Evidence-based clinical practice: overview of threats to ...
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social...
-
Upload
darren-elliott -
Category
Documents
-
view
215 -
download
1
Transcript of OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social...
![Page 1: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/1.jpg)
OV 2- 1Copyright © 2005 Element K Content LLC. All rights reserved.
Security Threats
Social Engineering Software-based Threats Hardware-based Threats
![Page 2: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/2.jpg)
OV 2- 2Copyright © 2005 Element K Content LLC. All rights reserved.
A Social Engineering Attack
Attacker
Target
User namePassword
22
11 1. Attacker obtains credentials from user
2. Attacker uses credentials to mount attack
![Page 3: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/3.jpg)
OV 2- 3Copyright © 2005 Element K Content LLC. All rights reserved.
Hackers, Crackers, and Attackers
Cracker AttackerHacker
![Page 4: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/4.jpg)
OV 2- 4Copyright © 2005 Element K Content LLC. All rights reserved.
Attacker Types
Internal attacker Hacktivist Data thief Script kiddie Electronic vandal Cyberterrorist
![Page 5: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/5.jpg)
OV 2- 5Copyright © 2005 Element K Content LLC. All rights reserved.
A Software Attack
Application Operatingsystem
Protocol
![Page 6: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/6.jpg)
OV 2- 6Copyright © 2005 Element K Content LLC. All rights reserved.
A Port Scanning Attack
Port Protocol State
21 FTP Open
53 DNS Closed
80 HTTP Open
110 POP3 Closed
119 NNTP Closed
443 HTTPS Open
![Page 7: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/7.jpg)
OV 2- 7Copyright © 2005 Element K Content LLC. All rights reserved.
An Eavesdropping Attack
![Page 8: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/8.jpg)
OV 2- 8Copyright © 2005 Element K Content LLC. All rights reserved.
An IP Spoofing Attack
IP Packet
Target192.168.0.77
Real IP address:10.10.10.25
Real IP address:10.10.10.25
Source IP address: 192.168.0.10Destination IP address: 192.168.0.77
Source IP address: 192.168.0.10Destination IP address: 192.168.0.77
![Page 9: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/9.jpg)
OV 2- 9Copyright © 2005 Element K Content LLC. All rights reserved.
A Hijacking Attack
![Page 10: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/10.jpg)
OV 2- 10Copyright © 2005 Element K Content LLC. All rights reserved.
A Replay Attack
10:00 A.M.10:00 A.M.
1:00 P.M.1:00 P.M.
![Page 11: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/11.jpg)
OV 2- 11Copyright © 2005 Element K Content LLC. All rights reserved.
A Man-in-the-Middle Attack
![Page 12: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/12.jpg)
OV 2- 12Copyright © 2005 Element K Content LLC. All rights reserved.
A DoS Attack
![Page 13: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/13.jpg)
OV 2- 13Copyright © 2005 Element K Content LLC. All rights reserved.
A DDoS Attack
DronesDrones
![Page 14: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/14.jpg)
OV 2- 14Copyright © 2005 Element K Content LLC. All rights reserved.
Types of DoS Attacks
Smurf Buffer overflow SYN flood
![Page 15: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/15.jpg)
OV 2- 15Copyright © 2005 Element K Content LLC. All rights reserved.
A Malicious Code Attack
![Page 16: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/16.jpg)
OV 2- 16Copyright © 2005 Element K Content LLC. All rights reserved.
Types of Malicious Code
Viruses Worms Trojans Logic Bombs
![Page 17: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/17.jpg)
OV 2- 17Copyright © 2005 Element K Content LLC. All rights reserved.
Default Security Attacks
![Page 18: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/18.jpg)
OV 2- 18Copyright © 2005 Element K Content LLC. All rights reserved.
A Software Exploitation Attack
Known flaw Known flaw
![Page 19: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/19.jpg)
OV 2- 19Copyright © 2005 Element K Content LLC. All rights reserved.
Types of Software Exploitation Attacks
Buffer overflow Mathematical Weak keys
![Page 20: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/20.jpg)
OV 2- 20Copyright © 2005 Element K Content LLC. All rights reserved.
Misuse of Privilege Attacks
Administrative user
![Page 21: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/21.jpg)
OV 2- 21Copyright © 2005 Element K Content LLC. All rights reserved.
A Password Attack
xxxxxxxxxxPxxxxxxxxPassxxxxxPass1234!Pass1234
![Page 22: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/22.jpg)
OV 2- 22Copyright © 2005 Element K Content LLC. All rights reserved.
Types of Password Attacks
Guessing Stealing Brute force Dictionary Birthday
xxxxxxxxxxPxxxxxxxxPassxxxxxPass1234!Pass1234
![Page 23: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/23.jpg)
OV 2- 23Copyright © 2005 Element K Content LLC. All rights reserved.
A Backdoor Attack
Backdooraccount
![Page 24: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/24.jpg)
OV 2- 24Copyright © 2005 Element K Content LLC. All rights reserved.
Hardware Attacks
![Page 25: OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats Social Engineering Software-based Threats Hardware-based Threats.](https://reader036.fdocuments.in/reader036/viewer/2022062515/56649cdb5503460f949a5f98/html5/thumbnails/25.jpg)
OV 2- 25Copyright © 2005 Element K Content LLC. All rights reserved.
Reflective Questions
1. What type of attack do you think is most dangerous?
2. Which type of attack do you think it might be most difficult to guard against?