Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Lesson 3-Hacker Techniques
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Types of Attacks, Hackers Motivations and Methods
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals Summer 2006.
Network Attacks Mark Shtern.
Computer Viruses.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Copyright © Center for Systems Security and Information Assurance
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Viruses & Destructive Programs
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Targeted Break-in, DoS, & Malware attacks (II) (February ) © Abdou Illia – Spring 2015.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Information Systems Design and Development Security Risks Computing Science.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter 2: Attackers and Their Attacks
Chapter 40 Internet Security.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Operating Systems Services provided on internet
Network Security Fundamentals
IT Security  .
Attacks and Malicious Code
Answer the questions to reveal the blocks and guess the picture.
NET 311 Information Security
Malware, Phishing and Network Policies
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would use. Its important to understand that there is different kinds of attacks, and that a attack can either concentrated on you / your system, or a wide range attacks, that scans for weak systems to attack.

Attacks On systems And Nettwoks We have 5 kinds of attacks: Basic Attack Identity Attack Denial of Service Attack Malicious Code Attack

Attacks On systems And Nettwoks Basic Attacks Basic attacks are attacks that not always require a high degree of technical skill, but sometimes rely more on guesswork and cunning than anything else. We divide Basic Attacks into subcategories: Social engineering Tricks people to give you information Phissing attempts Dumpster diving Password guessing Brute force attacks Dictionary attacks Weak keys Exploits weak encryption keys with a known hack Mathematical and birthday attacks

Identity Attacks Identity attack, is an attack where the attacker tries to take over, modify or sniff your network traffic. We have three types of Identity attacks: Man-in-the middle Passive attack, just captures the data traffic Active attack, captures and modify the data before sending it to the receiver Replay attack Captures data sent between a user and a server, then sends a fragment of the captured data back to the server to obtain access without user name and password. Tcp/ip hijacking ARP Spoofing, edits the ARP table to send a packet to another destination then targeted.

Denial Of Service Attack A DOS attack tries to take down your system by flooding it with request such as SYN request or ping request Denial of service(Dos)‏ Requests contact with a server(SYN), and does not answer to the AKC reply from the server, this causes the server to wait for an answer for several minutes, and this use a lot of resources. Smurf Attack. The attacker sends a ping request to a victim with a spoofed senders address, causing the victim to answer to the spoofed address. Distributed Denial of service(DDos)‏ Uses hundreds or thousands of computers to attack a system. A hacker breaks into a high performance computer and installs a special software. The software scans for other vulnerability on them, if found, installs a software. These computers are called zombies. Attacker only sends a attack commando to the handler. The handler spreads the message to all the zombies and the attack launches..

Malicious Code Malicious code, also called malware, consist of computer programs design to break into computers or to destroy data. These are the most common types of malware: Virus A small program secretly attached to another file, executes when file is opened. Worms Self-executing program, that often are attached to . Logic bombs A small program that gets executed by a special event such as a date or a change in a program/file. Trojan Horses A program that hides its true intent and then reveal itself when activated. Might be a screen saver that sends information back to a hacker. Back doors A secret entrance into a computer of which the user is unaware of. A back door can be created by the software designer for testing purposes, or by a hacker how creates a virus / Trojan horse, and distributes it..

How perform these attacks? People how perform these kinds of attacks usually do it for a reason. It can either be motivated by money or it can be done to earn respect among a special group of people. Hackers A hacker hacks your system to find a problem, and let you know, so that crackers wont exploit it. Crackers Have intent to harm or take over your system. Script kiddies A unskilled user how downloads a software to perform an attack Spies A person who has been hired to break into the the system to get information Employees Might insert a virus to the system if they feel overlooked.... Cyberterrosists Defacing, ddos attacks.

How can we protect our self against attacks from hackers and crackers? Update Operating system Update network services Update software Have good procedures among employees Educate your users

Source:: Security + guide to Network Security fundamentals (second edition)‏