Anatomy of cyber attacks
Basic profile <ul><li>Reconnaissance </li><ul><li>Open sources
“Internal” and other privileged sources </li></ul><li>Attack </li><ul><li>DoS
Intrusion </li></ul></ul>
Attack purpose <ul><li>Information focus </li><ul><li>Targeted
Non-targeted </li></ul><li>DoS
Persistent access </li><ul><li>Ex. Botnet zombies </li></ul></ul>
Attack examples <ul><li>Flood ping or SYN attacks for DoS
Social engineering: IM, Targeted emails with links/attachments
Security holes, exploit known security flaw to gain access </li></ul>
Reconnaissance purpose <ul><li>Discover exploitable vulnerabilities </li><ul><li>Personnel
Software
Upcoming SlideShare
Loading in …5
×

Itet2 its anatomy

394 views

Published on

IT security lesson on cyber attacks

Published in: Technology, Health & Medicine
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
394
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Itet2 its anatomy

  1. 1. Anatomy of cyber attacks
  2. 2. Basic profile <ul><li>Reconnaissance </li><ul><li>Open sources
  3. 3. “Internal” and other privileged sources </li></ul><li>Attack </li><ul><li>DoS
  4. 4. Intrusion </li></ul></ul>
  5. 5. Attack purpose <ul><li>Information focus </li><ul><li>Targeted
  6. 6. Non-targeted </li></ul><li>DoS
  7. 7. Persistent access </li><ul><li>Ex. Botnet zombies </li></ul></ul>
  8. 8. Attack examples <ul><li>Flood ping or SYN attacks for DoS
  9. 9. Social engineering: IM, Targeted emails with links/attachments
  10. 10. Security holes, exploit known security flaw to gain access </li></ul>
  11. 11. Reconnaissance purpose <ul><li>Discover exploitable vulnerabilities </li><ul><li>Personnel
  12. 12. Software
  13. 13. Physical access </li></ul><li>Not to get noticed </li><ul><li>Limits possibilities </li></ul><li>Legal vs. illegal reconnaisance </li></ul>
  14. 14. Reconnaissance examples <ul><li>Physical: Dumpster diving, personnel, building layout
  15. 15. Virtual: Network layout, IP addresses, user names & passwords, software, versions
  16. 16. The more, the merrier. </li></ul>
  17. 17. Botnet recruitment <ul><li>Read this </li></ul>
  18. 18. Homebanking and credit cards <ul><li>See this </li></ul>
  19. 19. Industrial espionage <ul><li>Read this </li></ul>
  20. 20. Virginia medical records <ul><li>Read this </li></ul>
  21. 21. RSA <ul><li>Go here </li></ul>
  22. 22. Groupwork <ul><li>Form groups
  23. 23. Look into either </li><ul><li>Aurora
  24. 24. GhostNet
  25. 25. Night Dragon </li></ul><li>Presentations next time </li></ul>

×