SlideShare a Scribd company logo
1 of 15
Common network
threats II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Outside threats.
– Wireless network threats.
Page 4
Common network threats II.
Page 5
Because of how they are
implemented, it is often
difficult to put network
security threats into a single
category.
Many attempts to breach a network combine
different aspects of threats. For example, a man-in-
the-middle attack is often combined with some type
of spoofing that is used to help it succeed.
This means that, in most cases, security requires
more than just a single line of defense. Good
administrators recognize this and implement
multiple layers of security in order to protect their
systems.
Common network threats II.
Page 6
Common network threats II.
– DoS (Denial of Service) threats.
» Covers a very broad category of threats to networks and
systems.
• Any threat that can potentially keep users or customers from
using network resources as designed can be considered a
type of DoS threat.
– Traditional DoS attacks.
» An attempt to flood a network with enough traffic to bring it
down.
• Commonly used with a flood of malformed ICMP requests.
The host receiving the flood is so busy dealing with it that it
cannot respond to legitimate requests.
– Permanent DoS attacks.
» An attempt to permanently deny a network resource for others.
• Can be achieved by physically destroying or removing the
resource.
• Can be achieved through the use of malware that corrupts or
damages the underlying digital systems.
Page 7
Common network threats II.
– Friendly or unintentional DoS attacks.
» An unintentional DoS attack can occur when a poorly written
application consumes more network resources than are
available.
» An unintentional DoS attack can also occur when a network
interface controller (NIC) begins to fail.
• The process of the NIC going up and down consumes
network resources, which can cause a DoS.
– Distributed DoS (DDoS) attacks.
» A DoS attack in which more than a single system is involved in
sending the attack.
» A DDoS attack has a higher chance of succeeding due to the
increased number of participants.
• The machines used to send the DDoS may be voluntary
participants (a coordinated attack), or they may be part of a
botnet (malware has been installed on the machines and they
are no longer under the complete control of their owners).
» The goal of a DDoS is to create a large enough spike in traffic
that the target become unreachable. In some cases, the target
system may need to be rebooted in order to come back online.
Page 8
Common network threats II.
– Reflective DoS (also known as amplified
DoS) attacks.
» The attacker uses some method—usually some form of
spoofing—to hide the source of the attack.
• In a reflective DNS (Domain Name System) attack, the
attacker usually spoofs the intended target’s IP address and
sends multiple requests to an open DNS server. The DNS
server responds by sending traffic to the targeted system.
• A reflective NTP (Network Time Protocol) attack works in the
same way; however, instead of using DNS, it relies upon open
NTP servers.
– Smurf attacks or smurfing.
» A type of reflective DoS that also involves spoofing the
intended target’s IP address.
• A network is flooded with ICMP requests in which the source
address for the requests appears to be that of the intended
target.
• As the replies return, the network becomes slowed by the
traffic. The goal is to overwhelm the target system and bring it
down.
Page 9
Common network threats II.
Page 10
A common feature on a
modern wireless access
point (WAP) is Wi-Fi
Protected Setup (WPS).
The goal of WPS is to create an easy and secure
method for consumers and small businesses to set
up a secure wireless network.
Unfortunately, the outcome has fallen short of the
goal. While WPS does ease the setup burden, it is
also easily exploited by an attacker and should
actually be disabled on all equipment.
Common network threats II.
Page 11
Common network threats II.
– War driving/war chalking.
» The practice of attempting to sniff out unprotected or minimally
protected wireless networks.
• Once found, marks are placed on buildings and streets
indicating what networks are available and vulnerable.
» Wireless networks are vulnerable merely due to the fact that
they need to broadcast over the air.
– WEP cracking/WPA cracking.
» The use of a packet sniffer to capture the password or
preshared key on a wireless network.
• Wired Equivalent Privacy (WEP) can be cracked in minutes;
WiFi Protected Access (WPA) cracking will take hours, but it
can still be cracked.
– Rogue access point attack.
» An unauthorized wireless access point (WAP) that gets
installed on the network.
» The biggest culprits are the end users; they install their own
WAP for convenience and don’t properly secure it, opening a
vulnerability in your network.
Page 12
Common network threats II.
– Evil twin attack.
» A type of rogue access point attack.
• A WAP is installed and configured with a service set identifier
(SSID) that is very similar to the authorized version.
• As users access the twin, their keystrokes are captured in the
hopes of gaining sensitive information.
» Can also be considered a type of wireless phishing attack.
– Bluejacking.
» Sending unsolicited messages over a Bluetooth connection in
an effort to keep the target from responding to valid requests.
– Bluesnarfing.
» An attack in which the attacker creates a Bluetooth connection
with another device without that device’s permission.
• The goal is to retrieve information from the attacked device
(e.g., contact information and stored emails).
» This vulnerability has been patched and may no longer be a
concern.
Page 13
Common network threats II.
Many network security threats fall into more than one category. A very
common and broad category of threats is DoS. There are many types of
DoS threats, including traditional DoS, permanent DoS, friendly or
unintentional DoS, DDoS, reflective DoS, and Smurf attacks.
Topic
Outside threats.
Summary
WPS creates an easy method of placing security on a wireless network, but
it also creates a vulnerability in the network. Threats that face wireless
networks include war driving or chalking, WEP or WPA cracking, rogue
access points, and evil twin attacks. Bluetooth networks are also vulnerable
to Bluejacking and, possibly, Bluesnarfing.
Wireless network threats.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

