The document provides an overview of cyber security concepts including definitions of cyber security, hackers, and types of cyber attacks such as web-based attacks, system-based attacks, and common attack methods like phishing, brute force attacks, and denial of service attacks. It also discusses cyber security defenses, tools, and strategies such as firewalls, antivirus software, intrusion detection systems, access controls, encryption, employee training, and security audits. Key terms like ports, IP addresses, port scanning, security operations centers (SOCs), zero-trust models, and ethical hacking are also defined.
This document provides lecture notes on information security. It covers four modules: (1) the security problem in computing and elementary cryptography; (2) program security, operating system protection, and trusted OS design; (3) database security and security in networks; (4) administering security, legal and ethical issues. Key topics include computer threats like viruses and malware, network attacks like denial of service, and security controls like encryption, firewalls, and intrusion detection systems. The goal is to educate students on fundamental concepts of information security.
Lec 2- Hardening and whitelisting of devicesBilalMehmood44
This document discusses various cybersecurity threats including malware attacks, social engineering attacks, software supply chain attacks, advanced persistent threats, distributed denial of service attacks, man-in-the-middle attacks, and password attacks. It also covers methods to help mitigate these threats such as systems hardening, whitelisting, and blacklisting. Hardening aims to reduce vulnerabilities while whitelisting allows only approved applications and blacklisting denies known bad actors.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This document provides an overview of computer security concepts. It discusses threats like viruses, worms, bots and rootkits that can compromise security. It defines key terms like assets, attacks, intruders and vulnerabilities. The CIA triad of confidentiality, integrity and availability is explained as the standard for information security. Common attacks are also outlined, such as password cracking, man-in-the-middle, spoofing and social engineering. Malware is defined and the characteristics of viruses, worms and trojans are described.
The document discusses data security and various threats to data. It provides definitions of key terms like data, security, and data security. It then describes three main objectives of the project: to understand data security threats and their backgrounds, and techniques to defend against these threats. Various threats are outlined, like human threats from hackers, staff, and spies. Technologies for security like cryptography, firewalls, and intrusion detection systems are also summarized. The document provides an overview of the importance of data security.
This document discusses network security. It begins by defining network security and explaining the three main types: physical, technical, and administrative security controls. It then defines vulnerabilities as weaknesses that can be exploited by threats such as unauthorized access or data modification. Common network attacks are described as reconnaissance, access, denial of service, and worms/viruses. Emerging attack trends include malware, phishing, ransomware, denial of service attacks, man-in-the-middle attacks, cryptojacking, SQL injection, and zero-day exploits. The document aims to help students understand vulnerabilities, threats, attacks, and trends regarding network security.
This document provides an overview of computer security. It discusses why security is needed due to increased reliance on information technology. It then covers the history of some major computer attacks. The document defines computer security and discusses its goals of confidentiality, integrity and availability. It describes common security attacks like network attacks, web attacks, and software attacks. Finally, it discusses types of security like information security and the components that make it up.
This document discusses information system security. It defines information system security as collecting activities to protect information systems and stored data. It outlines four components of an IT security policy framework: policies, standards, procedures, and guidelines. It also discusses vulnerabilities, threats, attacks, and trends in attacks. Vulnerabilities refer to weaknesses, while threats use tools and scripts to launch attacks like reconnaissance, access, denial of service, and viruses/Trojans. Common attacks trends include malware, phishing, ransomware, denial of service, man-in-the-middle, cryptojacking, SQL injection, and zero-day exploits.
Tutorial 09 - Security on the Internet and the Webdpd
The document discusses various security threats on the internet and countermeasures to protect against them. It covers topics like secrecy, integrity, necessity, hackers/crackers, denial of service attacks, viruses/trojans, and identity theft. The key aspects of security are preventing unauthorized access, use, alteration or destruction of digital assets. Common threats include hacking, malware, and theft of personal information stored online.
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsSamuel862293
Cybersecurity tips to protecting your digital asset
In an increasingly digital world, safeguarding your digital assets is essential. This presentation delves into key cybersecurity practices to ensure your data remains secure from cyber threats.
