SlideShare a Scribd company logo
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Lesson 3
Malicious Attacks, Threats, and
Vulnerabilities
Fundamentals of Information
Systems Security
Lesson 3
Malicious Attacks, Threats, and
Vulnerabilities
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Learning Objective(s)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 3
 Describe how malicious attacks, threats,
and vulnerabilities impact an IT
infrastructure.
Key Concepts
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 4
Malicious software and countermeasures
Common attacks and countermeasures
Social engineering and how to reduce risks
Threats and types of attacks on wireless
networks
Threats and types of attacks on web
applications
Malicious Activity on the Rise
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 5
 Examples of the malicious attacks are
everywhere
 Data breaches occur in both public and private
sectors
 In 2013, China was top country of origin for
cyberattacks, at 41 percent
 United States was second at 10 percent
What Are You Trying to Protect?
Customer data
IT and network infrastructure
Intellectual property
Finances and financial data
Service availability and productivity
Reputation
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 6
What Are You Trying to Protect?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 7
 Customer data— Name, address, phone, Social Security
number (SSN), date of birth, cardholder data, protected
health care information.
 IT assets and network infrastructure— Hardware,
software, and services.
 Intellectual property—Sensitive data such as patents,
source code, formulas, or engineering plans.
What Are You Trying to Protect?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 8
 Finances and financial data—Bank accounts, credit card
data, and financial transaction data.
 Service availability and productivity—The ability of
computing services and software to support productivity
for humans and machinery.
 Reputation—Corporate compliance and brand image.
 Let’s look at each of these types of assets individually and
discuss how they are at risk from malicious attacks.
Whom Are You Trying to Catch?
Hackers
Black-hat
White-hat
Gray-hat
Crackers
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 9
Whom Are You Trying to Catch?
• Black-hat hacker: Tries to break IT security and gain access to
systems with no authorization in order to prove technical prowess.
• Black-hat hackers generally develop and use special software tools to
exploit vulnerabilities.
• May exploit holes in systems but generally do not attempt to disclose
vulnerabilities they find to the administrators of those systems.
• White-hat hacker: Also called an ethical hacker, is an information
systems security professional who has authorization to identify
vulnerabilities and perform penetration testing.
• Difference between white-hat hackers and black-hat hackers is that
white-hat hackers will identify weaknesses for the purpose of fixing
them, and black-hat hackers find weaknesses just for the fun of it or to
exploit them.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 10
Whom Are You Trying to Catch?
• Gray-hat hackers: is a hacker with average abilities who may one
day become a black-hat hacker but could also opt to become a white-
hat hacker.
• A hacker who will identify but not exploit discovered vulnerabilities, yet
may still expect a reward for not disclosing the vulnerability openly.
• Cracker: Has a hostile intent, possesses sophisticated skills, and may
be interested in financial gain. Crackers represent the greatest threat to
networks and information resources.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 11
Attack Tools
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 12
Protocol analyzers (sniffers)
 Port scanners
 OS fingerprint scanners
 Vulnerability scanners
 Password crackers
 Keystroke loggers
Attack Tools
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 13
 Vulnerability scanners
 Software program that is used to identify and, when possible,
verify vulnerabilities on an IP host device.
 Common Vulnerabilities & Exposure (CVE).
 Password crackers
 The purpose is to uncover a forgotten or unknown password.
 Use brute-force password attack to gain unauthorized access
to a system or recovery of passwords.
 Keystroke loggers
 Type of surveillance software or hardware that can record to a log
file every keystroke a user makes with a keyboard.
Attack Tools
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 14
Protocol Analyzers (Sniffers):
 Software program that enables a computer to monitor and capture
network traffic, whether on a LAN or a wireless network.
 Port Scanners
 A tool used to scan IP host devices for open ports that have been
enabled.
 OS Fingerprint Scanners
 A software program that allows an attacker to send a variety of
packets to an IP host device, hoping to determine the target
device’s operating system (OS) from the responses.
What Is a Security Breach?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 15
Any event that results in a violation of any
of the C-I-A security tenets.
Some security breaches disrupt system
services on purpose.
Some are accidental and may result from
hardware or software failures.
Activities that Cause Security
Breaches
Denial of service (DoS) attacks
