240 likes | 497 Views
Fundamentals of Information Systems Security Lesson 3 Malicious Attacks, Threats, and Vulnerabilities. Learning Objective. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. Key Concepts.
E N D
Fundamentals of Information Systems Security Lesson 3 Malicious Attacks, Threats, and Vulnerabilities
Learning Objective • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
Key Concepts • Attacks, threats, and vulnerabilities in a typical IT infrastructure • Common security countermeasures typically found in an IT infrastructure • Risk assessment approach to securing an IT infrastructure • Risk mitigation strategies to shrink the information security gap
Types of Threats • Brute-force password attacks • Dictionary password attacks • IP address spoofing • Hijacking • Replay attacks • Man-in-the-middle attacks
Types of Threats • Masquerading • Social engineering • Phishing • Phreaking • Pharming
Identify the Criminal Criminal Profile #1 • Victimizes people through unsolicited e-mail messages to get victim’s money • Does not rely on intrusive methods to commit crimes • Is motivated by financial gain
Identify the Criminal (Continued) Criminal Profile #2 • Enters systems without permission to raise awareness of security issues • Does not work for the company or its clients • Does not intend harm, just tries to be “helpful” • Is motivated by impulse
Identify the Criminal (Continued) Criminal Profile #3 • Engages in illegal black market transactions on the Internet • Traffics drugs, weapons, or banned materials • Is motivated by financial gain
Identify the Criminal (Continued) Criminal Profile #4 • Enters systems without permission to take advantage of security issues • Does not work for the company or its clients • Does not intend to help, only wants to cause harm • Is motivated by peer acceptance
Identify the Criminal (Continued) Criminal Profile #5 • Intrudes upon systems to verify and validate security issues • Works for the company or one of its clients • Does not intend harm, just tries to be “helpful”
Summary • Threats are controllable. • Risks are manageable. • Vulnerabilities are unavoidable. • All of these negatively affect the C-I-A triad. • Not all threats are intentional.
Virtual Lab • Performing a Vulnerability Assessment