Presentation is loading. Please wait.

Presentation is loading. Please wait.

OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.

Similar presentations


Presentation on theme: "OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats."— Presentation transcript:

1 OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

2 OV 2- 2 Copyright © 2005 Element K Content LLC. All rights reserved. A Social Engineering Attack Attacker Target User name Password Attacker obtains credentials from user 2.Attacker uses credentials to mount attack

3 OV 2- 3 Copyright © 2005 Element K Content LLC. All rights reserved. Hackers, Crackers, and Attackers CrackerAttackerHacker

4 OV 2- 4 Copyright © 2005 Element K Content LLC. All rights reserved. Attacker Types  Internal attacker  Hacktivist  Data thief  Script kiddie  Electronic vandal  Cyberterrorist

5 OV 2- 5 Copyright © 2005 Element K Content LLC. All rights reserved. A Software Attack ApplicationOperating system Protocol

6 OV 2- 6 Copyright © 2005 Element K Content LLC. All rights reserved. A Port Scanning Attack PortProtocolState 21FTPOpen 53DNSClosed 80HTTPOpen 110POP3Closed 119NNTPClosed 443HTTPSOpen

7 OV 2- 7 Copyright © 2005 Element K Content LLC. All rights reserved. An Eavesdropping Attack

8 OV 2- 8 Copyright © 2005 Element K Content LLC. All rights reserved. An IP Spoofing Attack IP Packet Target Real IP address: Real IP address: Source IP address: Destination IP address: Source IP address: Destination IP address:

9 OV 2- 9 Copyright © 2005 Element K Content LLC. All rights reserved. A Hijacking Attack

10 OV Copyright © 2005 Element K Content LLC. All rights reserved. A Replay Attack 10:00 A.M. 1:00 P.M.

11 OV Copyright © 2005 Element K Content LLC. All rights reserved. A Man-in-the-Middle Attack

12 OV Copyright © 2005 Element K Content LLC. All rights reserved. A DoS Attack

13 OV Copyright © 2005 Element K Content LLC. All rights reserved. A DDoS Attack Drones

14 OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of DoS Attacks  Smurf  Buffer overflow  SYN flood

15 OV Copyright © 2005 Element K Content LLC. All rights reserved. A Malicious Code Attack

16 OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Malicious Code Viruses Worms Trojans Logic Bombs

17 OV Copyright © 2005 Element K Content LLC. All rights reserved. Default Security Attacks

18 OV Copyright © 2005 Element K Content LLC. All rights reserved. A Software Exploitation Attack Known flaw

19 OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Software Exploitation Attacks  Buffer overflow  Mathematical  Weak keys

20 OV Copyright © 2005 Element K Content LLC. All rights reserved. Misuse of Privilege Attacks Administrative user

21 OV Copyright © 2005 Element K Content LLC. All rights reserved. A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234

22 OV Copyright © 2005 Element K Content LLC. All rights reserved. Types of Password Attacks  Guessing  Stealing  Brute force  Dictionary  Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass 1234 !Pass 1234

23 OV Copyright © 2005 Element K Content LLC. All rights reserved. A Backdoor Attack Backdoor account

24 OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardware Attacks

25 OV Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?


Download ppt "OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats."

Similar presentations


Ads by Google