SlideShare a Scribd company logo
1 of 108
Download to read offline
Information Systems Security: An
Overview
Sotirios Kontogiannis1 and Apostolos Syropoulos2
1Western Macedonia
University of Applied Sciences
Grevena, Greece
skontog@ee.duth.gr
2Independent scholar
Xanthi, Greece
asyropoulos@yahoo.com
January 13, 2016
Xanthi
Introduction System Protection Malware Cyber-security Finale
Presentation Overview
1 Introduction
2 System Protection
3 Malware
4 Cyber-security
5 Finale
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Access Control and restrictions per user per role;
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Access Control and restrictions per user per role;
System policy and restrictions; and
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Access Control and restrictions per user per role;
System policy and restrictions; and
Access Control and restriction per network/machine per role.
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Physical attacks (e.g., boot computer with OS DVD);
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Physical attacks (e.g., boot computer with OS DVD);
IS attacks via modified hardware [e.g., Mifare attacks (RFID
systems), etc.] and
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Physical attacks (e.g., boot computer with OS DVD);
IS attacks via modified hardware [e.g., Mifare attacks (RFID
systems), etc.] and
IS malfunction via Hardware I/O attacks (e.g., USB device
plugged into a system).
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
The system hardware, which must be protected physically.
Maxim: Protect thy console before thy self!
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
The system hardware, which must be protected physically.
Maxim: Protect thy console before thy self!
The system’s OS and software resources. Also, users’ files
and per user OS restrictions.
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
The system hardware, which must be protected physically.
Maxim: Protect thy console before thy self!
The system’s OS and software resources. Also, users’ files
and per user OS restrictions.
The system’s local services (e.g., shared service resources).
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
System services available to end users via the Internet or
Local network.
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
System services available to end users via the Internet or
Local network.
The data that traverses through the network.
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
System services available to end users via the Internet or
Local network.
The data that traverses through the network.
The machine network information and the levels of per
machine (pc) access on network resources (provided from
other machines).
Introduction System Protection Malware Cyber-security Finale
Hackers…
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Jonathan James: US department of defence hacker-spy.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Jonathan James: US department of defence hacker-spy.
Gary Mckinnon: US Air Force, US Navy, and NASA systems
hacker.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Jonathan James: US department of defence hacker-spy.
Gary Mckinnon: US Air Force, US Navy, and NASA systems
hacker.
Kevin Mitnick: switching system (PBX) phreacker (one who
gains illegal access to the telephone system).
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
lamer A person who knows little and uses nukes to do his
work
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
lamer A person who knows little and uses nukes to do his
work
cracker Someone who uses software cracking to modify a
program.
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
lamer A person who knows little and uses nukes to do his
work
cracker Someone who uses software cracking to modify a
program.
Warez Copyrighted works distributed without fees or
royalties, and may be traded, in general violation of
copyright law.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Guru An authority on computers and computing.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Guru An authority on computers and computing.
Poser One who tries to fit in but with exaggeration; pretends
to be someone whose not.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Guru An authority on computers and computing.
Poser One who tries to fit in but with exaggeration; pretends
to be someone whose not.
Leecher In the context of to peer to peer file sharing
protocols, or networks (e.g., Bittorrent), someone who
consumes bandwidth by downloading, yet has no will to
upload or give back to a community.
Introduction System Protection Malware Cyber-security Finale
Hackers…
Introduction System Protection Malware Cyber-security Finale
Hackers…
The population pyramid of  potential 
Information System attackers
AVERAGE NON­SKILLED USER 
NOOB
KIDDIE SCRIPTER
LAMER
CRACKER
PHREAKS/WAREZ D00DZ
HACKER
GURU
>25,000
>50,000
<8,000
<3,000
<500
<150
POSER/WANNABEE
LEECHER
Population/10,000,000
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
They do not portscan or sniff or expose themselves to
danger. They have lamers for this.
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
They do not portscan or sniff or expose themselves to
danger. They have lamers for this.
They never delete systems, only deface and install rootkits or
backdoors.
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
They do not portscan or sniff or expose themselves to
danger. They have lamers for this.
They never delete systems, only deface and install rootkits or
backdoors.
Maintain low profile and utilize social engineering
techniques.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Spyware Software that aims to gather information about a
person or force a person visit specific web, view ads using
popup windows sites or metasearch engines.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Spyware Software that aims to gather information about a
person or force a person visit specific web, view ads using
popup windows sites or metasearch engines.
Trojans A type of malware that is often disguised as
legitimate software. Users are typically tricked by some form
of social engineering into loading and executing Trojans on
their systems.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Spyware Software that aims to gather information about a
person or force a person visit specific web, view ads using
popup windows sites or metasearch engines.
Trojans A type of malware that is often disguised as
legitimate software. Users are typically tricked by some form
of social engineering into loading and executing Trojans on
their systems.
Exploit A small program (source code) that uses a system’s
vulnerability in order to gain unauthorized access to IS
resources
