systems, protects the data the organization collects and uses, and safeguards the technology assets in use at the organization. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 43

44 Chapter Summary (continued)
Requires wide range of professionals and skill sets to support information security program Information security project team includes: team leader, security policy developers, risk assessment specialists, security professionals, systems, network and storage administrators, and end users Three types of data ownership: data owner, data custodian, and data user Threat is object, person, or other entity that represents a constant danger to assets It takes a wide range of professionals and skills to support the information security program including the CIO & CISO. Members of the information security project team including team leader, security policy developers, risk assessment specialists, security professionals, systems, network and storage administrators, and end users, data owners, data custodians, and data users. A threat is an object, person, or other entity that represents a constant danger to an asset. They include: 1) human error or failure, 2) compromises to intellectual property, 3) espionage or trespass, 4) information extortion, 5) sabotage or vandalism, 6) theft, 7) software attacks, 8) forces of nature, 9) deviations in quality of service, 10) hardware failures or errors, 11) software failures or errors, and 12) obsolescence. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 44

45 Chapter Summary (continued)
Attack is deliberate act or action that takes advantage of vulnerability to compromise controlled system Vulnerability is identified weakness in controlled system Major types of attacks include: malicious code, “hoaxes” of malicious code, back doors, password cracking, DoS, DDoS, spoofing, man-in-the-middle, spam, mail bombing, sniffers, social engineering, buffer overflow, and timing attacks An attack is an act or action that takes advantage of a vulnerability to compromise a controlled system. A vulnerability is an identified weakness in a controlled system. Attacks occur as a specific act or action that may cause a potential loss. There are major types of attacks including: malicious code, “hoaxes” of malicious code, back doors, password cracking, denial-of-service (DoS) and distributed denial-of-service (DDoS), spoofing, man-in-the-middle, spam, mail bombing, sniffers, social engineering, buffer overflow and timing attacks. Firewalls & Network Security, 2nd ed. - Chapter 1 Slide 45


Download ppt "FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,"

Similar presentations


Ads by Google