We'll explore the importance of strong, unique passwords and the implementation of two-factor authentication to enhance security. Regular software updates are crucial, as they fix vulnerabilities that cybercriminals could exploit.
Encryption is a vital tool, protecting your data both in transit and at rest, ensuring that even if intercepted, your information remains unreadable to unauthorized users. Regular backups, stored both locally and offsite, safeguard against data loss from breaches or system failures.
We'll also cover email security, highlighting the dangers of phishing and the importance of secure communication channels. Network security practices, including secure Wi-Fi usage and firewall implementation, are essential to protect against unauthorized access.
Mobile devices, often overlooked, need robust security measures and careful management of app permissions. User education is a continuous process, equipping you and your team with knowledge to identify and respond to threats effectively.
Finally, consistent monitoring and auditing of your digital environment help detect anomalies early and ensure compliance with security protocols.
This presentation provides a comprehensive guide to protecting your digital assets, emphasizing that cybersecurity is an ongoing process of vigilance and adaptation to emerging threats.
Computer security involves protecting computer systems, hardware, software, and data from theft and damage. There are many types of computer attacks, including passive monitoring, active network attacks, insider attacks, and distributed attacks. Common computer attacks are password-based attacks, denial-of-service attacks, man-in-the-middle attacks, and application-layer attacks. Network security controls help protect against these threats through tools like access control, antivirus software, firewalls, intrusion prevention, and encryption.
its contains all the topics which are related to the ethical hacking
its also be cover the penetration testing and describe the difference between ethical hacker and non ethical hackers
This document discusses computing safety and security threats. It defines safety properties in distributed computing and lists common threats like trojans, phishing, spam, and viruses. It also discusses antivirus software and how they work to detect, block, and remove viruses. Peer-to-peer networks and firewalls are described as ways to share information and block access. Tips are provided for protecting personal data and privacy online, but it cautions that the internet is not completely safe due to risks from hackers, grooming, cyberbullying, and sextortion.
In an active attack, the threat actor takes action to change or manipulate data on a target system or en route to the target. Common types of active attacks include masquerade attacks where the attacker pretends to be an authorized user, session hijacking attacks where the attacker steals a user's session information, message modification attacks where the attacker intercepts and alters messages, and denial-of-service (DoS) attacks which overwhelm system resources with traffic to cause disruption. Passive attacks involve monitoring networks without changing data in preparation for potential future active attacks.
This document discusses why information security is needed for organizations. It provides four key functions of information security: 1) protecting the organization's ability to function, 2) enabling safe application operation, 3) protecting data, and 4) safeguarding technology assets. It then discusses various threats to information security, including intellectual property breaches, software attacks like viruses and worms, service disruptions, unauthorized access, natural disasters, human error, extortion, sabotage, theft, and technical failures. It concludes with discussing secure software development and common security problems.
This document provides an overview of IT security and internet safety. It discusses key concepts in IT security like the CIA triad of confidentiality, integrity and availability. It also covers common security threats like intrusion, blocking/denial of service attacks, and malware. The document recommends security measures to mitigate these threats, such as strong authentication, firewalls, antivirus software and user training. It concludes with guidelines for staying safe online, including creating strong passwords, avoiding scams, and knowing when to get help from a parent or guardian.
Cybersecurity involves protecting computers, networks, programs and data from unauthorized access or criminal cyber activity like hacking. The document discusses key concepts in cybersecurity including confidentiality, integrity and availability. It also defines common cyber attacks such as phishing, denial of service attacks, and malware like viruses, worms and ransomware. The document provides prevention methods against these threats such as using antivirus software, firewalls, encryption, strong passwords and backing up data.
Security involves ensuring data integrity, availability, and confidentiality against threats. It can be computer or network security. Data integrity means data cannot be modified without authorization. Availability means information systems and data are accessible when needed. An information security management system (ISMS) follows the PDCA cycle of plan, do, check, act to manage security risks and ensure business continuity. ISO/IEC 27000 standards provide guidance for implementing an ISMS.