Distributed denial of service (DDoS) attacks
Unacceptable web-browsing behavior
Wiretapping
Use of a backdoor to access resources
Accidental data modifications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 16
Denial of Service Attack (DoS
Attack)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 17
 A coordinated attempt to deny service by occupying a
computer to perform large amounts of unnecessary tasks
• Logic attacks
• Flooding attacks
 Protect using
• Intrusion prevention system (IPS)
• Intrusion detection system (IDS)
 Attacks launched using
• SYN flood
• Smurfing
Denial of Service Attack (DoS Attack)
 Smurf Attack
A network attack in which forged Internet Control Message Protocol
(ICMP) echo request packets are sent to IP broadcast addresses
from remote locations to generate DoS attacks.
 Smurfing
A DoS attack that uses a directed broadcast to create a flood of
network traffic for the victim computer.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 18
DoS Attack Protection
 Intrusion detection system (IDS):
 An IDS security appliance examines IP data streams for common attack
and malicious intent patterns.
 IDSs are passive, going only so far as to trigger an alarm, but they will
not actively block traffic.
Intrusion prevention system (IPS)
 An IPS does the same thing as an IDS but can block IP data streams
identified as malicious.
 IPSs can end the actual communication session, filter by source IP
addresses, and block access to the targeted host.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 19
Distributed Denial of Service Attack(DDoS Attack)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 20
Overloads computers and prevents legitimate users from
gaining access.
More difficult to stop than a DoS attack because DDoS
originates from different sources.
Unacceptable Web Browsing
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 21
Define acceptable web browsing in an
acceptable use policy (AUP).
Unacceptable use can include:
• Unauthorized users searching files or storage
directories.
• Users visiting prohibited websites.
Wiretapping
Active
• Between-the-lines
wiretapping
• Piggyback-entry
wiretapping
Passive
• Also called sniffing
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 22
Wiretapping
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 23
 Between-the-lines wiretapping: This type of
wiretapping does not alter the messages sent by the
legitimate user but inserts additional messages into the
communication line when the legitimate user pauses.
 Piggyback-entry wiretapping: This type of
wiretapping intercepts and modifies the original
message by breaking the communications line and
routing the message to another computer that acts as a
host.
Backdoors
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 24
Hidden access included by developers.
Attackers can use them to gain access.
Data Modifications
Data that is:
Purposely or accidentally modified
Incomplete
Truncated
Additional Security Challenges
Spam
and spim
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 25
Hoaxes
Cookies
Additional Security Challenges
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 26
 Spam is unwanted email.
 Spim consists of instant messages or IM chats.
• Most spam and spim are commercial advertising—often for
get-rich-quick schemes, dubious products, or other
services.
• Sending spam costs very little because the recipient covers
most of the costs associated with spam.
• It costs money for ISPs and online services to transmit
spam.
• Processing large volumes of unwanted messages is
expensive.
Additional Security Challenges
 Hoaxes
• Hoax an act intended to deceive or trick the receiver.
• In this context, hoaxes normally travel in email messages.
• Often, these messages contain warnings about devastating
new viruses.
 Cookies
• To help a web server track a user’s history, web browsers
allow the web server to store a cookie on the user’s hard
drive.
• A cookie is simply a text file that contains details gleaned
from past visits to a website.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 27
Risks, Threats, Vulnerabilities
•Probability that something bad is going to
happen to an asset.
Risk
•Any action that can damage or compromise
an asset.
Threat
•An inherent weakness that may enable threats
to harm system or networks.
Vulnerability
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 28
Risks, Threats, Vulnerabilities
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 29
 Threats exploit vulnerabilities, which creates risk.
 You cannot eliminate risk.
 You can minimize the impact of threats.
 You can reduce the number of vulnerabilities.
 Minimizing threats and reducing vulnerabilities
lessens overall risk.
 Threats, risks, and vulnerabilities negatively
impact the CIA triad.
Most Common Threats
Malicious software
Hardware or software failure
Internal attacker
Equipment theft
External attacker
Natural disaster
Industrial espionage
Terrorism
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 30
Threat Types
• Sabotage
• Espionage
Disclosure
threats
• Unauthorized changes
Alteration
threats
• DoS attack
Denial or
destruction
threats
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 31
What Is a Malicious Attack?
 Four
categories of
attacks
Fabrications
Interceptions
Interruptions
