Professional Documents
Culture Documents
Chapter Two: Threats and Responses
Chapter Two: Threats and Responses
Chapter Two: Threats and Responses
CHAPTER TWO
Threats and Responses
Threats and Vulnerabilities
Attacks and Countermeasure
Course Title:Computer System Security and Information System
What is Threats ?
is a potential violation of security in computing infrastructure OR
is anything that has the potential to disrupt/disturb or do harm to an
organization
When does this happen ?
⇓
circumstance, capability, action or event that could breach security and
cause loss or damage.
A Threat represents a potential security harm to an asset
Cyber security threats encompass a wide range of potentially illegal
activities on internet.
WHAT IS ATTACKS?
Deception
A Situation that may result in an authorized entity receiving false data and
believing it to be true.
Some how related with FP and FN
Attacks as a result of deception
Falsification: False data deceive an authorized entity.
Repudiation: An entity deceives another by falsely denying responsibility for
an act.
Masquerade: An unauthorized entity gains access to a system or performs a
malicious act by posing as an authorized entity.
Disruption
A circumstance that interrupts or prevents the correct operation of system
services and functions.
Its respective attacks
Incapacitation: Prevents or interrupts system operation by disabling a
system component.
Corruption: Undesirably alters system operation by adversely modifying
system functions or data.
Course Title:Computer System Security and Information System
Usurpation
Malware ...
iv Infostealers: Malware that collects sensitive information from an infected
computer and sends it to the malware operator.
iiv Banking Trojans: Malware that specifically targets financial information
2 Phishing
♣ Types of Phishing:
♣ Why Aggressors utilize it
Regular phishing.
Stealing Confidential Information
Spear phishing
Harvesting Login Information
Smishing and vishing
Impersonating
Whaling
Course Title:Computer System Security and Information System
3 Man-in-the-Middle(MitM)
is a general term for when a intruders positions himself
in a conversation between a user and an application.
Why?
⇓
To either to eavesdrop or to impersonate one
of the parties
4 Cyber Vandalism
Involves editing online content in a malicious manner.
It involves adding or removing or modifying content which is offensive or is
in bad taste!
5 Web Jacking:
Attackers create a fake website and when the website opens it will direct it
to another website and harm the user’s system. OR
is the forceful control of a web server through gaining access and control
over the website of another
5 Passwork Attack
Any attempt to obtain or decrypt user’s passwork for illegal access.
What are the cyber-crimes of Password Attacks ?
1 Brute-Force-Attacks
2 Dictionary Attacks
3 KeyLogger Attacks
Course Title:Computer System Security and Information System
3 Man-in-the-Middle(MitM)
is a general term for when a intruders positions himself
in a conversation between a user and an application.
Why?
⇓
To either to eavesdrop or to impersonate one
of the parties
4 Cyber Vandalism
Involves editing online content in a malicious manner.
It involves adding or removing or modifying content which is offensive or is
in bad taste!
5 Web Jacking:
Attackers create a fake website and when the website opens it will direct it
to another website and harm the user’s system. OR
is the forceful control of a web server through gaining access and control
over the website of another
5 Passwork Attack
Any attempt to obtain or decrypt user’s passwork for illegal access.
What are the cyber-crimes of Password Attacks ?
1 Brute-Force-Attacks
2 Dictionary Attacks
3 KeyLogger Attacks
Course Title:Computer System Security and Information System
3 Man-in-the-Middle(MitM)
is a general term for when a intruders positions himself
in a conversation between a user and an application.
Why?
⇓
To either to eavesdrop or to impersonate one
of the parties
4 Cyber Vandalism
Involves editing online content in a malicious manner.
It involves adding or removing or modifying content which is offensive or is
in bad taste!
5 Web Jacking:
Attackers create a fake website and when the website opens it will direct it
to another website and harm the user’s system. OR
is the forceful control of a web server through gaining access and control
over the website of another
5 Passwork Attack
Any attempt to obtain or decrypt user’s passwork for illegal access.
What are the cyber-crimes of Password Attacks ?
1 Brute-Force-Attacks
2 Dictionary Attacks
3 KeyLogger Attacks
Course Title:Computer System Security and Information System
3 Man-in-the-Middle(MitM)
is a general term for when a intruders positions himself
in a conversation between a user and an application.
Why?
⇓
To either to eavesdrop or to impersonate one
of the parties
4 Cyber Vandalism
Involves editing online content in a malicious manner.
It involves adding or removing or modifying content which is offensive or is
in bad taste!
5 Web Jacking:
Attackers create a fake website and when the website opens it will direct it
to another website and harm the user’s system. OR
is the forceful control of a web server through gaining access and control
over the website of another
5 Passwork Attack
Any attempt to obtain or decrypt user’s passwork for illegal access.
What are the cyber-crimes of Password Attacks ?
1 Brute-Force-Attacks
2 Dictionary Attacks
3 KeyLogger Attacks
Course Title:Computer System Security and Information System
3 Man-in-the-Middle(MitM)
is a general term for when a intruders positions himself
in a conversation between a user and an application.
Why?
⇓
To either to eavesdrop or to impersonate one
of the parties
4 Cyber Vandalism
Involves editing online content in a malicious manner.
It involves adding or removing or modifying content which is offensive or is
in bad taste!
5 Web Jacking:
Attackers create a fake website and when the website opens it will direct it
to another website and harm the user’s system. OR
is the forceful control of a web server through gaining access and control
over the website of another
5 Passwork Attack
Any attempt to obtain or decrypt user’s passwork for illegal access.
What are the cyber-crimes of Password Attacks ?
1 Brute-Force-Attacks
2 Dictionary Attacks
3 KeyLogger Attacks
Course Title:Computer System Security and Information System
Denial of Services
such attacks are designed to deny access to critical services. How?
⇓
By exploiting a vulnerability in an application or by flooding a
system with more data or requests than it is able to manage.
Eavasdropping
SQL injection
DNS Tunneling
DNS Spoofing
Cyber Terrorism
Cyber Contraband
Cyber Trespass
Course Title:Computer System Security and Information System
♣ What is Countermeasure?
is any means taken to deal with a security attack.
devised to prevent a particular type of attack from succeeding.
When prevention is not possible or down, What then ?
⇓
The goal must be to detect the attack then recover from the effects of the
attack.
A countermeasure may itself introduce new vulnerabilities.
⇓
In any case, residual vulnerabilities may remain after the
imposition of countermeasures.
Course Title:Computer System Security and Information System
Attack Surface
is the number of all possible points, or attack vectors, where an
unauthorized user can access a system and extract data.
Following examples enlarge the attack surface
Open ports (TCP/UPD...)
Services available on the inside of a firewall
Snippet of Code systematically processing incoming data
Interfaces, SQL, web forms
An employee with access to sensitive information
Attack surface may be either and
Digital Attack Surface
• Any computing assets (i.e hardware and software) that connect to an
organization’s network.
⇓
Applications, code, ports, servers, and websites
Physical Attack Surface
⇓
• Any endpoint devices that an attacker can gain physical access to
⇓
May be desktop computers, hard drives, laptops, mobile phones, and
Universal Serial Bus (USB) drives.
Course Title:Computer System Security and Information System
Questions?!
End of chapter ...?!