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
The document discusses the implications of computer misuse and cybersecurity. It begins with an introduction from the presentation group and defines key terms like computer misuse, cybersecurity, vulnerabilities, threats, attacks, and countermeasures. It then covers various types of threats like malware, password attacks, DDoS attacks, and vulnerabilities from both internal and external sources. Specific examples of countermeasures and how to prevent cyber attacks are provided. The document concludes by discussing the impact of computer misuse related to cyberbullying and ways to mitigate cyberbullying.
This document discusses various topics related to computer security including risks, attacks, safeguards, and ethics. It describes common security threats like viruses, hacking, denial of service attacks, and information theft. It also outlines methods to identify users, protect against threats, and investigate security incidents through digital forensics. Safeguards include firewalls, antivirus software, encryption, and physical access controls.
Internet security involves establishing rules and measures to protect against attacks over the Internet. It relates to securing browsers and network security across operating systems. The objective is to secure the exchange of information because the Internet represents an insecure channel with risks like phishing. Common signs of a compromised system include slow connections, popups, strange behavior, and inability to download updates. Malicious software, denial-of-service attacks, and phishing are major security threats. Defenses include antivirus software, encryption, secure connections, and multi-factor authentication.
The document discusses various security threats and vulnerabilities related to mobile devices and wireless networks. It covers topics like mobile malware, attacks on authentication, services and protocols, and security issues with browsers, operating systems, software applications and network channels. Specific threats mentioned include cross-site scripting, injection flaws, buffer overflows, Trojan horses, denial-of-service attacks, and weaknesses in GSM network security. The document emphasizes that mobile device capabilities now far exceed security and that stolen or lost devices can reveal private user information.
This document provides an overview of computer security. It discusses why security is needed due to increased reliance on information technology. It then covers the history of some major computer attacks. The document defines computer security and discusses its goals of confidentiality, integrity and availability. It describes common security attacks like network attacks, web attacks, and software attacks. Finally, it discusses types of security like information security and the components that make it up.
This document discusses information system security. It defines information system security as collecting activities to protect information systems and stored data. It outlines four components of an IT security policy framework: policies, standards, procedures, and guidelines. It also discusses vulnerabilities, threats, attacks, and trends in attacks. Vulnerabilities refer to weaknesses, while threats use tools and scripts to launch attacks like reconnaissance, access, denial of service, and viruses/Trojans. Common attacks trends include malware, phishing, ransomware, denial of service, man-in-the-middle, cryptojacking, SQL injection, and zero-day exploits.
Tutorial 09 - Security on the Internet and the Webdpd
The document discusses various security threats on the internet and countermeasures to protect against them. It covers topics like secrecy, integrity, necessity, hackers/crackers, denial of service attacks, viruses/trojans, and identity theft. The key aspects of security are preventing unauthorized access, use, alteration or destruction of digital assets. Common threats include hacking, malware, and theft of personal information stored online.
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsSamuel862293
Cybersecurity tips to protecting your digital asset
In an increasingly digital world, safeguarding your digital assets is essential. This presentation delves into key cybersecurity practices to ensure your data remains secure from cyber threats.
We'll explore the importance of strong, unique passwords and the implementation of two-factor authentication to enhance security. Regular software updates are crucial, as they fix vulnerabilities that cybercriminals could exploit.
Encryption is a vital tool, protecting your data both in transit and at rest, ensuring that even if intercepted, your information remains unreadable to unauthorized users. Regular backups, stored both locally and offsite, safeguard against data loss from breaches or system failures.
We'll also cover email security, highlighting the dangers of phishing and the importance of secure communication channels. Network security practices, including secure Wi-Fi usage and firewall implementation, are essential to protect against unauthorized access.
Mobile devices, often overlooked, need robust security measures and careful management of app permissions. User education is a continuous process, equipping you and your team with knowledge to identify and respond to threats effectively.
Finally, consistent monitoring and auditing of your digital environment help detect anomalies early and ensure compliance with security protocols.
This presentation provides a comprehensive guide to protecting your digital assets, emphasizing that cybersecurity is an ongoing process of vigilance and adaptation to emerging threats.