Modifications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 32
What Is a Malicious Attack?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 33
• Fabrications: Fabrications involve the creation of some
deception in order to trick unsuspecting users.
• Interceptions: An interception involves eavesdropping on
transmissions and redirecting them for unauthorized use.
• Interruptions: An interruption causes a break in a
communication channel, which blocks the transmission of
data.
• Modifications: A modification is the alteration of data
contained in transmissions or files.
Types of Active Threats
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 34
Birthday attacks
 Brute-force password
attacks
 Dictionary password
attacks
 IP address spoofing
 Hijacking
 Replay attacks
 Man-in-the-middle
attacks
 Masquerading
 Social engineering
 Phishing
 Phreaking
 Pharming
What Is Malicious Software?
(Malware)
Software that:
Causes damage
Escalates security privileges
Divulges (disclose) private data
Modifies or deletes data
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 35
Virus
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 36
 Attaches itself to or copies itself into another program
on a computer.
 Tricks the computer into following instructions not
intended by the original program developer.
 Infects a host program and may cause that host
program to replicate itself to other computers.
Worm
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 37
A self-contained program that replicates
and sends copies of itself to other
computers without user input or action.
Does not need a host program to infect.
Is a standalone program.
Trojan Horse
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 38
Malware that masquerades as a useful
program.
Trojans can:
• Hide programs that collect sensitive
information.
• Open backdoors into computers.
• Actively upload and download files.
Rootkit
Modifies or replaces one or more existing programs to
hide traces of attacks
Many different types of rootkits
Conceals its existence once installed
Is difficult to detect and remove
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 39
Spyware
Type of malware that specifically threatens the
confidentiality of information
• Monitors keystrokes
• Scans files on the hard drive
• Snoops other applications
• Installs other spyware programs
• Reads cookies
• Changes default homepage on the web browser
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 40
What Are Common Types of
Attacks?
Attacks
on
availability
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 41
Attacks
on people
Attacks
on IT
assets
What Are Common Types of
Attacks?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 42
 Attacks on availability: These attacks impact access or
uptime to a critical system, application, or data.
 Attacks on people: These attacks involve using coercion
or deception to get another human to divulge information
or to perform an action (e.g., clicking on a suspicious URL
link or opening an email attachment from an unknown
email address).
 Attacks on IT assets: These attacks include penetration
testing, unauthorized access, privileged escalation, stolen
passwords, deletion of data, or performing a data breach.
Social Engineering Attacks
Authority
Dumpster diving
Hoax
Impersonation
Shoulder surfing
Vishing
Whaling
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 43
Wireless Network Attacks
Bluejacking
Evil twin
IV attack
Packing sniffing
Replay attacks
War chalking
War driving
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 44
Web Application Attacks
Buffer overflow
Client-side attack
Header manipulation
Lightweight Directory Access Protocol (LDAP) injection
Malicious add-ons
SQL injection
XML injection
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 45
What Is a Countermeasure?
Countermeasures
• Detect vulnerabilities
• Prevent attacks
• Respond to the effects of successful attacks
• Get help from
• Law enforcement agencies
• Forensic experts
• Security consultants
• Security incident response teams (SIRTs)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 46
Countering Malware
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 47
 Create a user education program.
 Post regular bulletins about malware problems.
 Never transfer files from an unknown or untrusted
source (unless anti-malware is installed).
 Test new programs or open suspect files on a
quarantine computer.
 Install anti-malware software, make sure it remains
current, and schedule regular malware scans.
 Use a secure logon and authentication process.
Countering Malware (cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 48
Stay abreast of developments in malware
• National Cyber Security Alliance (NCSA)
www.staysafeonline.org
• United States Computer Emergency
Readiness Team (US-CERT)
http://us-cert.gov
Protecting Your System with
Firewalls
Firewall
Program or
dedicated
hardware
device
Inspects
network traffic
passing
through it
Denies or
permits traffic
based on a set
of rules
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 49
Summary
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page
50
 Malicious software and countermeasures
 Common attacks and countermeasures
 Social engineering and how to reduce
risks
 Threats and types of attacks on wireless
networks
 Threats and types of attacks on web
applications

