Lec 4 - Threats and Attacks
Lec 4 - Threats and Attacks
Lec 4 - Threats and Attacks
Cybersecurity
• Virus
• Worm
• Logic bomb
• Trojan horse
• Backdoor (trapdoor)
• Mobile code
• Auto-rooter Kit (virus generator)
• Spammer and Flooder programs
• Keyloggers
• Rootkit
• Zombie, bot
Attack on Confidentiality
• Confidentiality is concealment of
information
Eavesdropping,
packet sniffing,
illegal copying
network
Attack on Integrity
network
Attack on Availability
network
Attack on Authenticity
network
Non-repudiation
network
So, is security that important?
• Every day, all over the world, computer networks and hosts are
being broken into.
Example:
This is generally a passive attack, for example, a coworker
may overhear your dinner plans because your speaker
phone is set too loud. The opportunity to overhear a
conversation is coupled with the carelessness of the parties
in the conversation. Humm! Now I know what
you are doing in your room!
Snooping
Example:
People might inspect your dumpster, recycling bins, or
even your file cabinets; they can look under your
keyboard for post-It-notes, or look for scraps of paper
tracked to your bulletin board. Computer snooping on
the other hand, involves someone searching through
your electronic files trying to find something interesting.
Interception
Example:
Change grades in a class, alter credit card
records, or something similar. Website
defacements are a common form of
modification attacks.
Denial of Service Attacks
Example:
Stuck door!
An attacker may try to bring down an e-commerce website to
prevent or deny usage by legitimate customers. DoS attacks
are common on the internet, where they have hit large
companies such as Amazon, Microsoft, and AT&T. These
attacks are often widely publicized in the media. Several
types of attacks can occur in this category.
Distributed Denial of Service Attacks
Example:
This is similar to a DoS attack.
This type of attack amplifies the
concepts of DoS attacks by using
multiple computer systems to
conduct the attack against a single
organization.
Backdoor Attacks
This can have two different meanings, the original term back
door referred to troubleshooting and developer hooks into
systems. During the development of a complicated operating
system or application, programmers add back doors or
maintenance hooks. These back doors allow them to
examine operations inside the code while the program is
running. The second type of back door refers to gaining
access to a network and inserting a program or utility that
creates an entrance for an attacker.
Example:
Viruses that gain access to your OS or software
Spoofing
Example:
Viruses that gain access to your OS or software
Man-in-the-Middle Attack
Example:
Software (or a person) intercepts data and then send the
information to the server as if nothing is wrong. The server
responds back to the software, thinking it's communicating
with the legitimate client. The attacking software continues
sending information to the server and so forth.
Replay Attacks
Example:
In a distributed environment, logon and password information
is sent over the network between the client and the
authentication system. The attacker can capture this
information and replay it later.
Password Attacks
Example:
1.Dictionary Attack
2.Brute Force Attack
3.Shoulder Surfing
4.Social Engineering
5.Hacking Software
Password Security
• Password policy
• Passphrase
Password Security
• Best practices
• Don’t use dictionary words or names in any form in passwords
• A strong password must be at least 12 characters long.
• It should not contain any of your personal information—
specifically your real name, user name, or even your company
name.
• It must be very unique from your previously used passwords.
• It should contain characters from the four primary categories,
including: uppercase letters, lowercase letters, numbers, and
special characters.
Shoulder Surfing…
48
Countermeasures