Computer security involves protecting computer systems, hardware, software, and data from theft and damage. There are many types of computer attacks, including passive monitoring, active network attacks, insider attacks, and distributed attacks. Common computer attacks are password-based attacks, denial-of-service attacks, man-in-the-middle attacks, and application-layer attacks. Network security controls help protect against these threats through tools like access control, antivirus software, firewalls, intrusion prevention, and encryption.
its contains all the topics which are related to the ethical hacking
its also be cover the penetration testing and describe the difference between ethical hacker and non ethical hackers
This document discusses computing safety and security threats. It defines safety properties in distributed computing and lists common threats like trojans, phishing, spam, and viruses. It also discusses antivirus software and how they work to detect, block, and remove viruses. Peer-to-peer networks and firewalls are described as ways to share information and block access. Tips are provided for protecting personal data and privacy online, but it cautions that the internet is not completely safe due to risks from hackers, grooming, cyberbullying, and sextortion.
In an active attack, the threat actor takes action to change or manipulate data on a target system or en route to the target. Common types of active attacks include masquerade attacks where the attacker pretends to be an authorized user, session hijacking attacks where the attacker steals a user's session information, message modification attacks where the attacker intercepts and alters messages, and denial-of-service (DoS) attacks which overwhelm system resources with traffic to cause disruption. Passive attacks involve monitoring networks without changing data in preparation for potential future active attacks.
This document discusses why information security is needed for organizations. It provides four key functions of information security: 1) protecting the organization's ability to function, 2) enabling safe application operation, 3) protecting data, and 4) safeguarding technology assets. It then discusses various threats to information security, including intellectual property breaches, software attacks like viruses and worms, service disruptions, unauthorized access, natural disasters, human error, extortion, sabotage, theft, and technical failures. It concludes with discussing secure software development and common security problems.
This document provides an overview of IT security and internet safety. It discusses key concepts in IT security like the CIA triad of confidentiality, integrity and availability. It also covers common security threats like intrusion, blocking/denial of service attacks, and malware. The document recommends security measures to mitigate these threats, such as strong authentication, firewalls, antivirus software and user training. It concludes with guidelines for staying safe online, including creating strong passwords, avoiding scams, and knowing when to get help from a parent or guardian.
Cybersecurity involves protecting computers, networks, programs and data from unauthorized access or criminal cyber activity like hacking. The document discusses key concepts in cybersecurity including confidentiality, integrity and availability. It also defines common cyber attacks such as phishing, denial of service attacks, and malware like viruses, worms and ransomware. The document provides prevention methods against these threats such as using antivirus software, firewalls, encryption, strong passwords and backing up data.
Security involves ensuring data integrity, availability, and confidentiality against threats. It can be computer or network security. Data integrity means data cannot be modified without authorization. Availability means information systems and data are accessible when needed. An information security management system (ISMS) follows the PDCA cycle of plan, do, check, act to manage security risks and ensure business continuity. ISO/IEC 27000 standards provide guidance for implementing an ISMS.
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
The document discusses the implications of computer misuse and cybersecurity. It begins with an introduction from the presentation group and defines key terms like computer misuse, cybersecurity, vulnerabilities, threats, attacks, and countermeasures. It then covers various types of threats like malware, password attacks, DDoS attacks, and vulnerabilities from both internal and external sources. Specific examples of countermeasures and how to prevent cyber attacks are provided. The document concludes by discussing the impact of computer misuse related to cyberbullying and ways to mitigate cyberbullying.
This document discusses various topics related to computer security including risks, attacks, safeguards, and ethics. It describes common security threats like viruses, hacking, denial of service attacks, and information theft. It also outlines methods to identify users, protect against threats, and investigate security incidents through digital forensics. Safeguards include firewalls, antivirus software, encryption, and physical access controls.
Internet security involves establishing rules and measures to protect against attacks over the Internet. It relates to securing browsers and network security across operating systems. The objective is to secure the exchange of information because the Internet represents an insecure channel with risks like phishing. Common signs of a compromised system include slow connections, popups, strange behavior, and inability to download updates. Malicious software, denial-of-service attacks, and phishing are major security threats. Defenses include antivirus software, encryption, secure connections, and multi-factor authentication.