More Related Content

Similar to info-sys-security3.pptx

Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Dr. Ahmed Al Zaidy
 
Funsec3e ppt ch07
Funsec3e ppt ch07Funsec3e ppt ch07
Funsec3e ppt ch07
Skillspire LLC
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
Skillspire LLC
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
Dr. Ahmed Al Zaidy
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
IRJET Journal
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
SBWebinars
 
Funsec3e ppt ch06
Funsec3e ppt ch06Funsec3e ppt ch06
Funsec3e ppt ch06
Skillspire LLC
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
Kevin Murphy
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
Dr. Ahmed Al Zaidy
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
Digital Transformation EXPO Event Series
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
TechWell
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET Journal
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
TechWell
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
SkyBlue659156
 

Similar to info-sys-security3.pptx (20)

Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
Funsec3e ppt ch07
Funsec3e ppt ch07Funsec3e ppt ch07
Funsec3e ppt ch07
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
Funsec3e ppt ch06
Funsec3e ppt ch06Funsec3e ppt ch06
Funsec3e ppt ch06
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 

More from MhndHTaani

Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptxAssig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptx
MhndHTaani
 
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptxcomputer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptx
MhndHTaani
 
IOT technology.pptx
IOT technology.pptxIOT technology.pptx
IOT technology.pptx
MhndHTaani
 
Chapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdfChapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdf
MhndHTaani
 
EER-database.ppt
EER-database.pptEER-database.ppt
EER-database.ppt
MhndHTaani
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
MhndHTaani
 

More from MhndHTaani (6)

Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptxAssig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptx
 
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptxcomputer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptx
 
IOT technology.pptx
IOT technology.pptxIOT technology.pptx
IOT technology.pptx
 
Chapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdfChapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdf
 
EER-database.ppt
EER-database.pptEER-database.ppt
EER-database.ppt
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