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Local exploits Applicable when the program requires local
system user access.
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Local exploits Applicable when the program requires local
system user access.
Remote exploits Applicable when the program requires only
service connection or service user access.
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Local exploits Applicable when the program requires local
system user access.
Remote exploits Applicable when the program requires only
service connection or service user access.
Zero date When the code is published in the Internet is less
that 3 months time.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Spy Trojans Usaually a standalone program that allows a
hacker to monitor user’s activities on an infected computer.
Typically, they capture screen, keyboard, I/O operations.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Spy Trojans Usaually a standalone program that allows a
hacker to monitor user’s activities on an infected computer.
Typically, they capture screen, keyboard, I/O operations.
Trojans to hide Trojans Malicious software that hides itself,
so its activity doesn’t appear in the list of processes.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Spy Trojans Usaually a standalone program that allows a
hacker to monitor user’s activities on an infected computer.
Typically, they capture screen, keyboard, I/O operations.
Trojans to hide Trojans Malicious software that hides itself,
so its activity doesn’t appear in the list of processes.
OS kernel module Trojans A kind of Trojan horse which
combines with kernel Rootkit technologies.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
IP Address Spoofing A hijacking technique in which a
cracker masquerades as a trusted host to conceal his identity
(e.g., sending e-mail from…NASA!).
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
IP Address Spoofing A hijacking technique in which a
cracker masquerades as a trusted host to conceal his identity
(e.g., sending e-mail from…NASA!).
Synchronize Packet Flood A cracker sends many connection
requests in a rapid pace without responding. This activity
leaves the first packet in the buffer so that other legitimate
connection requests cannot be completed
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
IP Address Spoofing A hijacking technique in which a
cracker masquerades as a trusted host to conceal his identity
(e.g., sending e-mail from…NASA!).
Synchronize Packet Flood A cracker sends many connection
requests in a rapid pace without responding. This activity
leaves the first packet in the buffer so that other legitimate
connection requests cannot be completed
Sniffer A network sniffers monitors data flowing over
computer network links.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Man-in-the-middle Attacks  type of cyberattack where a
malicious actor inserts him/herself into a conversation
between two parties, impersonates both parties and gains
access to information that the two parties were trying to send
to each other.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Man-in-the-middle Attacks  type of cyberattack where a
malicious actor inserts him/herself into a conversation
between two parties, impersonates both parties and gains
access to information that the two parties were trying to send
to each other.
Remote xploits Exploits done remotely by a cracker across
the Internet or by a user’s having privileges on the system.
Example: Fred Durst’s home computer was remotely
attacked and someone made a copy of a 2003 three-minute
private video in Durst’s possession.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Man-in-the-middle Attacks  type of cyberattack where a
malicious actor inserts him/herself into a conversation
between two parties, impersonates both parties and gains
access to information that the two parties were trying to send
to each other.
Remote xploits Exploits done remotely by a cracker across
the Internet or by a user’s having privileges on the system.
Example: Fred Durst’s home computer was remotely
attacked and someone made a copy of a 2003 three-minute
private video in Durst’s possession.
Denial of Service (DoS) An attacker attempts to prevent
legitimate users from accessing information or services. By
targeting your computer and its network connection, or the
computers and network of the sites you are trying to use, an
attacker may be able to prevent you from accessing websites
or other services that rely on the affected computer.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
It is achieved by making information unintelligible.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
It is achieved by making information unintelligible.
Here is how it works:
plaintext
encryption
ciphertext
decryption
plaintext
Example: Caesar’s cipher is a type of substitution cipher in
which each letter in the plaintext is “shifted” a certain
number of places down the alphabet. For instance the word
“Lillija” is ecrypted as “Uruursj” if we shift 9 places.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
It is achieved by making information unintelligible.
Here is how it works:
plaintext
encryption
ciphertext
decryption
plaintext
Example: Caesar’s cipher is a type of substitution cipher in
which each letter in the plaintext is “shifted” a certain
number of places down the alphabet. For instance the word
“Lillija” is ecrypted as “Uruursj” if we shift 9 places.
Post-quantum cryptography.
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
http://www.securityfocus.com/
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
http://www.securityfocus.com/
Periodically use vulnerability scanner software:
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
http://www.securityfocus.com/
Periodically use vulnerability scanner software:
http://sectools.org/tag/vuln-scanners/
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Check thoroughly network services configuration.
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Check thoroughly network services configuration. Update
services and check shared service resources permissions
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Check thoroughly network services configuration. Update
services and check shared service resources permissions
Use Network Intrusion Detection System to catch threats
targeting your vulnerable systems.
Introduction System Protection Malware Cyber-security Finale
Finale!
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
the various forms of malware;
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
the various forms of malware;
advice on cyber-security.
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
the various forms of malware;
advice on cyber-security.
Thank you very much for your attension!