The document discusses various security threats and vulnerabilities related to mobile devices and wireless networks. It covers topics like mobile malware, attacks on authentication, services and protocols, and security issues with browsers, operating systems, software applications and network channels. Specific threats mentioned include cross-site scripting, injection flaws, buffer overflows, Trojan horses, denial-of-service attacks, and weaknesses in GSM network security. The document emphasizes that mobile device capabilities now far exceed security and that stolen or lost devices can reveal private user information.
The ever evoilving world of science /7th class science curiosity /samyans aca...Sandeep Swamy
The Ever-Evolving World of
Science
Welcome to Grade 7 Science4not just a textbook with facts, but an invitation to
question, experiment, and explore the beautiful world we live in. From tiny cells
inside a leaf to the movement of celestial bodies, from household materials to
underground water flows, this journey will challenge your thinking and expand
your knowledge.
Notice something special about this book? The page numbers follow the playful
flight of a butterfly and a soaring paper plane! Just as these objects take flight,
learning soars when curiosity leads the way. Simple observations, like paper
planes, have inspired scientific explorations throughout history.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 817 from Texas, New Mexico, Oklahoma, and Kansas. 97 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
CURRENT CASE COUNT: 817 (As of 05/3/2025)
• Texas: 688 (+20)(62% of these cases are in Gaines County).
• New Mexico: 67 (+1 )(92.4% of the cases are from Eddy County)
• Oklahoma: 16 (+1)
• Kansas: 46 (32% of the cases are from Gray County)
HOSPITALIZATIONS: 97 (+2)
• Texas: 89 (+2) - This is 13.02% of all TX cases.
• New Mexico: 7 - This is 10.6% of all NM cases.
• Kansas: 1 - This is 2.7% of all KS cases.
DEATHS: 3
• Texas: 2 – This is 0.31% of all cases
• New Mexico: 1 – This is 1.54% of all cases
US NATIONAL CASE COUNT: 967 (Confirmed and suspected):
INTERNATIONAL SPREAD (As of 4/2/2025)
• Mexico – 865 (+58)
‒Chihuahua, Mexico: 844 (+58) cases, 3 hospitalizations, 1 fatality
• Canada: 1531 (+270) (This reflects Ontario's Outbreak, which began 11/24)
‒Ontario, Canada – 1243 (+223) cases, 84 hospitalizations.
• Europe: 6,814
How to Subscribe Newsletter From Odoo 18 WebsiteCeline George
Newsletter is a powerful tool that effectively manage the email marketing . It allows us to send professional looking HTML formatted emails. Under the Mailing Lists in Email Marketing we can find all the Newsletter.
INTRO TO STATISTICS
INTRO TO SPSS INTERFACE
CLEANING MULTIPLE CHOICE RESPONSE DATA WITH EXCEL
ANALYZING MULTIPLE CHOICE RESPONSE DATA
INTERPRETATION
Q & A SESSION
PRACTICAL HANDS-ON ACTIVITY
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsesushreesangita003
what is pulse ?
Purpose
physiology and Regulation of pulse
Characteristics of pulse
factors affecting pulse
Sites of pulse
Alteration of pulse
for BSC Nursing 1st semester
for Gnm Nursing 1st year
Students .
vitalsign
Geography Sem II Unit 1C Correlation of Geography with other school subjectsProfDrShaikhImran
The correlation of school subjects refers to the interconnectedness and mutual reinforcement between different academic disciplines. This concept highlights how knowledge and skills in one subject can support, enhance, or overlap with learning in another. Recognizing these correlations helps in creating a more holistic and meaningful educational experience.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 795 from Texas, New Mexico, Oklahoma, and Kansas. 95 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsDrNidhiAgarwal
Unemployment is a major social problem, by which not only rural population have suffered but also urban population are suffered while they are literate having good qualification.The evil consequences like poverty, frustration, revolution
result in crimes and social disorganization. Therefore, it is
necessary that all efforts be made to have maximum.
employment facilities. The Government of India has already
announced that the question of payment of unemployment
allowance cannot be considered in India
Multi-currency in odoo accounting and Update exchange rates automatically in ...Celine George
Most business transactions use the currencies of several countries for financial operations. For global transactions, multi-currency management is essential for enabling international trade.
