chapter 5 – basic security

19

Upload: sharifahnur

Post on 19-Dec-2015

11 views

Category:

Documents


1 download

DESCRIPTION

Basic Security

TRANSCRIPT

Page 1: Chapter 5 – Basic Security
Page 2: Chapter 5 – Basic Security

Malicious Code Hacking Natural Disaster Theft

Page 3: Chapter 5 – Basic Security

The effect is caused by an agent, with the intention to cause damage.

The agent for malicious code is the writer of the code, or any person who causes its distribution.

There are various kinds of malicious code, include virus, Trojan horse, worm and many others.

Page 4: Chapter 5 – Basic Security

Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker.

Hackers are persons who learn about the computer system in detail. They write program referred to as hacks.

Hackers may use a modem or cable to hack the targeted computers.

Page 5: Chapter 5 – Basic Security

Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles. Examples of natural and environmental disasters: Flood FireEarthquakes, storms and tornadosExcessive Heat Inadequate Power Supply

Page 6: Chapter 5 – Basic Security

Two types of computer theft:Computer is used to steal money, goods,

information and resources.Stealing of computer, especially notebook

and PDAs.

Page 7: Chapter 5 – Basic Security

Once the hacker gains access to the network, four types of threat may arise: Information theft Identity theftData loss / manipulationDisruption of service

Page 8: Chapter 5 – Basic Security

Information TheftBreaking into a computer to obtain confidential

information. Information can be used or sold for various purposes. Example: Stealing a organization’s proprietary information, such as research and development information

Identity theftA form of information theft where personal

information is stolen for the purpose of taking over someone’s identity. Using this information an individual can obtain legal documents, apply for credit and make authorized online purchases.

Page 9: Chapter 5 – Basic Security

Data Loss and ManipulationBreaking into a computer to destroy or

after data records. Example of data loss: sending a virus that reformats a computer hard drive. Example of data manipulation: breaking into a records system to change information, such as the price of an item.

Disruption of ServicePreventing legitimate users from accessing

services to which they should be entitled.

Page 10: Chapter 5 – Basic Security

Security threats from network intruders can come from both internal and external sources.

External Threats- External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.

Internal Threats- Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment. The internal attacker knows the internal politics and people. They often know what information is both valuable and vulnerable and how to get to it.

Page 11: Chapter 5 – Basic Security

Common methods of exploiting human weaknesses.

Social Engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.

Attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords.

Three of the most commonly used

techniques in social engineering are: pretexting, phishing, and vishing.

Page 12: Chapter 5 – Basic Security

Pretexting Target is typically contacted over the telephone. For

example, if an attacker knows the target's social security number, they may use that information to gain the trust of their target. The target is then more likely to release further information.

Phishing They typically contact the target individual (the

phishee) via email. The phisher might ask for verification of information, such as passwords or usernames in order prevent some terrible consequence from occurring.

Vishing / Phone Phishing A new form of social engineering that uses Voice

over IP (VoIP). With vishing, an unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service. The call is then intercepted by a thief. Bank account numbers or passwords entered over the phone for verification are then stolen.

Page 13: Chapter 5 – Basic Security
Page 14: Chapter 5 – Basic Security

VIRUS WORMS TROJAN

Characteristic - Replicates itself, and propagated with human intrusion

- Replicate itself and propagated without human intrusion

- Does not replicate itself.

Distribution via email attachments, downloaded files, instant messages or via diskette, CD or USB devices.

through email or file transfer.

by opening an email attachment or downloading and running a file from the Internet.

Effect to system

viruses can erase or files and applications, crash your system.

system hang or slow

create a back door into a system allowing hackers to gain access.

Page 15: Chapter 5 – Basic Security

DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. DoS attacks can target end user systems, servers, routers, and network links.

In general, DoS attacks seek to: Flood a system or network with traffic to prevent

legitimate network traffic from flowing Disrupt connections between a client and server to

prevent access to a service

Page 16: Chapter 5 – Basic Security

Two common DoS attacks are:

SYN (synchronous) Flooding - a flood of packets are sent to a server requesting a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests and therefore cannot respond to legitimate ones.

Ping of death: a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.

Page 17: Chapter 5 – Basic Security

• It is designed to saturate and overwhelm network links with useless data.

• DDoS operates on a much larger scale than DoS attacks. Typically hundreds or thousands of attack points attempt to overwhelm a target simultaneously.

• The attack points may be unsuspecting computers that have been previously infected by the DDoS code. The systems that are infected with the DDoS code attack the target site when invoked.

Page 18: Chapter 5 – Basic Security

• A Brute force attack is another type of attack that may result in denial of services.

• With brute force attacks, a fast computer is used to try to guess passwords or to decipher an encryption code.

• The attacker tries a large number of possibilities in rapid succession to gain access or crack the code.

• Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.

Page 19: Chapter 5 – Basic Security

Discuss in group about the topic given below.1. Spyware ( Group 1 n 2)2. Tracking Cookies ( Group 3 n 4)3. Adware ( Group 5 n 6)4. Pop-Up ( Group 7 n 8)5. Spam ( Group 9 n 10)

*** Present on next class using Power Point