SlideShare a Scribd company logo
ETHICAL HACKING
INFORMATION SECURITY: ATTACKS
AND VULNERABILITIES
Introduction to information security
TERMINOLOGIES:
• Information security –
The state of being protected against the unauthorized use of information, especially
electronic data, or the measures taken to achieve this.
• Asset –
1. An asset is any item of economic value owned by an individual or corporation.
2. Assets can be real—such as routers, servers, hard drives, and laptops—or assets
can be virtual, such as formulas, databases and spreadsheets.
• Access Control-
1. Access control (AC) is the selective restriction of access to a place or resource.
2. The act of accessing may mean consuming, entering, or using.
3. Permission to access a resource is called authorization.
• CIA :
• Confidentiality-
Confidentiality addresses the secrecy and privacy of information.
• Integrity-
1. Integrity provides for the correctness of information. It allows users of
information to have confidence in its correctness.
2. Integrity must be protected in two modes: storage and transit.
• Availability-
1. Availability simply means that when a legitimate user needs the
information, it should be available.
2. Denial of service (DoS) is an attack against availability.
• Authentication-
1. The process of identifying an individual, usually based on a username and
password.
2. Authentication merely ensures that the individual is who he or she claims to
be but says nothing about the access rights of the individual.
• Authorization-
Authorization is the function of specifying access rights/privileges to resources.
• Risk-
Risk is the probability or likelihood of the occurrence or realization of a threat.
• Threat-
1. A threat sets the stage for risk and is any agent, condition, or
circumstance that could potentially cause harm, loss, or damage.
2. Threats can result in destruction, disclosure, modification, corruption of
data, or denial of service.
• Vulnerability-
1. A vulnerability is a weakness in the system design, implementation,
software, or code, or the lack of a mechanism.
2. If the organization is vulnerable to any of these threats, there is an
increased risk of successful attack.
• Attack-
An attack is an action that is done on a system to get its access and extract
sensitive data.
• Attack Surface-
1. The attack surface of a software environment is the sum of the different
points where an unauthorized user (the "attacker") can try to enter data to
or extract data from an environment.
2. Keeping the attack surface as small as possible is a basic security measure.
• Malware-
Malware is any software intentionally designed to cause damage to a
computer, server or Computer network.
• Risk Assessment-
A risk assessment is a process to identify potential security hazards and
evaluate what would happen if a hazard or unwanted event were to occur.
• Security-Functionality-Ease of Use Triangle-
1. There is an inter dependency between these three attributes.
2. When security goes up, usability and functionality come down.
3. Any organization should balance between these three qualities to arrive at a
balanced information system.
4. The relationship between the concepts of security, functionality and ease of
use.
5. The use of a triangle is because an increase or decrease in any one of the
factors will have an impact on the presence of the other two.
Functionality Easy to use
Security

More Related Content

What's hot

BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
limsh
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definition
 
Computer security
Computer securityComputer security
Computer security
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Data Security
Data SecurityData Security
Data Security
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Data security
Data securityData security
Data security
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 

Similar to Ethical hacking-Introduction to information security.

Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
dotco
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
shahadd2021
 

Similar to Ethical hacking-Introduction to information security. (20)

20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptx
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Network security Topic 2 overview continued
Network security Topic 2 overview continuedNetwork security Topic 2 overview continued
Network security Topic 2 overview continued
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 

Ethical hacking-Introduction to information security.

  • 2. INFORMATION SECURITY: ATTACKS AND VULNERABILITIES Introduction to information security
  • 3. TERMINOLOGIES: • Information security – The state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this. • Asset – 1. An asset is any item of economic value owned by an individual or corporation. 2. Assets can be real—such as routers, servers, hard drives, and laptops—or assets can be virtual, such as formulas, databases and spreadsheets. • Access Control- 1. Access control (AC) is the selective restriction of access to a place or resource. 2. The act of accessing may mean consuming, entering, or using. 3. Permission to access a resource is called authorization.
  • 4. • CIA : • Confidentiality- Confidentiality addresses the secrecy and privacy of information. • Integrity- 1. Integrity provides for the correctness of information. It allows users of information to have confidence in its correctness. 2. Integrity must be protected in two modes: storage and transit. • Availability- 1. Availability simply means that when a legitimate user needs the information, it should be available. 2. Denial of service (DoS) is an attack against availability.
  • 5. • Authentication- 1. The process of identifying an individual, usually based on a username and password. 2. Authentication merely ensures that the individual is who he or she claims to be but says nothing about the access rights of the individual. • Authorization- Authorization is the function of specifying access rights/privileges to resources. • Risk- Risk is the probability or likelihood of the occurrence or realization of a threat.
  • 6. • Threat- 1. A threat sets the stage for risk and is any agent, condition, or circumstance that could potentially cause harm, loss, or damage. 2. Threats can result in destruction, disclosure, modification, corruption of data, or denial of service. • Vulnerability- 1. A vulnerability is a weakness in the system design, implementation, software, or code, or the lack of a mechanism. 2. If the organization is vulnerable to any of these threats, there is an increased risk of successful attack. • Attack- An attack is an action that is done on a system to get its access and extract sensitive data.
  • 7. • Attack Surface- 1. The attack surface of a software environment is the sum of the different points where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment. 2. Keeping the attack surface as small as possible is a basic security measure. • Malware- Malware is any software intentionally designed to cause damage to a computer, server or Computer network. • Risk Assessment- A risk assessment is a process to identify potential security hazards and evaluate what would happen if a hazard or unwanted event were to occur.
  • 8. • Security-Functionality-Ease of Use Triangle- 1. There is an inter dependency between these three attributes. 2. When security goes up, usability and functionality come down. 3. Any organization should balance between these three qualities to arrive at a balanced information system. 4. The relationship between the concepts of security, functionality and ease of use. 5. The use of a triangle is because an increase or decrease in any one of the factors will have an impact on the presence of the other two. Functionality Easy to use Security