What's hot (20)

PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+1.3: Cloud ConceptsPACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+1.3: Cloud Concepts
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen TestingPACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
 
PACE-IT: Network Access Control
PACE-IT: Network Access ControlPACE-IT: Network Access Control
PACE-IT: Network Access Control
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best PracticesPACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best Practices
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 

Similar to PACE-IT: Common Threats (part 2)

UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
 
1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx
1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx
1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx
aulasnilda
 

Similar to PACE-IT: Common Threats (part 2) (20)

Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 
Pace IT - Threats & Vulnerabilities Mitigation
Pace IT - Threats & Vulnerabilities MitigationPace IT - Threats & Vulnerabilities Mitigation
Pace IT - Threats & Vulnerabilities Mitigation
 
Network security
Network securityNetwork security
Network security
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
Web security
Web securityWeb security
Web security
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
Final report
Final reportFinal report
Final report
 
1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx
1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx
1Running Header ATTACKS IN CLOUD COMPUTING 4ATTACKS IN CLOU.docx
 

More from Pace IT at Edmonds Community College

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

PACE-IT: Common Threats (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Outside threats. – Wireless network threats.
  • 4. Page 4 Common network threats II.
  • 5. Page 5 Because of how they are implemented, it is often difficult to put network security threats into a single category. Many attempts to breach a network combine different aspects of threats. For example, a man-in- the-middle attack is often combined with some type of spoofing that is used to help it succeed. This means that, in most cases, security requires more than just a single line of defense. Good administrators recognize this and implement multiple layers of security in order to protect their systems. Common network threats II.
  • 6. Page 6 Common network threats II. – DoS (Denial of Service) threats. » Covers a very broad category of threats to networks and systems. • Any threat that can potentially keep users or customers from using network resources as designed can be considered a type of DoS threat. – Traditional DoS attacks. » An attempt to flood a network with enough traffic to bring it down. • Commonly used with a flood of malformed ICMP requests. The host receiving the flood is so busy dealing with it that it cannot respond to legitimate requests. – Permanent DoS attacks. » An attempt to permanently deny a network resource for others. • Can be achieved by physically destroying or removing the resource. • Can be achieved through the use of malware that corrupts or damages the underlying digital systems.
  • 7. Page 7 Common network threats II. – Friendly or unintentional DoS attacks. » An unintentional DoS attack can occur when a poorly written application consumes more network resources than are available. » An unintentional DoS attack can also occur when a network interface controller (NIC) begins to fail. • The process of the NIC going up and down consumes network resources, which can cause a DoS. – Distributed DoS (DDoS) attacks. » A DoS attack in which more than a single system is involved in sending the attack. » A DDoS attack has a higher chance of succeeding due to the increased number of participants. • The machines used to send the DDoS may be voluntary participants (a coordinated attack), or they may be part of a botnet (malware has been installed on the machines and they are no longer under the complete control of their owners). » The goal of a DDoS is to create a large enough spike in traffic that the target become unreachable. In some cases, the target system may need to be rebooted in order to come back online.
