Week 3 The Need of Security PDF
Document Details
Uploaded by PhenomenalOtter455
Tags
Summary
This document provides an overview of information security, including definitions of data, information, and information assets. It also covers different types of security threats and attacks, such as malware, social engineering, and denial-of-service attacks. The document also discusses different types of hackers and their methods. It's useful for learning about information security concepts.
Full Transcript
The Need of Security The primary mission of an information security program is to ensure that information assets remain safe and useful. data Items of fact collected by an organization. Data includes raw numbers, The Need of f...
The Need of Security The primary mission of an information security program is to ensure that information assets remain safe and useful. data Items of fact collected by an organization. Data includes raw numbers, The Need of facts, and words. Security information Data that has been organized, structured, and presented to provide additional insight into its context, worth, and usefulness. information asset The focus of information security; information that has value to the organization, and the systems that store, process, and transmit the information. data security Commonly used as a surrogate for information security, data security is the focus of protecting data or information in its various states—at rest (in storage), in processing, The Need of and in transmission (over networks). Security database security A subset of information security that focuses on the assessment and protection of information stored in data repositories like database management systems and storage media. Information security performs four important functions for an organization: Protecting the organization’s ability to function The Need of Protecting the data and information the organization collects and uses Security Enabling the safe operation of applications running on the organization’s IT systems. Safeguarding the organization’s technology asset. Threats and Attacks Threats and Attack Most common threat actors’ objectives in 2023 Threats and Attacks The 12 Categories of Threats The 12 Categories of Threats 1. Compromises to Intellectual Property intellectual property (IP) The creation, ownership, and control of original ideas as well as the representation of those ideas. IP can be trade secrets, copyrights, trademarks, and patents. IP is protected by copyright law and other laws, carries the expectation of proper attribution or credit to its source, and potentially requires the acquisition of permission for its use, as specified in those laws. The 12 Categories of Threats Software Piracy The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property. Copyright infringement It is the use or production of copyright-protected material without the permission of the copyright holder. Infringement is a term used to describe a violation, breach, or unauthorized act. Copyright Protection and User Registration have been used to enforce copyright laws. The 12 Categories of Threats 2. Deviations in Quality of Service A form of availability disruption which can affect the availability of information and systems. Internet Service Issues Communications and Other Service Provider Issues Power Irregularities The 12 Categories of Threats 3. Espionage or Trespass It is a well-known and broad category of electronic and human activities that can breach the confidentiality of information. It occurs when an unauthorized individual attempts to gain illegal access to organizational information. Hacker A person who accesses systems and information without authorization and often illegally. The 12 Categories of Threats Two General Categories of Hacker 1. Expert Hacker A hacker who uses extensive knowledge of the inner workings of computer hardware and software to gain unauthorized access to systems and information. Also known as elite hackers, expert hackers often create automated exploits, scripts, and tools used by other hackers. The 12 Categories of Threats Two General Categories of Hacker 2. Novice Hacker A relatively unskilled hacker who uses the work of expert hackers to perform attacks. Also known as a neophyte or newbie. This category of hackers includes script kiddies and packet monkeys. script kiddie A hacker of limited skill who uses expertly written software to attack a system. packet monkey A script kiddie who uses automated exploits to engage in denial-of-service attacks. The 12 Categories of Threats Hacker variants cracker A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use. phreaker A hacker who manipulates the public telephone system to make free calls or disrupt services The 12 Categories of Threats Password attack Cracking - Attempting to guess or reverse-calculate a password Alternative approaches to password cracking: 1. Brute force password attacks An attempt to guess a password by attempting every possible combination of characters and numbers in it. The 12 Categories of Threats Alternative approaches to password cracking: 2. Dictionary Password Attacks A variation of the brute force password attack that attempts to narrow the range of possible passwords guessed by using a list of common passwords and possibly including attempts based on the target’s personal information. 3. Rainbow tables A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system’s encrypted password file. The 12 Categories of Threats Alternative approaches to password cracking: 4. Social Engineering Password Attack It is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. The 12 Categories of Threats 4. Forces of Nature sometimes called acts of God, can present some of the most dangerous threats because they usually occur with little warning and are beyond the control of people. Fire, floods, earthquakes, lightning, Typhoons. 5. Human Error This category includes acts performed without intent or malicious purpose or in ignorance by an authorized user. The 12 Categories of Threats The 12 Categories of Threats 7. Sabotage or Vandalism This category of threat involves the deliberate sabotage of a computer system or business or acts of vandalism to destroy an asset or damage the image of an organization. Online Activism cyberterrorist A hacker who attacks systems to conduct terrorist activities via networks or Internet pathways. cyberwarfare Formally sanctioned offensive operations conducted by a government or state against information or systems of another government or state. The 12 Categories of Threats 8. Software Attacks software attacks occur when an individual or group designs and deploys software to attack a system. This attack can consist of specially crafted software that attackers trick users into installing on their systems. Malware Computer software specifically designed to perform malicious or unwanted actions. Malware adware Malware intended to provide undesired marketing and advertising, including popups and banners on a user’s The 12 screens. Categories boot virus Also known as a boot sector virus, a type of virus that targets the boot sector or Master Boot Record (MBR) of a computer system’s hard drive or removable storage media. of Threats spyware Any technology that aids in gathering information about people or organizations without their knowledge. Trojan horse A malware program that hides its true nature and reveals its designed behavior only when activated. Malware The 12 virus A type of malware that is attached to other executable programs. When activated, it replicates and propagates itself to multiple systems Categories worm A type of malware that is capable of activation of Threats and replication without being attached to an existing program. back door A malware payload that provides access to a system by bypassing normal access controls. denial-of-service (DoS) attack An attack that attempts to overwhelm a computer target’s The 12 ability to handle incoming communications, prohibiting legitimate users from accessing those systems. Categories distributed denial-of-service (DDoS) attack of Threats A DoS attack in which a coordinated stream of requests is launched against a target from many locations at the same time using bots or zombies. E-mail Attacks The 12 mail bomb An attack designed Categories to overwhelm the receiver with excessive quantities of e-mail. of Threats spam Undesired e-mail, typically commercial advertising transmitted in bulk Communications Interception Attacks The 12 packet sniffer A software program or Categories hardware appliance that can intercept, copy, and interpret network traffic. of Threats pharming The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information. Communications Interception Attacks The 12 Categories of Threats Spoofing A technique for gaining unauthorized access to computers using a forged or modified source IP address to give the perception that messages are coming from a trusted host. The 12 Categories of Threats 9. Technical Hardware Failures or Errors Technical hardware failures or errors occur when a manufacturer distributes equipment containing a known or unknown flaw 10. Technical Software Failures or Errors Large quantities of computer code are written, debugged, published, and sold before all their bugs are detected and resolved. The 12 Categories of Threats 11. Technological Obsolescence Antiquated or outdated infrastructure can lead to unreliable and untrustworthy systems. 12. Theft The illegal taking of another’s property, which can be physical, electronic, or intellectual.