Security Pp Cis

754 views

Published on

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • I Got The Full File, I Just Wanna Share to You Guyszz.. It's Working You Can The Download The Full File + Instructions Here ://http://gg.gg/setupexe
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
754
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
12
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Security Pp Cis

  1. 1. Security Threats<br />
  2. 2. During the 90’s when the Internet/internet grew into what has become a major part of everyone&apos;s lives. Unfortunately it also has been vulnerable to attacks from outside/inside sources, and today Internet Security soon became a big part of IT management.<br />
  3. 3. Major Threats<br />Viruses/Worms<br />Attacking Individuals<br />Hacking<br />Denial-of-Service (DoS)<br />Type of Attacker<br />
  4. 4. Viruses & Worms<br />Viruses<br /> Are pieces of a code that attach to other programs<br />Are executed when infected programs are activated<br />It can infect other programs on your computer/machine<br />Spread to other computers via e-mail attachments, IM’s, peer-to-peer file transfer, etc.<br />
  5. 5. Worms<br />Is a stand alone program and it does not need to attach itself to other programs<br />Like a Virus it can spread via e-mail, file transfers, IM’s, etc. <br />Unlike a virus, worms will need help, they need a user to open an e-mail or attachment but this is unreliable and slow<br />Vulnerability-enabled worms don’t need human intervention, these worms look for weak spots in the programs, so they spread faster<br />
  6. 6. Payloads<br /> After they infect your computer and other machines the viruses/worms execute their payloads. <br />Hard disk can be erased<br />Install a Trojan Horse<br />Misdirect you to other sites like pornography<br />Can turn your computer into a spam generator<br />
  7. 7. Trojan Horse<br /> This is a program that can be installed on the user’s computer, and once installed it will continue to cause damage.<br />Relies on worms/viruses/hackers/unknowingly installing it<br />Trojan name as it is called, explains why it hides itself as a file in your system which may seem legitimate but is not<br />Major problem of this program is spyware<br />
  8. 8. Spyware<br />It does what it say’s, it spyies<br />Web surfing details<br />Passwords<br />Personal Identification<br />Data mining, searches for information on your computer<br />This information can be sent back to its source<br />
  9. 9. Attacks to Individuals<br />Social engineering<br />Spam<br />
  10. 10. Social Engineering<br /> This is when the attacker convinces another person to give up any personal information<br />Selling a fake or non-existing product<br />Wining a contest, that never existed<br />Service that does not exist or is never done<br />In Social sites like Facebook, MySpace, chat rooms, etc.<br />
  11. 11. Spam<br /><ul><li>Phishing, real-looking e-mail’s or real-looking websites
  12. 12. ID theft
  13. 13. Fraud
  14. 14. Web-Links or Surfing habits</li></li></ul><li>Hacking<br /> It is the unauthorized use of a computer or to exceed how much you are allowed to use and see. <br />Scanning, is when the attacker begins the attack by scanning the network<br />Nmap, hacker-tool kit to scan (sending probe packets) for open ports in the network<br />Breaking In, taking advantage of vulnerabilities.<br />
  15. 15. Nmap Scanning Program<br />
  16. 16. Once Inside<br />Downloads Hacker Tools, are a collection of programs that will automate tasks that will be done as soon as the attacker is in<br />Deleting Log Files, another tool that erases log in files so the real owner does not know that they have been compromised, what was done, and how it was done<br />Backdoor, using the toolkit the hacker will create a backdoor and even if the vulnerability has been fixed. The backdoor can be disguised.<br />
  17. 17. Once inside (continued)<br />Downloading Trojan Horses, to keep attaking even after the hacker has been long gone.<br />Manual work, even with the toolkits the hacker may chose to do other damage, whether to delete files, change names or file locations.<br />
  18. 18. Denial-of-Service (DoS)<br />Does not involve hacking into a computer<br />No Viruses or Worms<br />Main purpose of DoS, is to make the computer unavailable to its user(s)<br />Bots, are general purpose exploitation programs<br />
  19. 19.
  20. 20.
  21. 21. Traditional Attackers<br />Hackers<br />Disgruntled Employee or Ex-Employee<br />Virus Writers<br />Criminal Attackers, which are mostly motivated by money<br />Cyber-terrorist and National Governments, cyber-terror which are attacks by extremist, & cyber-war are attacks by other national governments <br />

×