More Related Content

What's hot

Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010Vicky Shah
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsArun Kannoth
 

What's hot (20)

Data security
Data securityData security
Data security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Data Security
Data SecurityData Security
Data Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Network security
Network securityNetwork security
Network security
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 

Viewers also liked

INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
Information System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen KeamananInformation System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen KeamananDudy Ali
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System SecurityKiran Munir
 
Information System Security - Serangan dan Pengawasan
Information System Security - Serangan dan PengawasanInformation System Security - Serangan dan Pengawasan
Information System Security - Serangan dan PengawasanDudy Ali
 
RO impact of excessive computer use on global health state
RO impact of excessive computer use on global health stateRO impact of excessive computer use on global health state
RO impact of excessive computer use on global health stateApostolos Syropoulos
 
Information System Security - Kriptografi
Information System Security - KriptografiInformation System Security - Kriptografi
Information System Security - KriptografiDudy Ali
 
RO internet impact on child and adolescent brain
RO internet impact on child and adolescent brainRO internet impact on child and adolescent brain
RO internet impact on child and adolescent brainApostolos Syropoulos
 
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...Biswajit Bhattacharjee
 
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)Biswajit Bhattacharjee
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 

Viewers also liked (20)

INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Information System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen KeamananInformation System Security - Prinsip Manajemen Keamanan
Information System Security - Prinsip Manajemen Keamanan
 
An Overview of Social Media
An Overview of Social MediaAn Overview of Social Media
An Overview of Social Media
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Distributed Operating System_3
Distributed Operating System_3Distributed Operating System_3
Distributed Operating System_3
 
Fuzzy Topological Systems
Fuzzy Topological SystemsFuzzy Topological Systems
Fuzzy Topological Systems
 
Information System Security - Serangan dan Pengawasan
Information System Security - Serangan dan PengawasanInformation System Security - Serangan dan Pengawasan
Information System Security - Serangan dan Pengawasan
 
RO impact of excessive computer use on global health state
RO impact of excessive computer use on global health stateRO impact of excessive computer use on global health state
RO impact of excessive computer use on global health state
 
Information System Security - Kriptografi
Information System Security - KriptografiInformation System Security - Kriptografi
Information System Security - Kriptografi
 
Web Introduction
Web IntroductionWeb Introduction
Web Introduction
 
RO internet impact on child and adolescent brain
RO internet impact on child and adolescent brainRO internet impact on child and adolescent brain
RO internet impact on child and adolescent brain
 
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
 
Distributed Operating System_2
Distributed Operating System_2Distributed Operating System_2
Distributed Operating System_2
 
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
 
Distributed Operating System_4
Distributed Operating System_4Distributed Operating System_4
Distributed Operating System_4
 
OpenGL Introduction
OpenGL IntroductionOpenGL Introduction
OpenGL Introduction
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
OpenGL Basics
OpenGL BasicsOpenGL Basics
OpenGL Basics
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Intrinsic and Extrinsic Motivation
Intrinsic and Extrinsic MotivationIntrinsic and Extrinsic Motivation
Intrinsic and Extrinsic Motivation
 

Similar to Information Systems Security: An Overview

Cybersecurity : The unsung hero of the digital world (PPT)
Cybersecurity : The unsung hero of the digital world (PPT)Cybersecurity : The unsung hero of the digital world (PPT)
Cybersecurity : The unsung hero of the digital world (PPT)Azim100
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultSOCVault
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Anthony Arrott
 
Orientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptxOrientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptx230405
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 

Similar to Information Systems Security: An Overview (20)

