Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.

Similar presentations


Presentation on theme: "Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication."— Presentation transcript:

1 Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication media –software that includes application and special programs, system backups and diagnostic programs, and system programs like operating systems and protocols –data in storage, transition, or undergoing modification

2 –people that include users, system administrators, and hardware and software manufacturers –documentation which includes user information for hardware and software, administrative procedures, and policy documents, and –supplies that include paper and printer cartridges A cyber threats is an intended or unintended illegal activity, an unavoidable or inadvertent event that has the potential or could lead to unpredictable, unintended, and adverse consequences on a cyberspace resource.

3 Most cyber attacks can be put in one of the following categories: –Natural or Inadvertent attack – including things like include accidents originating from natural disaster like fire, floods, windstorms, lightening and earthquakes, and they usually occur very quickly without warning, and are beyond human capacity, often causing serious damage –Human blunders, errors, and omissions – including things like unintentional human actions –Intentional threats like illegal or criminal acts from either insiders or outsiders, recreational hackers, and criminal

4 Types of e-attacks: –Penetration Attack Type -involves breaking into a system using known security vulnerabilities to gain access to any cyberspace resource – There is steady growth of these attacks – see the CERT Report below.

5 –Denial of Service Attacks – they affect the system through diminishing the system’s ability to function; hence, they are capable of bringing a system down without destroying its resources Motives of E-attacks –Vendetta/Revenge –Joke/Hoax/Prank –The Hacker's Ethics - This is a collection of motives that make up the hacker character –Terrorism –Political and Military Espionage –Business ( Competition) Espionage –Hate (national origin, gender, and race) –Personal gain/Fame/Fun/Notoriety –Ignorance

6 Topography of Attacks –One-to-One –One-to-Many –Many-to-One –Many-to-Many Behavioral Forensics – an analysis of the motives and reasons why such attacks occur. The analysis is based on the postmortem of data (historical data). Study the most (current) common security threats.


Download ppt "Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication."

Similar presentations


Ads by Google