© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Lesson 3
Malicious Attacks, Threats, and
Vulnerabilities
Fundamentals of Information
Systems Security
Lesson 3
Malicious Attacks, Threats, and
Vulnerabilities
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Learning Objective(s)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 3
 Describe how malicious attacks, threats,
and vulnerabilities impact an IT
infrastructure.
Key Concepts
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 4
Malicious software and countermeasures
Common attacks and countermeasures
Social engineering and how to reduce risks
Threats and types of attacks on wireless
networks
Threats and types of attacks on web
applications
Malicious Activity on the Rise
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 5
 Examples of the malicious attacks are
everywhere
 Data breaches occur in both public and private
sectors
 In 2013, China was top country of origin for
cyberattacks, at 41 percent
 United States was second at 10 percent
What Are You Trying to Protect?
Customer data
IT and network infrastructure
Intellectual property
Finances and financial data
Service availability and productivity
Reputation
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 6
What Are You Trying to Protect?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 7
 Customer data— Name, address, phone, Social Security
number (SSN), date of birth, cardholder data, protected
health care information.
 IT assets and network infrastructure— Hardware,
software, and services.
 Intellectual property—Sensitive data such as patents,
source code, formulas, or engineering plans.
What Are You Trying to Protect?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 8
 Finances and financial data—Bank accounts, credit card
data, and financial transaction data.
 Service availability and productivity—The ability of
computing services and software to support productivity
for humans and machinery.
 Reputation—Corporate compliance and brand image.
 Let’s look at each of these types of assets individually and
discuss how they are at risk from malicious attacks.
Whom Are You Trying to Catch?
Hackers
Black-hat
White-hat
Gray-hat
Crackers
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 9
Whom Are You Trying to Catch?
• Black-hat hacker: Tries to break IT security and gain access to
systems with no authorization in order to prove technical prowess.
• Black-hat hackers generally develop and use special software tools to
exploit vulnerabilities.
• May exploit holes in systems but generally do not attempt to disclose
vulnerabilities they find to the administrators of those systems.
• White-hat hacker: Also called an ethical hacker, is an information
systems security professional who has authorization to identify
vulnerabilities and perform penetration testing.
• Difference between white-hat hackers and black-hat hackers is that
white-hat hackers will identify weaknesses for the purpose of fixing
them, and black-hat hackers find weaknesses just for the fun of it or to
exploit them.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 10
Whom Are You Trying to Catch?
• Gray-hat hackers: is a hacker with average abilities who may one
day become a black-hat hacker but could also opt to become a white-
hat hacker.
• A hacker who will identify but not exploit discovered vulnerabilities, yet
may still expect a reward for not disclosing the vulnerability openly.
• Cracker: Has a hostile intent, possesses sophisticated skills, and may
be interested in financial gain. Crackers represent the greatest threat to
networks and information resources.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 11
Attack Tools
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 12
Protocol analyzers (sniffers)
 Port scanners
 OS fingerprint scanners
 Vulnerability scanners
 Password crackers
 Keystroke loggers
Attack Tools
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 13
 Vulnerability scanners
 Software program that is used to identify and, when possible,
verify vulnerabilities on an IP host device.
 Common Vulnerabilities & Exposure (CVE).
 Password crackers
 The purpose is to uncover a forgotten or unknown password.
 Use brute-force password attack to gain unauthorized access
to a system or recovery of passwords.
 Keystroke loggers
 Type of surveillance software or hardware that can record to a log
file every keystroke a user makes with a keyboard.
Attack Tools
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 14
Protocol Analyzers (Sniffers):
 Software program that enables a computer to monitor and capture
network traffic, whether on a LAN or a wireless network.
 Port Scanners
 A tool used to scan IP host devices for open ports that have been
enabled.
 OS Fingerprint Scanners
 A software program that allows an attacker to send a variety of
packets to an IP host device, hoping to determine the target
device’s operating system (OS) from the responses.
What Is a Security Breach?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 15
Any event that results in a violation of any
of the C-I-A security tenets.
Some security breaches disrupt system
services on purpose.
Some are accidental and may result from
hardware or software failures.
