SlideShare a Scribd company logo
Information Security
Chapter 2
Attackers & Attacks

Information Security © 2006 Eric Vanderburg
Hacker
• “Hacker” – Someone who likes to play with
and learn new things about computers
• Hacker – someone who breaks into
computer systems
• Ethical Hacker – Hacks systems to find
and report vulnerabilities. Employed or
freelance
• Hacker code of ethics – Break into
systems but do not steal, vandalize, or
release information from a target.
Information Security © 2006 Eric Vanderburg
Cracker
•
•
•
•
•
•

Violates system security maliciously
Destroy data
Make data or services unavailable
Tamper with information
Create and deploy viruses
Coined in 1985 by ethical hackers

Information Security © 2006 Eric Vanderburg
Script Kiddie
•
•
•
•

Low skilled
Use hacking tools
Random targets
Attack to build ego or gain credibility

Information Security © 2006 Eric Vanderburg
Spy
• Hired to obtain information or sabotage
operations
• Highly skilled
• Could be employed by a government or
military organization
• Could be an organized attack

Information Security © 2006 Eric Vanderburg
Employee
• Could be accidental
• Could be acting as a result of social
engineering
• Could be malicious
– Ego building
– Revenge
– Monetary gain

• Easier because they are a trusted
individual
Information Security © 2006 Eric Vanderburg
Hacktivist
•
•
•
•
•
•

Skill level varies
Tries to bring attention to a cause
Deface sites
Steal and release confidential information
Damage operations
Hacktivist Bronc Buster disabled firewalls to
allow Chinese Internet users uncensored
Internet access.
• Hacktivists worked to slow, block, and reroute
traffic for web servers associated with the World
Trade Organization, the World Economic Forum,
and the World Bank.
Information Security © 2006 Eric Vanderburg
Cyberterrorist
•
•
•
•
•

Spreads propaganda
Damages operations
Corrupts data
Organized attack
Could target the Internet itself

Information Security © 2006 Eric Vanderburg
Types of Attackers
Attacker
Hacker
Cracker
Script Kiddie
Spy
Employee
Hacktivist
Cyberterrorist

Skill Level
High
High
Low
High
Varies
Varies
High

Motivation
Improve Security
Harm Systems
Gain Recognition
Earn Money
Varies
Promote cause
Support Ideology

Information Security © 2006 Eric Vanderburg
Attacks
• Social Engineering
• Dumpster Diving – going through trash to
find confidential information
• Phishing – Spoofing a request for
information
• Pharming – Redirect DNS queries to an
alternative site to gain information
• Buffer Overflow
• Mathematical attack – compare encrypted
data to find keys
Information Security © 2006 Eric Vanderburg
Attacks
• Password guessing – automated / brute force /
dictionary attack
– Use strong passwords
•
•
•
•
•
•

Alphanumeric
Special characters
Not words
No personal information
Different passwords for different accounts
Change regularly

• Finding weak keys to decrypt messages
– Key – encryption seed for an algorithm
– Algorithm – mathematical formula used for encryption
Information Security © 2006 Eric Vanderburg
Attacks
• Birthday attack – Randomly selected values result in
duplicate keys much sooner than if a pattern was used.
Duplicate keys are useful in cracking the encryption so
they should be avoided.
– Birthday paradox – the probability of finding someone else with
the same birthday increases much faster as you meet more
people. 23 people, 50% chance, 60 people, 99% chance.