info-sys-security3.pptx

  • 1. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Lesson 3 Malicious Attacks, Threats, and Vulnerabilities
  • 2. Fundamentals of Information Systems Security Lesson 3 Malicious Attacks, Threats, and Vulnerabilities © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 3. Learning Objective(s) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3  Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • 4. Key Concepts © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4 Malicious software and countermeasures Common attacks and countermeasures Social engineering and how to reduce risks Threats and types of attacks on wireless networks Threats and types of attacks on web applications
  • 5. Malicious Activity on the Rise © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5  Examples of the malicious attacks are everywhere  Data breaches occur in both public and private sectors  In 2013, China was top country of origin for cyberattacks, at 41 percent  United States was second at 10 percent
  • 6. What Are You Trying to Protect? Customer data IT and network infrastructure Intellectual property Finances and financial data Service availability and productivity Reputation © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6
  • 7. What Are You Trying to Protect? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7  Customer data— Name, address, phone, Social Security number (SSN), date of birth, cardholder data, protected health care information.  IT assets and network infrastructure— Hardware, software, and services.  Intellectual property—Sensitive data such as patents, source code, formulas, or engineering plans.
  • 8. What Are You Trying to Protect? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8  Finances and financial data—Bank accounts, credit card data, and financial transaction data.  Service availability and productivity—The ability of computing services and software to support productivity for humans and machinery.  Reputation—Corporate compliance and brand image.  Let’s look at each of these types of assets individually and discuss how they are at risk from malicious attacks.
  • 9. Whom Are You Trying to Catch? Hackers Black-hat White-hat Gray-hat Crackers © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
  • 10. Whom Are You Trying to Catch? • Black-hat hacker: Tries to break IT security and gain access to systems with no authorization in order to prove technical prowess. • Black-hat hackers generally develop and use special software tools to exploit vulnerabilities. • May exploit holes in systems but generally do not attempt to disclose vulnerabilities they find to the administrators of those systems. • White-hat hacker: Also called an ethical hacker, is an information systems security professional who has authorization to identify vulnerabilities and perform penetration testing. • Difference between white-hat hackers and black-hat hackers is that white-hat hackers will identify weaknesses for the purpose of fixing them, and black-hat hackers find weaknesses just for the fun of it or to exploit them. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10
  • 11. Whom Are You Trying to Catch? • Gray-hat hackers: is a hacker with average abilities who may one day become a black-hat hacker but could also opt to become a white- hat hacker. • A hacker who will identify but not exploit discovered vulnerabilities, yet may still expect a reward for not disclosing the vulnerability openly. • Cracker: Has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. Crackers represent the greatest threat to networks and information resources. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11
  • 12. Attack Tools © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12 Protocol analyzers (sniffers)  Port scanners  OS fingerprint scanners  Vulnerability scanners  Password crackers  Keystroke loggers
  • 13. Attack Tools © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13  Vulnerability scanners  Software program that is used to identify and, when possible, verify vulnerabilities on an IP host device.  Common Vulnerabilities & Exposure (CVE).  Password crackers  The purpose is to uncover a forgotten or unknown password.  Use brute-force password attack to gain unauthorized access to a system or recovery of passwords.  Keystroke loggers  Type of surveillance software or hardware that can record to a log file every keystroke a user makes with a keyboard.
  • 14. Attack Tools © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14 Protocol Analyzers (Sniffers):  Software program that enables a computer to monitor and capture network traffic, whether on a LAN or a wireless network.  Port Scanners  A tool used to scan IP host devices for open ports that have been enabled.  OS Fingerprint Scanners  A software program that allows an attacker to send a variety of packets to an IP host device, hoping to determine the target device’s operating system (OS) from the responses.
  • 15. What Is a Security Breach? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15 Any event that results in a violation of any of the C-I-A security tenets. Some security breaches disrupt system services on purpose. Some are accidental and may result from hardware or software failures.
  • 16. Activities that Cause Security Breaches Denial of service (DoS) attacks Distributed denial of service (DDoS) attacks Unacceptable web-browsing behavior Wiretapping Use of a backdoor to access resources Accidental data modifications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16
  • 17. Denial of Service Attack (DoS Attack) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17  A coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks • Logic attacks • Flooding attacks  Protect using • Intrusion prevention system (IPS) • Intrusion detection system (IDS)  Attacks launched using • SYN flood • Smurfing
  • 18. Denial of Service Attack (DoS Attack)  Smurf Attack A network attack in which forged Internet Control Message Protocol (ICMP) echo request packets are sent to IP broadcast addresses from remote locations to generate DoS attacks.  Smurfing A DoS attack that uses a directed broadcast to create a flood of network traffic for the victim computer. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18
  • 19. DoS Attack Protection  Intrusion detection system (IDS):  An IDS security appliance examines IP data streams for common attack and malicious intent patterns.  IDSs are passive, going only so far as to trigger an alarm, but they will not actively block traffic. Intrusion prevention system (IPS)  An IPS does the same thing as an IDS but can block IP data streams identified as malicious.  IPSs can end the actual communication session, filter by source IP addresses, and block access to the targeted host. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19
  • 20. Distributed Denial of Service Attack(DDoS Attack) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20 Overloads computers and prevents legitimate users from gaining access. More difficult to stop than a DoS attack because DDoS originates from different sources.
  • 21. Unacceptable Web Browsing © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21 Define acceptable web browsing in an acceptable use policy (AUP). Unacceptable use can include: • Unauthorized users searching files or storage directories. • Users visiting prohibited websites.
  • 22. Wiretapping Active • Between-the-lines wiretapping • Piggyback-entry wiretapping Passive • Also called sniffing © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22
  • 23. Wiretapping © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23  Between-the-lines wiretapping: This type of wiretapping does not alter the messages sent by the legitimate user but inserts additional messages into the communication line when the legitimate user pauses.  Piggyback-entry wiretapping: This type of wiretapping intercepts and modifies the original message by breaking the communications line and routing the message to another computer that acts as a host.