Activities that Cause Security
Breaches
Denial of service (DoS) attacks
Distributed denial of service (DDoS) attacks
Unacceptable web-browsing behavior
Wiretapping
Use of a backdoor to access resources
Accidental data modifications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 16
Denial of Service Attack (DoS
Attack)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 17
 A coordinated attempt to deny service by occupying a
computer to perform large amounts of unnecessary tasks
• Logic attacks
• Flooding attacks
 Protect using
• Intrusion prevention system (IPS)
• Intrusion detection system (IDS)
 Attacks launched using
• SYN flood
• Smurfing
Denial of Service Attack (DoS Attack)
 Smurf Attack
A network attack in which forged Internet Control Message Protocol
(ICMP) echo request packets are sent to IP broadcast addresses
from remote locations to generate DoS attacks.
 Smurfing
A DoS attack that uses a directed broadcast to create a flood of
network traffic for the victim computer.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 18
DoS Attack Protection
 Intrusion detection system (IDS):
 An IDS security appliance examines IP data streams for common attack
and malicious intent patterns.
 IDSs are passive, going only so far as to trigger an alarm, but they will
not actively block traffic.
Intrusion prevention system (IPS)
 An IPS does the same thing as an IDS but can block IP data streams
identified as malicious.
 IPSs can end the actual communication session, filter by source IP
addresses, and block access to the targeted host.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 19
Distributed Denial of Service Attack(DDoS Attack)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 20
Overloads computers and prevents legitimate users from
gaining access.
More difficult to stop than a DoS attack because DDoS
originates from different sources.
Unacceptable Web Browsing
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 21
Define acceptable web browsing in an
acceptable use policy (AUP).
Unacceptable use can include:
• Unauthorized users searching files or storage
directories.
• Users visiting prohibited websites.
Wiretapping
Active
• Between-the-lines
wiretapping
• Piggyback-entry
wiretapping
Passive
• Also called sniffing
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 22
Wiretapping
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 23
 Between-the-lines wiretapping: This type of
wiretapping does not alter the messages sent by the
legitimate user but inserts additional messages into the
communication line when the legitimate user pauses.
 Piggyback-entry wiretapping: This type of
wiretapping intercepts and modifies the original
message by breaking the communications line and
routing the message to another computer that acts as a
host.
Backdoors
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 24
Hidden access included by developers.
Attackers can use them to gain access.
Data Modifications
Data that is:
Purposely or accidentally modified
Incomplete
Truncated
Additional Security Challenges
Spam
and spim
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 25
Hoaxes
Cookies
Additional Security Challenges
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 26
 Spam is unwanted email.
 Spim consists of instant messages or IM chats.
• Most spam and spim are commercial advertising—often for
get-rich-quick schemes, dubious products, or other
services.
• Sending spam costs very little because the recipient covers
most of the costs associated with spam.
• It costs money for ISPs and online services to transmit
spam.
• Processing large volumes of unwanted messages is
expensive.
Additional Security Challenges
 Hoaxes
• Hoax an act intended to deceive or trick the receiver.
• In this context, hoaxes normally travel in email messages.
• Often, these messages contain warnings about devastating
new viruses.
 Cookies
• To help a web server track a user’s history, web browsers
allow the web server to store a cookie on the user’s hard
drive.
• A cookie is simply a text file that contains details gleaned
from past visits to a website.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 27
Risks, Threats, Vulnerabilities
•Probability that something bad is going to
happen to an asset.
Risk
•Any action that can damage or compromise
an asset.
Threat
•An inherent weakness that may enable threats
to harm system or networks.
Vulnerability
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 28
Risks, Threats, Vulnerabilities
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 29
 Threats exploit vulnerabilities, which creates risk.
 You cannot eliminate risk.
 You can minimize the impact of threats.
 You can reduce the number of vulnerabilities.
 Minimizing threats and reducing vulnerabilities
lessens overall risk.
 Threats, risks, and vulnerabilities negatively
impact the CIA triad.
Most Common Threats
Malicious software
Hardware or software failure
Internal attacker
Equipment theft
External attacker
Natural disaster
Industrial espionage
Terrorism
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 30
Threat Types
• Sabotage
• Espionage
Disclosure
threats
• Unauthorized changes
Alteration
threats
• DoS attack
Denial or
destruction
threats
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 31
What Is a Malicious Attack?
