Lecture 2 Threats and Attacks
Lecture 2 Threats and Attacks
Dr Irfan Chishti
Learning Objectives
⚫ Explore the enterprise information
security (InfoSec) needs
⚫ Identify
the threats posed to InfoSec and
the more common attacks associated
with those threats.
⚫ differentiate threats to the information within
systems..
2
Introduction
⚫ Primarygoal is to ensure systems &
contents stay the same, & If no threats
exist
➢ resources could be used for systems
mprovements to achieve ease of use and
usefulness
⚫ Attacks on ISs are a daily occurrence
Needs Analysis
InfoSec performs safeguarding functions
for an organisation to protect:
➢ Organisation’s ability to function
➢ Enablement of applications’ safe
operation
➢ Data
➢ Technology Assets
4
Organisation Ability to Function
⚫ InfoSec is every stakeholder’ responsibility
⚫ Management (general and IT) responsible
for implementation
⚫ Organisationshould address InfoSec in
terms of business impact and cost
5
Application’ Safe Operation
⚫ Organisation requires sustainable
infrastructure to provide safe environment
for applications using IT systems
7
Protecting Technology Assets
⚫ Secureinfrastructure based on
organisation size & scope.
14
Example: Internet service issues
⚫ Internetservice failures can
considerably undermine information
availability
⚫ Outsourced Web hosting provider
responsible for all Internet services as
well as hardware OS, and software
15
Espionage or Trespass
⚫ Unauthorised access to secured info
⚫ Competitive intelligence (legal) vs. industrial
espionage (illegal)
⚫ Shoulder surfing: a person
20
Sabotage or Vandalism
⚫ Itranges from petty vandalism to organised
sabotage.
22
Technical Hardware Failures or Errors
⚫ Manufacturer distributes equipment
containing flaws to users
⚫ Can cause system to perform outside of
expected parameters, resulting in
unreliable or poor service
⚫ Some errors are terminal; some are
intermittent
23
Technological Obsolescence
⚫ Antiquated/outdated infrastructure can
lead to unreliable, untrustworthy systems
⚫ Propermanagerial planning should
prevent technology obsolescence
24
Theft
⚫ Illegally
taking of another’s property, i.e.,
physical, electronic, or intellectual.
⚫ Physical: controlled quite easily, e.g.,
locked areas to trained security personnel
& the installation of alarm systems.
⚫ Electronic & Intellectual: complex problem
to manage & control. Organisations may
not even know it has occurred. 25
Missing, Inadequate, or Incomplete
26
Software Attacks
⚫ Malicioussoftware (malware) designed to
damage, destroy, or deny service to target
systems, includes:
Exploit
Vulnerability Attack
Attacks
⚫ Acts or actions that exploits vulnerability
(i.e., an identified weakness) in system.
⚫ Accomplished by threat agent tsuch as
malicious code hat damages or steals
organization’s information.
⚫ Malicious code: launching code & active
web scripts aiming to steal or destroy
information. 29
Attacks (Cont’d)
⚫ Virus: Malware propagating with human
help
⚫ Worms: Self-propagating malware over
networks
⚫ Trojan horses: Malware claiming benign
purpose
⚫ Logic bombs: Malicious code placed in
software, triggered by attacker
Attacks (Cont’d)
⚫ Backdoor: accessing system or network
using known or previously unknown
mechanism
⚫ Password crack: attempting to reverse
calculate a password.
⚫ Brute force: trying every possible
combination of options of a password
Attacks (Cont’d)
⚫ Dictionary: selects specific accounts to
attack & uses commonly used passwords
(i.e., the dictionary) to guide guesses
⚫ Mail
bombing: attacker routes large
quantities of e-mail to target
Attacks (Cont’d)
⚫ Denial-of-service (DoS): attacker sends
large number of connection or information
requests to a target
⚫ Target system cannot handle successfully
along with other, legitimate service requests
⚫ May result in system crash or inability to
perform ordinary functions
Denial of Service (DoS)
34
Attacks (Cont’d)
⚫ Distributed denial-of-service (DDoS):
coordinated stream of requests is
launched against target from many
locations simultaneously.
⚫ Spoofing: technique used to gain
unauthorized access; intruder assumes a
trusted IP address
36
Attacks (Cont’d)
Social engineering: using social skills to
convince people to reveal access
credentials or other valuable information.
Ransomware
⚫ This kind of attack encrypts important files,
rendering data inaccessible until you pay
the ransom. It often relies upon social
engineering techniques to gain a foothold.
Attacks (Cont’d)
⚫ Man-in-the-middle: attacker monitors
network packets, modifies them, and
inserts them back into network
⚫ Spam: unsolicited commercial e-mail;
more a nuisance than an attack, though is
emerging as a vector for some attacks
Man in the Middle
39
Attacks (Cont’d)
⚫ Sniffers: program or device that monitors
data traveling over network; can be used
both for legitimate purposes and for
stealing information from a network
⚫ Buffer
overflow: application error where
more data sent to a buffer than can be
handled
Attacks (Cont’d)
⚫ Timingattack: explores contents of a web
browser’s cache to create malicious cookie
⚫ Prevention: