ISDD - Security Risks

19

Transcript of ISDD - Security Risks

Page 1: ISDD - Security Risks
Page 2: ISDD - Security Risks

Online FraudThe use of the Internet to illegally obtain money from someone by deception

Examples:Goods not delivered after payment has been madePurchases made with stolen credit cardsLoan scamsMoney transfer fraudDating fraudHoliday fraudDomain name scamsInternet auction fraud

Page 3: ISDD - Security Risks

Identity TheftUsing key pieces of personal information in order to impersonate someone else's identity

True NameOpening a new credit card, bank account, mobile phone account using someone else’s identity

Account TakeoverThe imposter uses personal information to gain access to the person's existing accounts

Phishing emails are one common way of getting holdof personal details

Page 4: ISDD - Security Risks

ProtectionIn order to protect against online fraud and identity theft, people can:

Avoid giving out personal informationNever respond to emails from banks or other financial organisations asking for login detailsShred any receipts, statements or letters with financial information and name/addressInstall anti-virus software and keep it up-to-dateInstall a firewallSet browser security to the highest setting

Page 5: ISDD - Security Risks

Spyware A type of malware Can be hidden in freeware / shareware downloads or passed via

peer-to-peer file sharing Installed on a computer without the knowledge of the owner (like

a Trojan horse)

Page 6: ISDD - Security Risks

Spyware Collect’s the owner's private information

email addresses Passwords Websites visited Credit card details

Signs may be a different home page, different browser bar or pop up ads

Anti spyware software can remove spyware

Page 7: ISDD - Security Risks

Keylogging A keylogger is a type of surveillance software Records every keystroke you make to a log file Records instant messages, e-mail, passwords, credit cards,

websites visited, emails Could be used in industrial or political espionage User is unaware of keylogging Can be a type of spyware Can be a legitimate program used to monitor employee

productivity Malicious keyloggers can be removed by anti virus software

Page 8: ISDD - Security Risks

Phishing Fraudulent email or website Claim to be legitimate companies but are fake Intention is to get the individual to reveal personal information,

such as passwords and credit card numbers, online

Page 9: ISDD - Security Risks

PhishingPhishing emails and websites can be identified by:Poor grammar and spelling

Page 10: ISDD - Security Risks

PhishingPhishing emails and websites can be identified by:Poor quality graphicsPoorly designed / poorly laid out email or web siteRequesting account login or sensitive data

Page 11: ISDD - Security Risks

PhishingPhishing emails and websites can be identified by:Generic email, addressing the recipient as customer or member

Page 12: ISDD - Security Risks

PhishingPhishing emails and websites can be identified by:Actual link does not match the link text

Page 13: ISDD - Security Risks

PhishingPhishing emails and websites can be identified by:Unrelated links (e.g. other product advertisements)Incorrect informationIncorrect sender email domain

Page 14: ISDD - Security Risks

Denial of Service AttacksAn attack on a network that is designed to bring the network to its knees or to a stop by flooding it with useless traffic

Known as DoS attack

Flood services - occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop

Crash services - takes advantage of bugs in the target that subsequently crash or severely destabilize the system, so that it can’t be accessed or used.

Page 15: ISDD - Security Risks

Distributed DoS Attacks

Page 16: ISDD - Security Risks

Distributed DoS AttacksAttacker – one or more people instigating the DDoS attack

Zombie – A computer running the attack, hides the identity of the attacker. Many zombies recruited from all over world each taking a small part in attack

Victim – The recipient of the attack

Page 17: ISDD - Security Risks

Distributed DoS AttacksAttacker uses software to instigate the attack:

Client – client software installed on the attacker computer used to launch attack

Daemon – program running on the zombie computer responding to commands from the client software. Typically installed by virus, trojan horse or worm.

Page 18: ISDD - Security Risks

Purposes of DDOSFinancial – victim required to pay a ransom, or loses business through downtime

Malicious – hackers take down websites as a badge of honour

Political – attack on party or government websites

Hacktivism – hackers taking down a website to make a statement

Personal – someone who has a grudge against an organisation

Page 19: ISDD - Security Risks

Impact of DDOS