 Four
categories of
attacks
Fabrications
Interceptions
Interruptions
Modifications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 32
What Is a Malicious Attack?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 33
• Fabrications: Fabrications involve the creation of some
deception in order to trick unsuspecting users.
• Interceptions: An interception involves eavesdropping on
transmissions and redirecting them for unauthorized use.
• Interruptions: An interruption causes a break in a
communication channel, which blocks the transmission of
data.
• Modifications: A modification is the alteration of data
contained in transmissions or files.
Types of Active Threats
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 34
Birthday attacks
 Brute-force password
attacks
 Dictionary password
attacks
 IP address spoofing
 Hijacking
 Replay attacks
 Man-in-the-middle
attacks
 Masquerading
 Social engineering
 Phishing
 Phreaking
 Pharming
What Is Malicious Software?
(Malware)
Software that:
Causes damage
Escalates security privileges
Divulges (disclose) private data
Modifies or deletes data
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 35
Virus
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 36
 Attaches itself to or copies itself into another program
on a computer.
 Tricks the computer into following instructions not
intended by the original program developer.
 Infects a host program and may cause that host
program to replicate itself to other computers.
Worm
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 37
A self-contained program that replicates
and sends copies of itself to other
computers without user input or action.
Does not need a host program to infect.
Is a standalone program.
Trojan Horse
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 38
Malware that masquerades as a useful
program.
Trojans can:
• Hide programs that collect sensitive
information.
• Open backdoors into computers.
• Actively upload and download files.
Rootkit
Modifies or replaces one or more existing programs to
hide traces of attacks
Many different types of rootkits
Conceals its existence once installed
Is difficult to detect and remove
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 39
Spyware
Type of malware that specifically threatens the
confidentiality of information
• Monitors keystrokes
• Scans files on the hard drive
• Snoops other applications
• Installs other spyware programs
• Reads cookies
• Changes default homepage on the web browser
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 40
What Are Common Types of
Attacks?
Attacks
on
availability
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 41
Attacks
on people
Attacks
on IT
assets
What Are Common Types of
Attacks?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 42
 Attacks on availability: These attacks impact access or
uptime to a critical system, application, or data.
 Attacks on people: These attacks involve using coercion
or deception to get another human to divulge information
or to perform an action (e.g., clicking on a suspicious URL
link or opening an email attachment from an unknown
email address).
 Attacks on IT assets: These attacks include penetration
testing, unauthorized access, privileged escalation, stolen
passwords, deletion of data, or performing a data breach.
Social Engineering Attacks
Authority
Dumpster diving
Hoax
Impersonation
Shoulder surfing
Vishing
Whaling
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 43
Wireless Network Attacks
Bluejacking
Evil twin
IV attack
Packing sniffing
Replay attacks
War chalking
War driving
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 44
Web Application Attacks
Buffer overflow
Client-side attack
Header manipulation
Lightweight Directory Access Protocol (LDAP) injection
Malicious add-ons
SQL injection
XML injection
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 45
What Is a Countermeasure?
Countermeasures
• Detect vulnerabilities
• Prevent attacks
• Respond to the effects of successful attacks
• Get help from
• Law enforcement agencies
• Forensic experts
• Security consultants
• Security incident response teams (SIRTs)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 46
Countering Malware
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 47
 Create a user education program.
 Post regular bulletins about malware problems.
 Never transfer files from an unknown or untrusted
source (unless anti-malware is installed).
 Test new programs or open suspect files on a
quarantine computer.
 Install anti-malware software, make sure it remains
current, and schedule regular malware scans.
 Use a secure logon and authentication process.
Countering Malware (cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 48
Stay abreast of developments in malware
• National Cyber Security Alliance (NCSA)
www.staysafeonline.org
• United States Computer Emergency
Readiness Team (US-CERT)
http://us-cert.gov
Protecting Your System with
Firewalls
Firewall
Program or
dedicated
hardware
device
Inspects
network traffic
passing
through it
Denies or
permits traffic
based on a set
of rules
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 49
Summary
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page
50
 Malicious software and countermeasures
 Common attacks and countermeasures
 Social engineering and how to reduce
risks
 Threats and types of attacks on wireless
networks
 Threats and types of attacks on web
applications

info-sys-security3.pptx

  • 1.
    © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Lesson 3 Malicious Attacks, Threats, and Vulnerabilities
  • 2.
    Fundamentals of Information SystemsSecurity Lesson 3 Malicious Attacks, Threats, and Vulnerabilities © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 3.
    Learning Objective(s) © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3  Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • 4.
    Key Concepts © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4 Malicious software and countermeasures Common attacks and countermeasures Social engineering and how to reduce risks Threats and types of attacks on wireless networks Threats and types of attacks on web applications
  • 5.
    Malicious Activity onthe Rise © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5  Examples of the malicious attacks are everywhere  Data breaches occur in both public and private sectors  In 2013, China was top country of origin for cyberattacks, at 41 percent  United States was second at 10 percent
  • 6.
    What Are YouTrying to Protect? Customer data IT and network infrastructure Intellectual property Finances and financial data Service availability and productivity Reputation © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6
  • 7.
    What Are YouTrying to Protect? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7  Customer data— Name, address, phone, Social Security number (SSN), date of birth, cardholder data, protected health care information.  IT assets and network infrastructure— Hardware, software, and services.  Intellectual property—Sensitive data such as patents, source code, formulas, or engineering plans.
  • 8.
    What Are YouTrying to Protect? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8  Finances and financial data—Bank accounts, credit card data, and financial transaction data.  Service availability and productivity—The ability of computing services and software to support productivity for humans and machinery.  Reputation—Corporate compliance and brand image.  Let’s look at each of these types of assets individually and discuss how they are at risk from malicious attacks.
  • 9.
    Whom Are YouTrying to Catch? Hackers Black-hat White-hat Gray-hat Crackers © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
  • 10.
    Whom Are YouTrying to Catch? • Black-hat hacker: Tries to break IT security and gain access to systems with no authorization in order to prove technical prowess. • Black-hat hackers generally develop and use special software tools to exploit vulnerabilities. • May exploit holes in systems but generally do not attempt to disclose vulnerabilities they find to the administrators of those systems. • White-hat hacker: Also called an ethical hacker, is an information systems security professional who has authorization to identify vulnerabilities and perform penetration testing. • Difference between white-hat hackers and black-hat hackers is that white-hat hackers will identify weaknesses for the purpose of fixing them, and black-hat hackers find weaknesses just for the fun of it or to exploit them. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10
  • 11.
    Whom Are YouTrying to Catch? • Gray-hat hackers: is a hacker with average abilities who may one day become a black-hat hacker but could also opt to become a white- hat hacker. • A hacker who will identify but not exploit discovered vulnerabilities, yet may still expect a reward for not disclosing the vulnerability openly. • Cracker: Has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. Crackers represent the greatest threat to networks and information resources. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11
  • 12.
    Attack Tools © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12 Protocol analyzers (sniffers)  Port scanners  OS fingerprint scanners  Vulnerability scanners  Password crackers  Keystroke loggers
  • 13.
    Attack Tools © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13  Vulnerability scanners  Software program that is used to identify and, when possible, verify vulnerabilities on an IP host device.  Common Vulnerabilities & Exposure (CVE).  Password crackers  The purpose is to uncover a forgotten or unknown password.  Use brute-force password attack to gain unauthorized access to a system or recovery of passwords.  Keystroke loggers  Type of surveillance software or hardware that can record to a log file every keystroke a user makes with a keyboard.
  • 14.
    Attack Tools © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14 Protocol Analyzers (Sniffers):  Software program that enables a computer to monitor and capture network traffic, whether on a LAN or a wireless network.  Port Scanners  A tool used to scan IP host devices for open ports that have been enabled.  OS Fingerprint Scanners  A software program that allows an attacker to send a variety of packets to an IP host device, hoping to determine the target device’s operating system (OS) from the responses.
  • 15.
    What Is aSecurity Breach? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15 Any event that results in a violation of any of the C-I-A security tenets. Some security breaches disrupt system services on purpose. Some are accidental and may result from hardware or software failures.
  • 16.