Exploring Substances:
Acidic, Basic, and
Neutral
Welcome to the fascinating world of acids and bases! Join siblings Ashwin and
Keerthi as they explore the colorful world of substances at their school's
National Science Day fair. Their adventure begins with a mysterious white paper
that reveals hidden messages when sprayed with a special liquid.
In this presentation, we'll discover how different substances can be classified as
acidic, basic, or neutral. We'll explore natural indicators like litmus, red rose
extract, and turmeric that help us identify these substances through color
changes. We'll also learn about neutralization reactions and their applications in
our daily lives.
by sandeep swamy
2. SECURITY IN COMPUTERS
Two main types; External and Internal Security
External security: Securing computer against external factors such as fires, floods,
earthquakes, stolen disks/tapes, etc. by maintaining adequate backup, using security
guards, allowing access to sensitive information to only trusted employees/users, etc.
Internal security: User authentication, access control, and cryptography mechanisms
3. INFORMATION SECURITY
Security in Computers
Authentication: Verifying the identity of a user (person or program) before
permitting access to the requested resource
Access Control: Once authenticated, access control mechanisms prohibit a
user/process from accessing those resources/information that he/she/it is not
authorized to access
Cryptography: Means of encrypting private information so that unauthorized
access cannot use information
4. AUTHENTICATION
Computer-to-computer authentication
computers can remember high-quality cryptographic keys and perform
cryptographic operations
Human-to-computer authentication
humans cannot store large keys
humans cannot accurately or efficiently perform cryptographic operations
That’s why we need special methods for authenticating humans
5. AUTHENTICATION
There are three main ways of authenticating a human:
Something you know
A password,
cryptographic key, or
the correct answer to a challenge-response test
Something you own
A physical key,
security card, or
a one-time password generator
Something you are
Some biometric measurement (facial features, fingerprint, retina scan, or voice print etc.)
6. INFORMATION SECURITY
Attacks in Computer Security:
Virus: a potentially damaging computer program, can spread (by replicating) and
damage files
Trojan horse: a script that hides within or looks like a legitimate file (data) until
triggered, but it does not replicate itself on other computers
Spyware: a program placed on computer without user knowledge, tracks and sends
user activity to the other (spying) computer
Adware: a program that, without user’s consent, displays online advertisements
Spam: an unsolicited e-mail message (usually commercial) sent to many recipients
Phishing: a scam in which a perpetrator sends an official looking e-mail that
attempts to obtain your personal information
7. INFORMATION SECURITY
Attacks in Computer Security:
Malicious Code:
The malicious code attack includes the execution of viruses, worms, Trojan horses,
and active Web scripts with the intent to destroy or steal information.
Other forms of malware include covert software applications—bots, spyware, and
adware.
A bot (an abbreviation of robot) is “an automated software program that executes
certain commands when it receives a specific input”.
Bots are often the technology used to implement Trojan horses, logic bombs, back
doors, and spyware.
8. INFORMATION SECURITY
Attacks in Computer Security:
Hoaxes:
A more devious attack on computer systems is the transmission of a virus hoax with a real
virus attached.
When the attack is masked in a seemingly legitimate message, unsuspecting users more
readily distribute it.
Back Doors:
Using a known or previously unknown and newly discovered access mechanism, an attacker
can gain access to a system or network resource through a back door.
Password Crack:
Attempting to reverse-calculate a password is often called cracking.
It is used when a copy of the Security Account Manager (SAM) data file, which contains
hashed representation of the user’s password, can be obtained.
9. INFORMATION SECURITY
Attacks in Computer Security:
Brute Force:
The application of computing and network resources which try every possible password
combination is called a brute force attack.
Often used to obtain passwords to commonly used accounts, it is sometimes called a password
attack.