• Man in the Middle
• Replay attack
• Hijacking / Spoofing
–
–
–
–

IP Spoofing
ARP Spoofing – change ARP table
MAC Spoofing
SSID Spoofing

Information Security © 2006 Eric Vanderburg
Attacks
• DoS (Denial of Service)
• DDoS (Distributed Denial of Service)
– Handler – distributor of hijacking software
– Zombie / Bot – hijacked computer that can be
used together with others to perform an attack

• Smurf attack – send a spoofed ping to all
computers on a network and the
responses overwhelm the spoofed server

Information Security © 2006 Eric Vanderburg
Malware
• Virus - self-replicating code segment which is be
attached to an executable. When the program is
started, the virus code may also run. If possible,
the virus will replicate by attaching a copy of
itself to another file.
– Logic Bomb - A virus with an additional payload that
runs when specific conditions are met.
– Macro Virus – A virus written with preprogrammed
steps performed by a user. These steps are
performed automatically to do some malicious act.

• Worm - self-replicating program, does not
require a host program, creates a copy and
causes it to execute; no user intervention is
required. Worms commonly utilize network
services to propagate to other computer
systems
Information Security © 2006 Eric Vanderburg
Malware
• Trojan horse - malicious code pretending to be
a legitimate application. The user believes they
are running an innocent application when the
program is actually initiating its ulterior activities.
Trojan horses do not replicate.
• Spyware - a program that secretly monitors your
actions. Could be a remote control program
used by a hacker, or it could be used to gather
data about users for advertising,
aggregation/research, or preliminary information
for an attack. Some spyware is configured to
download other programs on the computer.
Information Security © 2006 Eric Vanderburg
Protection
• Hygiene
– Antivirus
– Antispyware
– Software patches
– Backup data regularly

• Techniques
– Firewall

Information Security © 2006 Eric Vanderburg
Other access methods
• Backdoors
– Created by programmers
– Added by hackers

• Rootkit - conceal running processes, files
or system data. Helps an intruder
maintain access to a system without the
user's knowledge.
– Rooted computer – A computer with a rootkit
installed
– Many times used on a handler or illegal server
Information Security © 2006 Eric Vanderburg
Acronyms
•
•
•
•

ARP, Address Resolution Protocol
DoS, Denial of Service
DDoS, Distributed Denial of Service
MAC, Media Access Control

Information Security © 2006 Eric Vanderburg

More Related Content

What's hot

Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 

What's hot (20)

DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Internet security
Internet securityInternet security
Internet security
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Hash function
Hash function Hash function
Hash function
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Firewalls
FirewallsFirewalls
Firewalls
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 

Similar to Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg

Similar to Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg (20)

Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Hackers
HackersHackers
Hackers
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Web security
Web securityWeb security
Web security
 
Threats
ThreatsThreats
Threats
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 

