Beruflich Dokumente
Kultur Dokumente
Countermeasures
Sir. Ahmad Kamalrulzaman Othman
FSKM, UiTM Johor
Objectives
Introduction
There are many types of attacks that can affect
computer systems. This chapter addresses
some of the most common, including Denial of
Service (DOS), virus, and Trojan horse attacks.
In information security knowledge is power is
not only good advice but an axiom upon which
to build an entire security outlook.
SYN Flood
Micro Blocks
SYN Cookies
RST Cookies
Stack tweaking
Smurf Attack
UDP Flood
ICMP Flood
10
11
12
DoS Tools
13
14
Blaster
MyDoom
W32.Storm Worm
The Slammer Worm
15
16
17
18
19
20
21
22
Viruses
Examples:
SoBig Virus
Mimail, Bagle
Sasser
23
24
Trojan Horses
25
26
Summary
Session hacking
Virus and Trojan horse attacks
Denial of Service/Distributed Denial of Service
Buffer overflow
27
Summary cont.
28
Summary cont.
29
Summary cont.
30