    Activities that CauseSecurity Breaches Denial of service (DoS) attacks Distributed denial of service (DDoS) attacks Unacceptable web-browsing behavior Wiretapping Use of a backdoor to access resources Accidental data modifications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16
  • 17.
    Denial of ServiceAttack (DoS Attack) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17  A coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks • Logic attacks • Flooding attacks  Protect using • Intrusion prevention system (IPS) • Intrusion detection system (IDS)  Attacks launched using • SYN flood • Smurfing
  • 18.
    Denial of ServiceAttack (DoS Attack)  Smurf Attack A network attack in which forged Internet Control Message Protocol (ICMP) echo request packets are sent to IP broadcast addresses from remote locations to generate DoS attacks.  Smurfing A DoS attack that uses a directed broadcast to create a flood of network traffic for the victim computer. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18
  • 19.
    DoS Attack Protection Intrusion detection system (IDS):  An IDS security appliance examines IP data streams for common attack and malicious intent patterns.  IDSs are passive, going only so far as to trigger an alarm, but they will not actively block traffic. Intrusion prevention system (IPS)  An IPS does the same thing as an IDS but can block IP data streams identified as malicious.  IPSs can end the actual communication session, filter by source IP addresses, and block access to the targeted host. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19
  • 20.
    Distributed Denial ofService Attack(DDoS Attack) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20 Overloads computers and prevents legitimate users from gaining access. More difficult to stop than a DoS attack because DDoS originates from different sources.
  • 21.
    Unacceptable Web Browsing ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21 Define acceptable web browsing in an acceptable use policy (AUP). Unacceptable use can include: • Unauthorized users searching files or storage directories. • Users visiting prohibited websites.
  • 22.
    Wiretapping Active • Between-the-lines wiretapping • Piggyback-entry wiretapping Passive •Also called sniffing © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22
  • 23.
    Wiretapping © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23  Between-the-lines wiretapping: This type of wiretapping does not alter the messages sent by the legitimate user but inserts additional messages into the communication line when the legitimate user pauses.  Piggyback-entry wiretapping: This type of wiretapping intercepts and modifies the original message by breaking the communications line and routing the message to another computer that acts as a host.
  • 24.
    Backdoors © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24 Hidden access included by developers. Attackers can use them to gain access. Data Modifications Data that is: Purposely or accidentally modified Incomplete Truncated
  • 25.
    Additional Security Challenges Spam andspim © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25 Hoaxes Cookies
  • 26.
    Additional Security Challenges ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26  Spam is unwanted email.  Spim consists of instant messages or IM chats. • Most spam and spim are commercial advertising—often for get-rich-quick schemes, dubious products, or other services. • Sending spam costs very little because the recipient covers most of the costs associated with spam. • It costs money for ISPs and online services to transmit spam. • Processing large volumes of unwanted messages is expensive.
  • 27.
    Additional Security Challenges Hoaxes • Hoax an act intended to deceive or trick the receiver. • In this context, hoaxes normally travel in email messages. • Often, these messages contain warnings about devastating new viruses.  Cookies • To help a web server track a user’s history, web browsers allow the web server to store a cookie on the user’s hard drive. • A cookie is simply a text file that contains details gleaned from past visits to a website. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27
  • 28.
    Risks, Threats, Vulnerabilities •Probabilitythat something bad is going to happen to an asset. Risk •Any action that can damage or compromise an asset. Threat •An inherent weakness that may enable threats to harm system or networks. Vulnerability © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28
  • 29.
    Risks, Threats, Vulnerabilities ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29  Threats exploit vulnerabilities, which creates risk.  You cannot eliminate risk.  You can minimize the impact of threats.  You can reduce the number of vulnerabilities.  Minimizing threats and reducing vulnerabilities lessens overall risk.  Threats, risks, and vulnerabilities negatively impact the CIA triad.
  • 30.
    Most Common Threats Malicioussoftware Hardware or software failure Internal attacker Equipment theft External attacker Natural disaster Industrial espionage Terrorism © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 30
  • 31.
    Threat Types • Sabotage •Espionage Disclosure threats • Unauthorized changes Alteration threats • DoS attack Denial or destruction threats © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 31
  • 32.
    What Is aMalicious Attack?  Four categories of attacks Fabrications Interceptions Interruptions Modifications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 32
  • 33.
