25
OV 2- 1 ght © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats

OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats

Embed Size (px)

Citation preview

Page 1: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 1Copyright © 2005 Element K Content LLC. All rights reserved.

Security Threats

Social Engineering Software-based Threats Hardware-based Threats

Page 2: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 2Copyright © 2005 Element K Content LLC. All rights reserved.

A Social Engineering Attack

Attacker

Target

User namePassword

22

11 1. Attacker obtains credentials from user

2. Attacker uses credentials to mount attack

Page 3: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 3Copyright © 2005 Element K Content LLC. All rights reserved.

Hackers, Crackers, and Attackers

Cracker AttackerHacker

Page 4: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 4Copyright © 2005 Element K Content LLC. All rights reserved.

Attacker Types

Internal attacker Hacktivist Data thief Script kiddie Electronic vandal Cyberterrorist

Page 5: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 5Copyright © 2005 Element K Content LLC. All rights reserved.

A Software Attack

Application Operatingsystem

Protocol

Page 6: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 6Copyright © 2005 Element K Content LLC. All rights reserved.

A Port Scanning Attack

Port Protocol State

21 FTP Open

53 DNS Closed

80 HTTP Open

110 POP3 Closed

119 NNTP Closed

443 HTTPS Open

Page 7: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 7Copyright © 2005 Element K Content LLC. All rights reserved.

An Eavesdropping Attack

Page 8: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 8Copyright © 2005 Element K Content LLC. All rights reserved.

An IP Spoofing Attack

IP Packet

Target192.168.0.77

Real IP address:10.10.10.25

Real IP address:10.10.10.25

Source IP address: 192.168.0.10Destination IP address: 192.168.0.77

Source IP address: 192.168.0.10Destination IP address: 192.168.0.77

Page 9: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 9Copyright © 2005 Element K Content LLC. All rights reserved.

A Hijacking Attack

Page 10: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 10Copyright © 2005 Element K Content LLC. All rights reserved.

A Replay Attack

10:00 A.M.10:00 A.M.

1:00 P.M.1:00 P.M.

Page 11: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 11Copyright © 2005 Element K Content LLC. All rights reserved.

A Man-in-the-Middle Attack

Page 12: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 12Copyright © 2005 Element K Content LLC. All rights reserved.

A DoS Attack

Page 13: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 13Copyright © 2005 Element K Content LLC. All rights reserved.

A DDoS Attack

DronesDrones

Page 14: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 14Copyright © 2005 Element K Content LLC. All rights reserved.

Types of DoS Attacks

Smurf Buffer overflow SYN flood

Page 15: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 15Copyright © 2005 Element K Content LLC. All rights reserved.

A Malicious Code Attack

Page 16: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 16Copyright © 2005 Element K Content LLC. All rights reserved.

Types of Malicious Code

Viruses Worms Trojans Logic Bombs

Page 17: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 17Copyright © 2005 Element K Content LLC. All rights reserved.

Default Security Attacks

Page 18: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 18Copyright © 2005 Element K Content LLC. All rights reserved.

A Software Exploitation Attack

Known flaw Known flaw

Page 19: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 19Copyright © 2005 Element K Content LLC. All rights reserved.

Types of Software Exploitation Attacks

Buffer overflow Mathematical Weak keys

Page 20: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 20Copyright © 2005 Element K Content LLC. All rights reserved.

Misuse of Privilege Attacks

Administrative user

Page 21: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 21Copyright © 2005 Element K Content LLC. All rights reserved.

A Password Attack

xxxxxxxxxxPxxxxxxxxPassxxxxxPass1234!Pass1234

Page 22: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 22Copyright © 2005 Element K Content LLC. All rights reserved.

Types of Password Attacks

Guessing Stealing Brute force Dictionary Birthday

xxxxxxxxxxPxxxxxxxxPassxxxxxPass1234!Pass1234

Page 23: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 23Copyright © 2005 Element K Content LLC. All rights reserved.

A Backdoor Attack

Backdooraccount

Page 24: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 24Copyright © 2005 Element K Content LLC. All rights reserved.

Hardware Attacks

Page 25: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats

OV 2- 25Copyright © 2005 Element K Content LLC. All rights reserved.

Reflective Questions

1. What type of attack do you think is most dangerous?

2. Which type of attack do you think it might be most difficult to guard against?