1 / 25

Security Threats

Security Threats. Social Engineering Software-based Threats Hardware-based Threats. A Social Engineering Attack. 1. Attacker obtains credentials from user Attacker uses credentials to mount attack. User name Password. 2. Attacker. Target. Hackers, Crackers, and Attackers. Hacker.

Download Presentation

Security Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Threats • Social Engineering • Software-based Threats • Hardware-based Threats

  2. A Social Engineering Attack 1 • Attacker obtains credentials from user • Attacker uses credentials to mount attack User name Password 2 Attacker Target

  3. Hackers, Crackers, and Attackers Hacker Cracker Attacker

  4. Attacker Types • Internal attacker • Hacktivist • Data thief • Script kiddie • Electronic vandal • Cyberterrorist

  5. A Software Attack Application Operating system Protocol

  6. A Port Scanning Attack

  7. An Eavesdropping Attack

  8. An IP Spoofing Attack Real IP address: 10.10.10.25 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77 IP Packet Target 192.168.0.77

  9. A Hijacking Attack

  10. A Replay Attack 10:00 A.M. 1:00 P.M.

  11. A Man-in-the-Middle Attack

  12. A DoS Attack

  13. A DDoS Attack Drones

  14. Types of DoS Attacks • Smurf • Buffer overflow • SYN flood

  15. A Malicious Code Attack

  16. Types of Malicious Code Viruses Trojans Worms Logic Bombs

  17. Default Security Attacks

  18. A Software Exploitation Attack Known flaw

  19. Types of Software Exploitation Attacks • Buffer overflow • Mathematical • Weak keys

  20. Misuse of Privilege Attacks Administrative user

  21. A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass1234 !Pass1234

  22. Types of Password Attacks • Guessing • Stealing • Brute force • Dictionary • Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass1234 !Pass1234

  23. A Backdoor Attack Backdoor account

  24. Hardware Attacks

  25. Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?

More Related