SlideShare a Scribd company logo
1 of 25
Download to read offline
INFORMATION SYSTEM
SECURITY
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Juli 2021
Chapter 4
Threat, Vulnerability,
and Attack
Threat
A potential for violation of security, which exists when there is
a circumstance, capability, action, or event that could breach
security and cause harm. That is, a threat is a possible danger
that might exploit a vulnerability.
A threat to a computing system is a set of circumstances that
has the potential to cause loss or harm.
2
Threat
Threat: an object, person, or other entity that represents a
constant danger to an asset
Management must be informed of the different threats facing
the organization
By examining each threat category, management effectively
protects information through policy, education, training, and
technology controls
3
Threat Categorization
 Deliberate Threat
 Traffic overload
 Network Failure
 Malicious Software
 Illegal use of Software
 Theft
 Infiltration
Environment
 Earthquakes
 Floods
 Lightning
 Storm
 Tornadoes
 Deterioration
Accidental
 Service Failure
 Hardware Failure
 Human Error
 Design Failure
 Misroute Message
 Transmission Error
5
Threats to Info. Security
Threat Category Examples
Acts of human error or failure Accidents, employee mistakes
Intellectual property compromise Piracy, copyright infringement
Deliberate espionage or trespass Unauthorized access, data collection
Deliberate information extortion Blackmail of info. disclosure
Deliberate sabotage or vandalism Destruction of systems or info.
Deliberate theft Illegally taking equipment or info.
Deliberate software attacks Viruses, worms, denial of service
Forces of nature Fires, floods, earthquakes
Deviations in service from providers Power and Internet provider issues
Technological hardware failures Equipment failure
Technological software failures Bugs, code problems, unknown loopholes
Technological obsolescence Antiquated or outdated technologies 6
Vulnerability
A vulnerability is a weakness in the security system
1. Physical Vulnerability
2. Natural Vulnerability
3. Hardware and Software Vulnerability
4. Media Vulnerability
5. Human vulnerability
6
Vulnerability
A vulnerability scanner software
1. NESSUS
2. BurpSuite
3. Qualys
4. Zenmap
5. Acunetix Vulnerability Scanner
6. Netsparker
7. Intruder
......... 7
Attacks
An assault on system security that derives from an intelligent threat. That
is, an intelligent act that is a deliberate attempt (especially in the sense of
a method or technique) to evade security services and violate the
security policy of a system.
A human who exploits a vulnerability penetrates an attack on the system
Attacks (1)
• Act or action that exploits vulnerability (i.e., an
identified weakness) in controlled system
• Accomplished by threat agent which damages or
steals organization’s information
Attacks (2)
• Malicious code: launching viruses, worms, Trojan horses, and active
Web scripts aiming to steal or destroy info.
• Backdoor: accessing system or network using known or
previously unknown mechanism
• Password crack: attempting to reverse calculate a password
• Brute force: trying every possible combination of options of a
password
• Dictionary: selects specific accounts to attack and uses commonly
used passwords (i.e., the dictionary) to guide guesses
Security Attacks Categories
1. Passive Attacks
2. Active Attacks
A passive attack attempts to learn or make use of information
from the system but does not affect system resources.
An active attack attempts to alter system resources or affect
their operation.
11
Passsive Attack #1
Passsive Attack #2
Passive attacks are
very difficult to
detect, because
they do not
involve any
alteration of the data
Active Attack #1
Active Attack #2
Active Attack #3
Active Attack #4
Attack Categories
 Interruption
 Interception
 Modification
 Fabrication
Attack Categories : Interruption
In an interruption, an asset of the
system becomes lost, unavailable, or
unusable. An example is malicious
destruction of a hardware device,
erasure of a program or data file, or
malfunction of an operating system
file manager so that it cannot find a
particular disk file
Attack Categories : Interception
An interception means that some unauthorized
party has gained access to an asset. The outside
party can be a person, a program, or a computing
system. Examples of this type of failure are illicit
copying of program or data files, or wiretapping to
obtain data in a network. Although a loss may be
discovered fairly quickly, a silent interceptor may
leave no traces by which the interception can be
readily detected.
Attack Categories : Modification
If an unauthorized party not only accesses but
tampers with an asset, the threat is
a modification. For example, someone might
change the values in a database, alter a
program so that it performs an additional
computation, or modify data being transmitted
electronically. It is even possible to modify
hardware. Some cases of modification can be
detected with simple measures, but other, more
subtle, changes may be almost impossible to
detect.
Attack Categories : Fabrication
Finally, an unauthorized party might create
a fabrication of counterfeit objects on a
computing system. The intruder may insert
spurious transactions to a network
communication system or add records to an
existing database. Sometimes these additions
can be detected as forgeries, but if skillfully
done, they are virtually indistinguishable from
the real thing.
22
3 “Biggest” Common Attack
3 “Biggest” Common Attack
 The primary vulnerabilities for end-user computers are virus, worm, and Trojan
Horse attacks:
 A virus is malicious software which attaches to another program to execute a
specific unwanted function on a computer.
 A worm executes arbitrary code and installs copies of itself in the memory of the
infected computer, which then infects other hosts.
 A Trojan Horse is an application written to look like something else. When a Trojan
Horse is downloaded and opened, it attacks the end-user computer from within.
Question or Comments…….
Whats Next .. ??
25

