Introduction
Introduction
Dr. Zakria
PhD, Software Engineering
University of Electronic Science and Technology of China.
“A state of being secure and free from danger or harm; the actions taken to make someone or
something secure.”
Precautions taken to guard against unauthorized access to data (in electronic form) or
information systems connected with internet
Confidentiality
“Preserving authorized restriction on information access and disclosure,
including means for protecting personal privacy and proprietary information.”
Integrity
“Guarding against improper information modification or destruction, and
includes ensuring information non-repudiation and authenticity.”
Availability
“Ensuring timely and reliable access and use of information.”
Attacks on CIA
Types of Attacks
Malware
Malware
Spyware
The most rapidly growing types of malware
• Cookies
• Key logger
How Malware
How to Stop?
Phishing Attack
What is Phishing used for?
40
Phishing Awareness
Password Attacks
Types of Password Attacks
Stop Password Attacks
Distributed Denial of Services (DDoS)
Packet Flood
Prevention
Man in the Middle
Prevent MITM
Drive-by Download
50
How it work?
Malvertising
Prevention
Rogue Software
Propagation
Prevention
Web Attacks
SQL injection
DNS Poisoning
■ Insider Attack:
❑ Person with authorized system access
■ External Attack:
❑ Hired by an insider or an external entity to the organization
❑ Organization not only faces financial loss but also the loss of reputation
❑ Keeps regular eye on the log and carefully analyzing these firewall logs
❑ Structure attacks:
■ Performed by highly skilled and experienced people
■ Money:
❑ People are motivated towards committing cyber crime is to make quick and
easy money.
■ Revenge:
❑ Take revenge with other person/organization/society/caste or religion
■ Fun:
❑ The amateur do cyber crime for fun.
■ Recognition:
❑ It is considered to be pride if someone hack the highly secured networks
■ Anonymity:
❑ Anonymity that a cyber space motivates the person to commit cyber crime
■ Cyber Espionage:
❑ At times the government itself is involved in cyber trespassing to keep eye
on other person/network/country
Kinds of Cyber Crimes
■ Cyber Stalking
❑ Stalking, harassing, threatening someone, or defame a person
■ Cyber Terrorism
❑ Use of computer resources to intimidate or force government, the civilian
■ Spamming
❑ Sending of unsolicited and commercial bulk message
❑ Spams not only irritate the recipients and overload the network but also waste
❑ Malicious script gets access to the cookies and other sensitive information and
■ Computer Vandalism
❑ Physical destroying computing resources using physical force or
malicious code
■ Computer Hacking
❑ Modifying computer hardware and software to accomplish a goal
CERT
www.cert.org
Microsoft Security Advisor
www.microsoft.com/security/default.mspx
F-Secure
www.f-secure.com
SANS
www.sans.org