Cybersecurity : The unsung hero of the digital world (PPT)
Cybersecurity : The unsung hero of the digital world (PPT)Cybersecurity : The unsung hero of the digital world (PPT)
Cybersecurity : The unsung hero of the digital world (PPT)
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Malware
MalwareMalware
Malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Presentation
PresentationPresentation
Presentation
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Orientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptxOrientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Malware
MalwareMalware
Malware
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Apostolos Syropoulos

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolApostolos Syropoulos
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...Apostolos Syropoulos
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectApostolos Syropoulos
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceApostolos Syropoulos
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionApostolos Syropoulos
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςApostolos Syropoulos
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνApostolos Syropoulos
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραApostolos Syropoulos
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςApostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Apostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Apostolos Syropoulos
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαApostolos Syropoulos
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxApostolos Syropoulos
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...Apostolos Syropoulos
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesApostolos Syropoulos
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetApostolos Syropoulos
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουApostolos Syropoulos
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Apostolos Syropoulos
 

More from Apostolos Syropoulos (20)

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of school
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων Ξάνθης
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο Αβδήρων
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία Άβδηρα
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της Ξάνθης
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά Ασία
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
 
How to Convert Units of Measure
How to Convert Units of MeasureHow to Convert Units of Measure
How to Convert Units of Measure
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and Adjectives
 
Learning Simple Phrases in Greek
Learning Simple Phrases in GreekLearning Simple Phrases in Greek
Learning Simple Phrases in Greek
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek Alphabet
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μου
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...
 

Recently uploaded

Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Monika Rani
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Silpa
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)AkefAfaneh2
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxSuji236384
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY1301aanya
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfSumit Kumar yadav
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Mohammad Khajehpour
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)Areesha Ahmad
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET
 

Recently uploaded (20)

Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
 

Information Systems Security: An Overview

  • 1. Information Systems Security: An Overview Sotirios Kontogiannis1 and Apostolos Syropoulos2 1Western Macedonia University of Applied Sciences Grevena, Greece skontog@ee.duth.gr 2Independent scholar Xanthi, Greece asyropoulos@yahoo.com January 13, 2016 Xanthi
  • 2. Introduction System Protection Malware Cyber-security Finale Presentation Overview 1 Introduction 2 System Protection 3 Malware 4 Cyber-security 5 Finale
  • 3. Introduction System Protection Malware Cyber-security Finale What is IS Security?
  • 4. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources:
  • 5. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources: Access Control and restrictions per user per role;
  • 6. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources: Access Control and restrictions per user per role; System policy and restrictions; and
  • 7. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources: Access Control and restrictions per user per role; System policy and restrictions; and Access Control and restriction per network/machine per role.
  • 8. Introduction System Protection Malware Cyber-security Finale What IS security does include?
  • 9. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of
  • 10. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.);
  • 11. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.);
  • 12. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.); Physical attacks (e.g., boot computer with OS DVD);
  • 13. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.); Physical attacks (e.g., boot computer with OS DVD); IS attacks via modified hardware [e.g., Mifare attacks (RFID systems), etc.] and
  • 14. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.); Physical attacks (e.g., boot computer with OS DVD); IS attacks via modified hardware [e.g., Mifare attacks (RFID systems), etc.] and IS malfunction via Hardware I/O attacks (e.g., USB device plugged into a system).
  • 15. Introduction System Protection Malware Cyber-security Finale What does System Security protects?
  • 16. Introduction System Protection Malware Cyber-security Finale What does System Security protects? The system hardware, which must be protected physically. Maxim: Protect thy console before thy self!
  • 17. Introduction System Protection Malware Cyber-security Finale What does System Security protects? The system hardware, which must be protected physically. Maxim: Protect thy console before thy self! The system’s OS and software resources. Also, users’ files and per user OS restrictions.
  • 18. Introduction System Protection Malware Cyber-security Finale What does System Security protects? The system hardware, which must be protected physically. Maxim: Protect thy console before thy self! The system’s OS and software resources. Also, users’ files and per user OS restrictions. The system’s local services (e.g., shared service resources).
  • 19. Introduction System Protection Malware Cyber-security Finale What does Network Security protects?
  • 20. Introduction System Protection Malware Cyber-security Finale What does Network Security protects? System services available to end users via the Internet or Local network.
  • 21. Introduction System Protection Malware Cyber-security Finale What does Network Security protects? System services available to end users via the Internet or Local network. The data that traverses through the network.
  • 22. Introduction System Protection Malware Cyber-security Finale What does Network Security protects? System services available to end users via the Internet or Local network. The data that traverses through the network. The machine network information and the levels of per machine (pc) access on network resources (provided from other machines).
  • 23. Introduction System Protection Malware Cyber-security Finale Hackers…
  • 24. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc.
  • 25. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems.
  • 26. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994).
  • 27. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000).
  • 28. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000).
  • 29. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000).
  • 30. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000). Jonathan James: US department of defence hacker-spy.
  • 31. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000). Jonathan James: US department of defence hacker-spy. Gary Mckinnon: US Air Force, US Navy, and NASA systems hacker.
  • 32. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000). Jonathan James: US department of defence hacker-spy. Gary Mckinnon: US Air Force, US Navy, and NASA systems hacker. Kevin Mitnick: switching system (PBX) phreacker (one who gains illegal access to the telephone system).
  • 33. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I
  • 34. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more.
  • 35. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work.
  • 36. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work. lamer A person who knows little and uses nukes to do his work
  • 37. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work. lamer A person who knows little and uses nukes to do his work cracker Someone who uses software cracking to modify a program.
  • 38. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work. lamer A person who knows little and uses nukes to do his work cracker Someone who uses software cracking to modify a program. Warez Copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law.
  • 39. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II
  • 40. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be.
  • 41. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be. Guru An authority on computers and computing.
  • 42. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be. Guru An authority on computers and computing. Poser One who tries to fit in but with exaggeration; pretends to be someone whose not.
  • 43. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be. Guru An authority on computers and computing. Poser One who tries to fit in but with exaggeration; pretends to be someone whose not. Leecher In the context of to peer to peer file sharing protocols, or networks (e.g., Bittorrent), someone who consumes bandwidth by downloading, yet has no will to upload or give back to a community.
  • 44. Introduction System Protection Malware Cyber-security Finale Hackers…
  • 45. Introduction System Protection Malware Cyber-security Finale Hackers… The population pyramid of  potential  Information System attackers AVERAGE NON­SKILLED USER  NOOB KIDDIE SCRIPTER LAMER CRACKER PHREAKS/WAREZ D00DZ HACKER GURU >25,000 >50,000 <8,000 <3,000 <500 <150 POSER/WANNABEE LEECHER Population/10,000,000
  • 46. Introduction System Protection Malware Cyber-security Finale Hacker Manners
  • 47. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html).
  • 48. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux).
  • 49. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!).
  • 50. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access.
  • 51. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP)
  • 52. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP) They do not portscan or sniff or expose themselves to danger. They have lamers for this.
  • 53. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP) They do not portscan or sniff or expose themselves to danger. They have lamers for this. They never delete systems, only deface and install rootkits or backdoors.
  • 54. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP) They do not portscan or sniff or expose themselves to danger. They have lamers for this. They never delete systems, only deface and install rootkits or backdoors. Maintain low profile and utilize social engineering techniques.
  • 55. Introduction System Protection Malware Cyber-security Finale Malware or more …ware!
  • 56. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role.
  • 57. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.”
  • 58. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.” Spyware Software that aims to gather information about a person or force a person visit specific web, view ads using popup windows sites or metasearch engines.
  • 59. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.” Spyware Software that aims to gather information about a person or force a person visit specific web, view ads using popup windows sites or metasearch engines. Trojans A type of malware that is often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