More Related Content

What's hot

InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
2.decision making
2.decision making2.decision making
2.decision making
Novel Wali
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 

What's hot (20)

Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
What is "data"?
What is "data"?What is "data"?
What is "data"?
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 14 enterprise and global management of it
Chapter 14  enterprise and global management of itChapter 14  enterprise and global management of it
Chapter 14 enterprise and global management of it
 
2.decision making
2.decision making2.decision making
2.decision making
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Organizational Behavior : Motivation
Organizational Behavior : Motivation Organizational Behavior : Motivation
Organizational Behavior : Motivation
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 

Similar to Chapter 4 vulnerability threat and attack

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 

Similar to Chapter 4 vulnerability threat and attack (20)

Computer security
Computer securityComputer security
Computer security
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Protection and security
Protection and securityProtection and security
Protection and security
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptx
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
System Security
System SecuritySystem Security
System Security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Website security
Website securityWebsite security
Website security
 
Security
Security Security
Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
 

Recently uploaded

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Chapter 4 vulnerability threat and attack

  • 1. INFORMATION SYSTEM SECURITY Jupriyadi, S.Kom. M.T. jupriyadi@teknokrat.ac.id Bandarlampung, Juli 2021 Chapter 4 Threat, Vulnerability, and Attack
  • 2. Threat A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability. A threat to a computing system is a set of circumstances that has the potential to cause loss or harm. 2
  • 3. Threat Threat: an object, person, or other entity that represents a constant danger to an asset Management must be informed of the different threats facing the organization By examining each threat category, management effectively protects information through policy, education, training, and technology controls 3
  • 4. Threat Categorization  Deliberate Threat  Traffic overload  Network Failure  Malicious Software  Illegal use of Software  Theft  Infiltration Environment  Earthquakes  Floods  Lightning  Storm  Tornadoes  Deterioration Accidental  Service Failure  Hardware Failure  Human Error  Design Failure  Misroute Message  Transmission Error
  • 5. 5 Threats to Info. Security Threat Category Examples Acts of human error or failure Accidents, employee mistakes Intellectual property compromise Piracy, copyright infringement Deliberate espionage or trespass Unauthorized access, data collection Deliberate information extortion Blackmail of info. disclosure Deliberate sabotage or vandalism Destruction of systems or info. Deliberate theft Illegally taking equipment or info. Deliberate software attacks Viruses, worms, denial of service Forces of nature Fires, floods, earthquakes Deviations in service from providers Power and Internet provider issues Technological hardware failures Equipment failure Technological software failures Bugs, code problems, unknown loopholes Technological obsolescence Antiquated or outdated technologies 6
  • 6. Vulnerability A vulnerability is a weakness in the security system 1. Physical Vulnerability 2. Natural Vulnerability 3. Hardware and Software Vulnerability 4. Media Vulnerability 5. Human vulnerability 6
  • 7. Vulnerability A vulnerability scanner software 1. NESSUS 2. BurpSuite 3. Qualys 4. Zenmap 5. Acunetix Vulnerability Scanner 6. Netsparker 7. Intruder ......... 7
  • 8. Attacks An assault on system security that derives from an intelligent threat. That is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. A human who exploits a vulnerability penetrates an attack on the system
  • 9. Attacks (1) • Act or action that exploits vulnerability (i.e., an identified weakness) in controlled system • Accomplished by threat agent which damages or steals organization’s information
  • 10. Attacks (2) • Malicious code: launching viruses, worms, Trojan horses, and active Web scripts aiming to steal or destroy info. • Backdoor: accessing system or network using known or previously unknown mechanism • Password crack: attempting to reverse calculate a password • Brute force: trying every possible combination of options of a password • Dictionary: selects specific accounts to attack and uses commonly used passwords (i.e., the dictionary) to guide guesses
  • 11. Security Attacks Categories 1. Passive Attacks 2. Active Attacks A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resources or affect their operation. 11
  • 13. Passsive Attack #2 Passive attacks are very difficult to detect, because they do not involve any alteration of the data
  • 18. Attack Categories  Interruption  Interception  Modification  Fabrication
  • 19. Attack Categories : Interruption In an interruption, an asset of the system becomes lost, unavailable, or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file, or malfunction of an operating system file manager so that it cannot find a particular disk file
  • 20. Attack Categories : Interception An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. Although a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected.
  • 21. Attack Categories : Modification If an unauthorized party not only accesses but tampers with an asset, the threat is a modification. For example, someone might change the values in a database, alter a program so that it performs an additional computation, or modify data being transmitted electronically. It is even possible to modify hardware. Some cases of modification can be detected with simple measures, but other, more subtle, changes may be almost impossible to detect.
  • 22. Attack Categories : Fabrication Finally, an unauthorized party might create a fabrication of counterfeit objects on a computing system. The intruder may insert spurious transactions to a network communication system or add records to an existing database. Sometimes these additions can be detected as forgeries, but if skillfully done, they are virtually indistinguishable from the real thing. 22
  • 24. 3 “Biggest” Common Attack  The primary vulnerabilities for end-user computers are virus, worm, and Trojan Horse attacks:  A virus is malicious software which attaches to another program to execute a specific unwanted function on a computer.  A worm executes arbitrary code and installs copies of itself in the memory of the infected computer, which then infects other hosts.  A Trojan Horse is an application written to look like something else. When a Trojan Horse is downloaded and opened, it attacks the end-user computer from within.