280 likes | 452 Views
Security Threats. Social Engineering Software-based Threats Hardware-based Threats. A Social Engineering Attack. 1. Attacker obtains credentials from user Attacker uses credentials to mount attack. User name Password. 2. Attacker. Target. Hackers, Crackers, and Attackers. Hacker.
E N D
Security Threats • Social Engineering • Software-based Threats • Hardware-based Threats
A Social Engineering Attack 1 • Attacker obtains credentials from user • Attacker uses credentials to mount attack User name Password 2 Attacker Target
Hackers, Crackers, and Attackers Hacker Cracker Attacker
Attacker Types • Internal attacker • Hacktivist • Data thief • Script kiddie • Electronic vandal • Cyberterrorist
A Software Attack Application Operating system Protocol
An IP Spoofing Attack Real IP address: 10.10.10.25 Source IP address: 192.168.0.10 Destination IP address: 192.168.0.77 IP Packet Target 192.168.0.77
A Replay Attack 10:00 A.M. 1:00 P.M.
A DDoS Attack Drones
Types of DoS Attacks • Smurf • Buffer overflow • SYN flood
Types of Malicious Code Viruses Trojans Worms Logic Bombs
A Software Exploitation Attack Known flaw
Types of Software Exploitation Attacks • Buffer overflow • Mathematical • Weak keys
Misuse of Privilege Attacks Administrative user
A Password Attack xxxxxxxxx xPxxxxxxx xPassxxxx xPass1234 !Pass1234
Types of Password Attacks • Guessing • Stealing • Brute force • Dictionary • Birthday xxxxxxxxx xPxxxxxxx xPassxxxx xPass1234 !Pass1234
A Backdoor Attack Backdoor account
Reflective Questions 1. What type of attack do you think is most dangerous? 2. Which type of attack do you think it might be most difficult to guard against?