Dictionary:
The dictionary attack is a variation of the brute force attack which narrows the field by selecting
specific target accounts and using a list of commonly used passwords (the dictionary) instead of
random combinations.
Organizations can use similar dictionaries to disallow passwords during the reset process and thus
guard against easy-to-guess passwords.
Remedy: Rules requiring numbers and/or special characters in passwords make the dictionary
attack less effective.
10. INFORMATION SECURITY
Attacks in Computer Security:
Denial-of- Service Attack (DoS) & Distributed Denial-of- Service Attack (DDoS)
• In a Denial-of-Service (DoS) attack, the attacker sends a large number of connection or
information requests to a target.
• The target system becomes overloaded and cannot respond to legitimate requests for service.
• A distributed denial-of-service (DDoS) is an attack in which a coordinated stream of requests is
launched against a target from many locations at the same time.
• DDoS attacks are preceded by a preparation phase in which many systems, perhaps thousands,
are compromised.
• The compromised machines are turned into zombies.
• Machines that are directed remotely by the attacker to participate in the attack.
11. INFORMATION SECURITY
Attacks in Computer Security:
Spoofing
• A technique used to gain unauthorized access to computers.
• The intruder sends messages with a source IP address that has been forged to indicate that
the messages are coming from a trusted host.
• The hackers use a variety of techniques
to obtain trusted IP addresses,
and then modify the packet
headers to insert these forged addresses.
12. INFORMATION SECURITY
Attacks in Computer Security:
Man-in-the –Middle:
Also called TCP Hijacking.
An attacker monitors (or sniffs) packets from the network, modifies them, and inserts them
back into the network.
This type of attack uses IP spoofing to enable an attacker to impersonate another entity on the
network.
It allows the attacker to eavesdrop as well as to change, delete, reroute, add, forge, or divert
data.
13. INFORMATION SECURITY
Attacks in Computer Security:
Mail Bomber:
Another form of e-mail attack.
Also a DoS is called a mail bomb.
An attacker routes large quantities of e-mail to the target.
14. SECURITY PRINCIPLES TO FOLLOW
Turn off file sharing
Disable Wi-Fi and Bluetooth if not needed
Turn off automatic connections
Install an antivirus program on all your computers
Think twice before posting your personal information online
Never open an e-mail attachment unless you are expecting it and it is from a trusted source
Install a personal firewall program
Disable file and printer sharing on Internet connection
Always have strong passwords
Limit the amount of information you provide to websites; fill in only required information
Clear your history file when you are finished browsing
15. INFORMATION SECURITY
CNSS Security Model:
CNSS - Committee on National Security Systems
The model, created by John McCumber in 1991, provides a graphical representation of the
architectural approach widely used in computer and information security.
It is now known as the McCumber Cube.
Shows three dimensions.
If extrapolated, the three
dimensions of each axis
become a 3x3x3 cube
with 27 cells representing
areas that must be addressed
to secure today’s information systems.
16. INFORMATION SECURITY
CNSS Security Model:
To ensure system security, each of the 27 areas must be properly addressed during the
security process.
Example:
The intersection between technology, integrity, and storage requires a control or
safeguard that addresses the need to use technology to protect the integrity of
information while in storage.
One such control might be a system for detecting host intrusion.
That protects the integrity of information
by alerting the security administrators to the
potential modification of a critical file.
17. INFORMATION SECURITY
Security Mechanisms:
Encipherment:
The use of mechanical algorithms to transform data into a form that is not readily
understandable.
Digital Signatures:
Data appended to or a cryptographic transformation of a data unit that allows a recipient
of the data unit to prove the source and integrity of the data unit and protect against
forgery (e.g. by the recipient)
Access Control:
A variety of mechanisms that enforce access rights to resources.
Data Integrity:
A variety of mechanisms use to assure the integrity of the data unit or stream of data
units.
18. INFORMATION SECURITY
Security Mechanisms:
Authentication Exchange:
A mechanism intended to ensure the identity of an entity by means of information
exchange.
Traffic Padding:
The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Routing Control:
Enables selection of particular secure routes for certain data and allows routing changes,
especially when a breach of security is suspected.