50 likes | 257 Views
people that include users, system administrators, and hardware and software manufacturers documentation which includes user information for hardware and software, administrative procedures, and policy documents, and supplies that include paper and printer cartridges A cyber threats is an intended or unintended illegal activity, an unavoidable or inadvertent event that has the potential or could lead to unpredictable, unintended, and adverse consequences on a cyberspace resource. .
E N D
1. Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include:
hardware like computers, printers, scanners, servers and communication media
software that includes application and special programs, system backups and diagnostic programs, and system programs like operating systems and protocols
data in storage, transition, or undergoing modification
2. people that include users, system administrators, and hardware and software manufacturers
documentation which includes user information for hardware and software, administrative procedures, and policy documents, and
supplies that include paper and printer cartridges
A cyber threats is an intended or unintended illegal activity, an unavoidable or inadvertent event that has the potential or could lead to unpredictable, unintended, and adverse consequences on a cyberspace resource.
3. Most cyber attacks can be put in one of the following categories:
Natural or Inadvertent attack – including things like include accidents originating from natural disaster like fire, floods, windstorms, lightening and earthquakes, and they usually occur very quickly without warning, and are beyond human capacity, often causing serious damage
Human blunders, errors, and omissions – including things like unintentional human actions
Intentional threats like illegal or criminal acts from either insiders or outsiders, recreational hackers, and criminal
4. Types of e-attacks:
Penetration Attack Type -involves breaking into a system using known security vulnerabilities to gain access to any cyberspace resource –
There is steady growth of these attacks – see the CERT Report below.
5. Denial of Service Attacks – they affect the system through diminishing the system’s ability to function; hence, they are capable of bringing a system down without destroying its resources
Motives of E-attacks
Vendetta/Revenge
Joke/Hoax/Prank
The Hacker's Ethics - This is a collection of motives that make up the hacker character
Terrorism
Political and Military Espionage
Business ( Competition) Espionage
Hate (national origin, gender, and race)
Personal gain/Fame/Fun/Notoriety
Ignorance
6. Topography of Attacks
One-to-One
One-to-Many
Many-to-One
Many-to-Many
Behavioral Forensics – an analysis of the motives and reasons why such attacks occur. The analysis is based on the postmortem of data (historical data).
Study the most (current) common security threats.