Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Lesson 3-Hacker Techniques
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Mr C Johnston ICT Teacher
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Types of Attacks, Hackers Motivations and Methods
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals Summer 2006.
Introduction to Security Computer Networks Computer Networks Term B10.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
PC Support & Repair Chapter 9 Fundamental Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Threats and Attacks Principles of Information Security, 2nd Edition
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security+ All-In-One Edition Chapter 13 – Specific Attacks Brian E. Brzezicki.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Types of Attacks and Malicious Software
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Internet Security facilities for secure communication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 10 Security. A typical secured network Recognizing Security Threats 1- Application-layer attacks Ex: companyname.com/scripts/..%5c../winnt/system32/cmd.exe?/c+dir+c:\
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Ingredients of Security
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals.
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Chapter 2: Attackers and Their Attacks
Chapter 7: Identifying Advanced Attacks
IT Security  .
Attacks and Malicious Code
Business Risks of Insecure Networks
By Arisara Sangsopapun
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Attack and Malicious Code Andrew Anaruk

Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software Exploitation

Denial of Service SYN Floods Smurf Ping of Death DDoS

Spoofing IP Address Spoofing ARP poisoning Web Spoofing Man in the middle attacks Social Engineering DNS Spoofing

“Thwart” Spoofing Filter packets entering your network that have a source address of the local network MAC Binding – Switches store the first MAC Address that appears on a port and it cannot be changed without authentication. Educate users about Web Spoofing. Set home pages to secure sites. DNS spoofing is prevented via securing DNS servers.

Social Engineering Occurs in the “World of People” Try to by-pass the “what you know” aspect of authentication. Dumpster Diving Online Attacks Web spoofing s prompting authentication information

Social Engineering Countermeasures Take Care of Trash –Paper Shredders or Locked Recycle Bins. –Bulk erase Magnetic Media before discarding. –Keep dumpsters in secure areas. Train system users periodically –Educate users about Social Engineering Scams –Inform about the password policy. –Yada yada yada... User’s will still mess up.

Attacks on Encrypted Data Weak Keys Mathematical Attacks Password Guessing Brute Force Dictionary

Software Exploitation Malicious Software or Malware. –Almost an anagram for Walmart????? –Viruses –Backdoors –Trojan Horse –Logic Bombs –Worms