  • 8. Page 8 Common network threats II. – Reflective DoS (also known as amplified DoS) attacks. » The attacker uses some method—usually some form of spoofing—to hide the source of the attack. • In a reflective DNS (Domain Name System) attack, the attacker usually spoofs the intended target’s IP address and sends multiple requests to an open DNS server. The DNS server responds by sending traffic to the targeted system. • A reflective NTP (Network Time Protocol) attack works in the same way; however, instead of using DNS, it relies upon open NTP servers. – Smurf attacks or smurfing. » A type of reflective DoS that also involves spoofing the intended target’s IP address. • A network is flooded with ICMP requests in which the source address for the requests appears to be that of the intended target. • As the replies return, the network becomes slowed by the traffic. The goal is to overwhelm the target system and bring it down.
  • 9. Page 9 Common network threats II.
  • 10. Page 10 A common feature on a modern wireless access point (WAP) is Wi-Fi Protected Setup (WPS). The goal of WPS is to create an easy and secure method for consumers and small businesses to set up a secure wireless network. Unfortunately, the outcome has fallen short of the goal. While WPS does ease the setup burden, it is also easily exploited by an attacker and should actually be disabled on all equipment. Common network threats II.
  • 11. Page 11 Common network threats II. – War driving/war chalking. » The practice of attempting to sniff out unprotected or minimally protected wireless networks. • Once found, marks are placed on buildings and streets indicating what networks are available and vulnerable. » Wireless networks are vulnerable merely due to the fact that they need to broadcast over the air. – WEP cracking/WPA cracking. » The use of a packet sniffer to capture the password or preshared key on a wireless network. • Wired Equivalent Privacy (WEP) can be cracked in minutes; WiFi Protected Access (WPA) cracking will take hours, but it can still be cracked. – Rogue access point attack. » An unauthorized wireless access point (WAP) that gets installed on the network. » The biggest culprits are the end users; they install their own WAP for convenience and don’t properly secure it, opening a vulnerability in your network.
  • 12. Page 12 Common network threats II. – Evil twin attack. » A type of rogue access point attack. • A WAP is installed and configured with a service set identifier (SSID) that is very similar to the authorized version. • As users access the twin, their keystrokes are captured in the hopes of gaining sensitive information. » Can also be considered a type of wireless phishing attack. – Bluejacking. » Sending unsolicited messages over a Bluetooth connection in an effort to keep the target from responding to valid requests. – Bluesnarfing. » An attack in which the attacker creates a Bluetooth connection with another device without that device’s permission. • The goal is to retrieve information from the attacked device (e.g., contact information and stored emails). » This vulnerability has been patched and may no longer be a concern.
  • 13. Page 13 Common network threats II. Many network security threats fall into more than one category. A very common and broad category of threats is DoS. There are many types of DoS threats, including traditional DoS, permanent DoS, friendly or unintentional DoS, DDoS, reflective DoS, and Smurf attacks. Topic Outside threats. Summary WPS creates an easy method of placing security on a wireless network, but it also creates a vulnerability in the network. Threats that face wireless networks include war driving or chalking, WEP or WPA cracking, rogue access points, and evil twin attacks. Bluetooth networks are also vulnerable to Bluejacking and, possibly, Bluesnarfing. Wireless network threats.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.