  • 60. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.” Spyware Software that aims to gather information about a person or force a person visit specific web, view ads using popup windows sites or metasearch engines. Trojans A type of malware that is often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Exploit A small program (source code) that uses a system’s vulnerability in order to gain unauthorized access to IS resources
  • 61. Introduction System Protection Malware Cyber-security Finale Types of Exploits
  • 62. Introduction System Protection Malware Cyber-security Finale Types of Exploits Local exploits Applicable when the program requires local system user access.
  • 63. Introduction System Protection Malware Cyber-security Finale Types of Exploits Local exploits Applicable when the program requires local system user access. Remote exploits Applicable when the program requires only service connection or service user access.
  • 64. Introduction System Protection Malware Cyber-security Finale Types of Exploits Local exploits Applicable when the program requires local system user access. Remote exploits Applicable when the program requires only service connection or service user access. Zero date When the code is published in the Internet is less that 3 months time.
  • 65. Introduction System Protection Malware Cyber-security Finale Types of Trojans
  • 66. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network.
  • 67. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
  • 68. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer.
  • 69. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer. Spy Trojans Usaually a standalone program that allows a hacker to monitor user’s activities on an infected computer. Typically, they capture screen, keyboard, I/O operations.
  • 70. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer. Spy Trojans Usaually a standalone program that allows a hacker to monitor user’s activities on an infected computer. Typically, they capture screen, keyboard, I/O operations. Trojans to hide Trojans Malicious software that hides itself, so its activity doesn’t appear in the list of processes.
  • 71. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer. Spy Trojans Usaually a standalone program that allows a hacker to monitor user’s activities on an infected computer. Typically, they capture screen, keyboard, I/O operations. Trojans to hide Trojans Malicious software that hides itself, so its activity doesn’t appear in the list of processes. OS kernel module Trojans A kind of Trojan horse which combines with kernel Rootkit technologies.
  • 72. Introduction System Protection Malware Cyber-security Finale Network Security Malware
  • 73. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version).
  • 74. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet.
  • 75. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet. IP Address Spoofing A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity (e.g., sending e-mail from…NASA!).
  • 76. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet. IP Address Spoofing A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity (e.g., sending e-mail from…NASA!). Synchronize Packet Flood A cracker sends many connection requests in a rapid pace without responding. This activity leaves the first packet in the buffer so that other legitimate connection requests cannot be completed
  • 77. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet. IP Address Spoofing A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity (e.g., sending e-mail from…NASA!). Synchronize Packet Flood A cracker sends many connection requests in a rapid pace without responding. This activity leaves the first packet in the buffer so that other legitimate connection requests cannot be completed Sniffer A network sniffers monitors data flowing over computer network links.
  • 78. Introduction System Protection Malware Cyber-security Finale Network Security Malware II
  • 79. Introduction System Protection Malware Cyber-security Finale Network Security Malware II Man-in-the-middle Attacks type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other.
  • 80. Introduction System Protection Malware Cyber-security Finale Network Security Malware II Man-in-the-middle Attacks type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. Remote xploits Exploits done remotely by a cracker across the Internet or by a user’s having privileges on the system. Example: Fred Durst’s home computer was remotely attacked and someone made a copy of a 2003 three-minute private video in Durst’s possession.
  • 81. Introduction System Protection Malware Cyber-security Finale Network Security Malware II Man-in-the-middle Attacks type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. Remote xploits Exploits done remotely by a cracker across the Internet or by a user’s having privileges on the system. Example: Fred Durst’s home computer was remotely attacked and someone made a copy of a 2003 three-minute private video in Durst’s possession. Denial of Service (DoS) An attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing websites or other services that rely on the affected computer.
  • 82. Introduction System Protection Malware Cyber-security Finale What is Cryptography?
  • 83. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences.
  • 84. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences. It is achieved by making information unintelligible.
  • 85. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences. It is achieved by making information unintelligible. Here is how it works: plaintext encryption ciphertext decryption plaintext Example: Caesar’s cipher is a type of substitution cipher in which each letter in the plaintext is “shifted” a certain number of places down the alphabet. For instance the word “Lillija” is ecrypted as “Uruursj” if we shift 9 places.
  • 86. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences. It is achieved by making information unintelligible. Here is how it works: plaintext encryption ciphertext decryption plaintext Example: Caesar’s cipher is a type of substitution cipher in which each letter in the plaintext is “shifted” a certain number of places down the alphabet. For instance the word “Lillija” is ecrypted as “Uruursj” if we shift 9 places. Post-quantum cryptography.
  • 87. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures
  • 88. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date.
  • 89. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software.
  • 90. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats:
  • 91. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/
  • 92. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/
  • 93. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/ http://www.securityfocus.com/
  • 94. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/ http://www.securityfocus.com/ Periodically use vulnerability scanner software:
  • 95. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/ http://www.securityfocus.com/ Periodically use vulnerability scanner software: http://sectools.org/tag/vuln-scanners/
  • 96. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures
  • 97. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic.
  • 98. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners.
  • 99. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners. Check thoroughly network services configuration.
  • 100. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners. Check thoroughly network services configuration. Update services and check shared service resources permissions
  • 101. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners. Check thoroughly network services configuration. Update services and check shared service resources permissions Use Network Intrusion Detection System to catch threats targeting your vulnerable systems.
  • 102. Introduction System Protection Malware Cyber-security Finale Finale!
  • 103. Introduction System Protection Malware Cyber-security Finale Finale! We presented
  • 104. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS;
  • 105. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means;
  • 106. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means; the various forms of malware;
  • 107. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means; the various forms of malware; advice on cyber-security.
  • 108. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means; the various forms of malware; advice on cyber-security. Thank you very much for your attension!