More from Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg

  • 1. Information Security Chapter 2 Attackers & Attacks Information Security © 2006 Eric Vanderburg
  • 2. Hacker • “Hacker” – Someone who likes to play with and learn new things about computers • Hacker – someone who breaks into computer systems • Ethical Hacker – Hacks systems to find and report vulnerabilities. Employed or freelance • Hacker code of ethics – Break into systems but do not steal, vandalize, or release information from a target. Information Security © 2006 Eric Vanderburg
  • 3. Cracker • • • • • • Violates system security maliciously Destroy data Make data or services unavailable Tamper with information Create and deploy viruses Coined in 1985 by ethical hackers Information Security © 2006 Eric Vanderburg
  • 4. Script Kiddie • • • • Low skilled Use hacking tools Random targets Attack to build ego or gain credibility Information Security © 2006 Eric Vanderburg
  • 5. Spy • Hired to obtain information or sabotage operations • Highly skilled • Could be employed by a government or military organization • Could be an organized attack Information Security © 2006 Eric Vanderburg
  • 6. Employee • Could be accidental • Could be acting as a result of social engineering • Could be malicious – Ego building – Revenge – Monetary gain • Easier because they are a trusted individual Information Security © 2006 Eric Vanderburg
  • 7. Hacktivist • • • • • • Skill level varies Tries to bring attention to a cause Deface sites Steal and release confidential information Damage operations Hacktivist Bronc Buster disabled firewalls to allow Chinese Internet users uncensored Internet access. • Hacktivists worked to slow, block, and reroute traffic for web servers associated with the World Trade Organization, the World Economic Forum, and the World Bank. Information Security © 2006 Eric Vanderburg
  • 8. Cyberterrorist • • • • • Spreads propaganda Damages operations Corrupts data Organized attack Could target the Internet itself Information Security © 2006 Eric Vanderburg
  • 9. Types of Attackers Attacker Hacker Cracker Script Kiddie Spy Employee Hacktivist Cyberterrorist Skill Level High High Low High Varies Varies High Motivation Improve Security Harm Systems Gain Recognition Earn Money Varies Promote cause Support Ideology Information Security © 2006 Eric Vanderburg
  • 10. Attacks • Social Engineering • Dumpster Diving – going through trash to find confidential information • Phishing – Spoofing a request for information • Pharming – Redirect DNS queries to an alternative site to gain information • Buffer Overflow • Mathematical attack – compare encrypted data to find keys Information Security © 2006 Eric Vanderburg
  • 11. Attacks • Password guessing – automated / brute force / dictionary attack – Use strong passwords • • • • • • Alphanumeric Special characters Not words No personal information Different passwords for different accounts Change regularly • Finding weak keys to decrypt messages – Key – encryption seed for an algorithm – Algorithm – mathematical formula used for encryption Information Security © 2006 Eric Vanderburg
  • 12. Attacks • Birthday attack – Randomly selected values result in duplicate keys much sooner than if a pattern was used. Duplicate keys are useful in cracking the encryption so they should be avoided. – Birthday paradox – the probability of finding someone else with the same birthday increases much faster as you meet more people. 23 people, 50% chance, 60 people, 99% chance. • Man in the Middle • Replay attack • Hijacking / Spoofing – – – – IP Spoofing ARP Spoofing – change ARP table MAC Spoofing SSID Spoofing Information Security © 2006 Eric Vanderburg
  • 13. Attacks • DoS (Denial of Service) • DDoS (Distributed Denial of Service) – Handler – distributor of hijacking software – Zombie / Bot – hijacked computer that can be used together with others to perform an attack • Smurf attack – send a spoofed ping to all computers on a network and the responses overwhelm the spoofed server Information Security © 2006 Eric Vanderburg
  • 14. Malware • Virus - self-replicating code segment which is be attached to an executable. When the program is started, the virus code may also run. If possible, the virus will replicate by attaching a copy of itself to another file. – Logic Bomb - A virus with an additional payload that runs when specific conditions are met. – Macro Virus – A virus written with preprogrammed steps performed by a user. These steps are performed automatically to do some malicious act. • Worm - self-replicating program, does not require a host program, creates a copy and causes it to execute; no user intervention is required. Worms commonly utilize network services to propagate to other computer systems Information Security © 2006 Eric Vanderburg
  • 15. Malware • Trojan horse - malicious code pretending to be a legitimate application. The user believes they are running an innocent application when the program is actually initiating its ulterior activities. Trojan horses do not replicate. • Spyware - a program that secretly monitors your actions. Could be a remote control program used by a hacker, or it could be used to gather data about users for advertising, aggregation/research, or preliminary information for an attack. Some spyware is configured to download other programs on the computer. Information Security © 2006 Eric Vanderburg
  • 16. Protection • Hygiene – Antivirus – Antispyware – Software patches – Backup data regularly • Techniques – Firewall Information Security © 2006 Eric Vanderburg
  • 17. Other access methods • Backdoors – Created by programmers – Added by hackers • Rootkit - conceal running processes, files or system data. Helps an intruder maintain access to a system without the user's knowledge. – Rooted computer – A computer with a rootkit installed – Many times used on a handler or illegal server Information Security © 2006 Eric Vanderburg
  • 18. Acronyms • • • • ARP, Address Resolution Protocol DoS, Denial of Service DDoS, Distributed Denial of Service MAC, Media Access Control Information Security © 2006 Eric Vanderburg