    What Is aMalicious Attack? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 33 • Fabrications: Fabrications involve the creation of some deception in order to trick unsuspecting users. • Interceptions: An interception involves eavesdropping on transmissions and redirecting them for unauthorized use. • Interruptions: An interruption causes a break in a communication channel, which blocks the transmission of data. • Modifications: A modification is the alteration of data contained in transmissions or files.
  • 34.
    Types of ActiveThreats © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 34 Birthday attacks  Brute-force password attacks  Dictionary password attacks  IP address spoofing  Hijacking  Replay attacks  Man-in-the-middle attacks  Masquerading  Social engineering  Phishing  Phreaking  Pharming
  • 35.
    What Is MaliciousSoftware? (Malware) Software that: Causes damage Escalates security privileges Divulges (disclose) private data Modifies or deletes data © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 35
  • 36.
    Virus © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 36  Attaches itself to or copies itself into another program on a computer.  Tricks the computer into following instructions not intended by the original program developer.  Infects a host program and may cause that host program to replicate itself to other computers.
  • 37.
    Worm © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 37 A self-contained program that replicates and sends copies of itself to other computers without user input or action. Does not need a host program to infect. Is a standalone program.
  • 38.
    Trojan Horse © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 38 Malware that masquerades as a useful program. Trojans can: • Hide programs that collect sensitive information. • Open backdoors into computers. • Actively upload and download files.
  • 39.
    Rootkit Modifies or replacesone or more existing programs to hide traces of attacks Many different types of rootkits Conceals its existence once installed Is difficult to detect and remove © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 39
  • 40.
    Spyware Type of malwarethat specifically threatens the confidentiality of information • Monitors keystrokes • Scans files on the hard drive • Snoops other applications • Installs other spyware programs • Reads cookies • Changes default homepage on the web browser © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 40
  • 41.
    What Are CommonTypes of Attacks? Attacks on availability © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 41 Attacks on people Attacks on IT assets
  • 42.
    What Are CommonTypes of Attacks? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 42  Attacks on availability: These attacks impact access or uptime to a critical system, application, or data.  Attacks on people: These attacks involve using coercion or deception to get another human to divulge information or to perform an action (e.g., clicking on a suspicious URL link or opening an email attachment from an unknown email address).  Attacks on IT assets: These attacks include penetration testing, unauthorized access, privileged escalation, stolen passwords, deletion of data, or performing a data breach.
  • 43.
    Social Engineering Attacks Authority Dumpsterdiving Hoax Impersonation Shoulder surfing Vishing Whaling © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 43
  • 44.
    Wireless Network Attacks Bluejacking Eviltwin IV attack Packing sniffing Replay attacks War chalking War driving © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 44
  • 45.
    Web Application Attacks Bufferoverflow Client-side attack Header manipulation Lightweight Directory Access Protocol (LDAP) injection Malicious add-ons SQL injection XML injection © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 45
  • 46.
    What Is aCountermeasure? Countermeasures • Detect vulnerabilities • Prevent attacks • Respond to the effects of successful attacks • Get help from • Law enforcement agencies • Forensic experts • Security consultants • Security incident response teams (SIRTs) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 46
  • 47.
    Countering Malware © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 47  Create a user education program.  Post regular bulletins about malware problems.  Never transfer files from an unknown or untrusted source (unless anti-malware is installed).  Test new programs or open suspect files on a quarantine computer.  Install anti-malware software, make sure it remains current, and schedule regular malware scans.  Use a secure logon and authentication process.
  • 48.
    Countering Malware (cont.) ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 48 Stay abreast of developments in malware • National Cyber Security Alliance (NCSA) www.staysafeonline.org • United States Computer Emergency Readiness Team (US-CERT) http://us-cert.gov
  • 49.
    Protecting Your Systemwith Firewalls Firewall Program or dedicated hardware device Inspects network traffic passing through it Denies or permits traffic based on a set of rules © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 49
  • 50.
    Summary © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 50  Malicious software and countermeasures  Common attacks and countermeasures  Social engineering and how to reduce risks  Threats and types of attacks on wireless networks  Threats and types of attacks on web applications