  • 24. Backdoors © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24 Hidden access included by developers. Attackers can use them to gain access. Data Modifications Data that is: Purposely or accidentally modified Incomplete Truncated
  • 25. Additional Security Challenges Spam and spim © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25 Hoaxes Cookies
  • 26. Additional Security Challenges © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26  Spam is unwanted email.  Spim consists of instant messages or IM chats. • Most spam and spim are commercial advertising—often for get-rich-quick schemes, dubious products, or other services. • Sending spam costs very little because the recipient covers most of the costs associated with spam. • It costs money for ISPs and online services to transmit spam. • Processing large volumes of unwanted messages is expensive.
  • 27. Additional Security Challenges  Hoaxes • Hoax an act intended to deceive or trick the receiver. • In this context, hoaxes normally travel in email messages. • Often, these messages contain warnings about devastating new viruses.  Cookies • To help a web server track a user’s history, web browsers allow the web server to store a cookie on the user’s hard drive. • A cookie is simply a text file that contains details gleaned from past visits to a website. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27
  • 28. Risks, Threats, Vulnerabilities •Probability that something bad is going to happen to an asset. Risk •Any action that can damage or compromise an asset. Threat •An inherent weakness that may enable threats to harm system or networks. Vulnerability © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28
  • 29. Risks, Threats, Vulnerabilities © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29  Threats exploit vulnerabilities, which creates risk.  You cannot eliminate risk.  You can minimize the impact of threats.  You can reduce the number of vulnerabilities.  Minimizing threats and reducing vulnerabilities lessens overall risk.  Threats, risks, and vulnerabilities negatively impact the CIA triad.
  • 30. Most Common Threats Malicious software Hardware or software failure Internal attacker Equipment theft External attacker Natural disaster Industrial espionage Terrorism © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 30
  • 31. Threat Types • Sabotage • Espionage Disclosure threats • Unauthorized changes Alteration threats • DoS attack Denial or destruction threats © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 31
  • 32. What Is a Malicious Attack?  Four categories of attacks Fabrications Interceptions Interruptions Modifications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 32
  • 33. What Is a Malicious Attack? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 33 • Fabrications: Fabrications involve the creation of some deception in order to trick unsuspecting users. • Interceptions: An interception involves eavesdropping on transmissions and redirecting them for unauthorized use. • Interruptions: An interruption causes a break in a communication channel, which blocks the transmission of data. • Modifications: A modification is the alteration of data contained in transmissions or files.
  • 34. Types of Active Threats © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 34 Birthday attacks  Brute-force password attacks  Dictionary password attacks  IP address spoofing  Hijacking  Replay attacks  Man-in-the-middle attacks  Masquerading  Social engineering  Phishing  Phreaking  Pharming
  • 35. What Is Malicious Software? (Malware) Software that: Causes damage Escalates security privileges Divulges (disclose) private data Modifies or deletes data © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 35
  • 36. Virus © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 36  Attaches itself to or copies itself into another program on a computer.  Tricks the computer into following instructions not intended by the original program developer.  Infects a host program and may cause that host program to replicate itself to other computers.
  • 37. Worm © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 37 A self-contained program that replicates and sends copies of itself to other computers without user input or action. Does not need a host program to infect. Is a standalone program.
  • 38. Trojan Horse © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 38 Malware that masquerades as a useful program. Trojans can: • Hide programs that collect sensitive information. • Open backdoors into computers. • Actively upload and download files.
  • 39. Rootkit Modifies or replaces one or more existing programs to hide traces of attacks Many different types of rootkits Conceals its existence once installed Is difficult to detect and remove © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 39
  • 40. Spyware Type of malware that specifically threatens the confidentiality of information • Monitors keystrokes • Scans files on the hard drive • Snoops other applications • Installs other spyware programs • Reads cookies • Changes default homepage on the web browser © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 40
  • 41. What Are Common Types of Attacks? Attacks on availability © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 41 Attacks on people Attacks on IT assets
  • 42. What Are Common Types of Attacks? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 42  Attacks on availability: These attacks impact access or uptime to a critical system, application, or data.  Attacks on people: These attacks involve using coercion or deception to get another human to divulge information or to perform an action (e.g., clicking on a suspicious URL link or opening an email attachment from an unknown email address).  Attacks on IT assets: These attacks include penetration testing, unauthorized access, privileged escalation, stolen passwords, deletion of data, or performing a data breach.
  • 43. Social Engineering Attacks Authority Dumpster diving Hoax Impersonation Shoulder surfing Vishing Whaling © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 43
  • 44. Wireless Network Attacks Bluejacking Evil twin IV attack Packing sniffing Replay attacks War chalking War driving © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 44
  • 45. Web Application Attacks Buffer overflow Client-side attack Header manipulation Lightweight Directory Access Protocol (LDAP) injection Malicious add-ons SQL injection XML injection © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 45
  • 46. What Is a Countermeasure? Countermeasures • Detect vulnerabilities • Prevent attacks • Respond to the effects of successful attacks • Get help from • Law enforcement agencies • Forensic experts • Security consultants • Security incident response teams (SIRTs) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 46
  • 47. Countering Malware © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 47  Create a user education program.  Post regular bulletins about malware problems.  Never transfer files from an unknown or untrusted source (unless anti-malware is installed).  Test new programs or open suspect files on a quarantine computer.  Install anti-malware software, make sure it remains current, and schedule regular malware scans.  Use a secure logon and authentication process.
  • 48. Countering Malware (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 48 Stay abreast of developments in malware • National Cyber Security Alliance (NCSA) www.staysafeonline.org • United States Computer Emergency Readiness Team (US-CERT) http://us-cert.gov
  • 49. Protecting Your System with Firewalls Firewall Program or dedicated hardware device Inspects network traffic passing through it Denies or permits traffic based on a set of rules © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 49
  • 50. Summary © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 50  Malicious software and countermeasures  Common attacks and countermeasures  Social engineering and how to reduce risks  Threats and types of attacks on wireless networks  Threats and types of attacks on web applications