Sie sind auf Seite 1von 48

1

Threats and Attacks to Information security


GVHD : Trng Qunh Chi

Gunners group Phm c Xun Nguyn Anh Tun Phm Th Qunh Anh 50903407 50903101 50903427

Contents
THREATS ATTACKS

Background

Threats to information security

Security researchers warn: Informationsecuritycontinues to be ignored by top managers, middle managers, and employees alike ...

Threats to information security


What are the threats to information

security ?
Which of these threats are the most

serious?
How frequently (per month) are these

threats observed?

Threats to information security


The 2002 Computer Security Institute (CSI)/Federal

Bureau of Investigation (FBI) survey found: 90 percent of respondents(primarily large corporations and government agencies) detected computer security breaches within the last 12 months.
80 percent of those organizations reported financial

losses a total of approximately $455,848,000 in financial losses, up from $377,828,700 reported in2001

Threats to information security


The 2004 Computer Security Institute (CSI)/Federal

Bureau of Investigation (FBI) survey found: 79 percent of organizations reported cyber security breaches within the last 12 months
54 percent of those organizations reported financial

losses totaling over $141 million

Threats to information security

Threats to information security

10

Threats to information security


Know the enemy, and know yourself, and in a hundred battles you will never be in peril

11

Threats to information security


A threat is a possible danger that might exploit

a vulnerability to breach security and thus cause possible harm.


Threat: an object, person, or other entity that represents

a constant danger to an asset


Threats : intentional ,accidental

12

Threats to information security

13

Threats to Information Security

14

Acts of Human Error or Failure


Includes acts performed without malicious intent Causes include: Inexperience Improper training

Incorrect assumptions
Employees are the greatest threats to an organizations

data

15

Figure 2-1 Acts of Human Error or Acts of Human Error or Failure Failure

16

Acts of Human Error or Failure


Employee mistakes can easily lead to: Revelation of classified data Entry of erroneous data Accidental data deletion or modification Data storage in unprotected areas Failure to protect information Many of these threats can be prevented with controls

17

Acts of Human Error or Failure

We should use Least privilege for users We should use Least privilege for users

18

Intellectual Properly

Intellectual property can be trade secrets, copyrights,

trademarks, and patents. Technical mechanism : Digital watermark , embeddcode, copyright code

We should use Least privilege for users

19

Espionage or Trespass
Access of protected information by unauthorized

individuals
Competitive intelligence (legal) vs. industrial

espionage (illegal)
Shoulder surfing occurs anywhere a person accesses

confidential information
Controls let trespassers know they are encroaching on

organizations cyberspace
Hackers uses skill, guile, or fraud to bypass controls

protecting others information

20

21

Theft
Illegal taking of anothers physical, electronic, or

intellectual property
Physical theft is controlled relatively easily Electronic theft is more complex problem; evidence of

crime not readily apparent

22

Threats to information security


95% : to provide information 81% to collect information 60% : to advertise 55% : provide customer service 46% : support internal operation 45% : order goods & service 36% : connect remote sites

23

Threats to information security


What are organizations doing to protect them-selves?

24

Threats to information security


Which of these threats are the most serious?

25

Threats to information security


How frequently (per month) are these threats observed?

26

Software Attacks
Malicious software (malware) designed to damage,

destroy, or deny service to target systems


Includes viruses, worms, Trojan horses, logic bombs,

back doors, and denial-of-services attacks

27

28

Forces of Nature
Forces of nature are among the most dangerous

threats
Disrupt not only individual lives, but also storage,

transmission, and use of information


Organizations must implement controls to limit damage

and prepare contingency plans for continued operations

29

Quality of Service
Includes situations where products or services not

delivered as expected
Information system depends on many interdependent

support systems
Internet service, communications, and power

irregularities dramatically affect availability of information and systems

30

Internet Service Issues


Internet service provider (ISP) failures can considerably

undermine availability of information


Outsourced Web hosting provider assumes

responsibility for all Internet services as well as hardware and Web site operating system software

31

Attacks
Act or action that exploits vulnerability (i.e., an identified

weakness) in controlled system


Accomplished by threat agent which damages or steals

organizations information

32

Attacks
Malicious code: includes execution of viruses, worms,

Trojan horses, and active Web scripts with intent to destroy or steal information
Back door: gaining access to a network and inserting a

program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges.

33

Attacks
Password crack: attempting to reverse calculate a

password
Brute force: trying every possible combination of options

of a password

34

Attacks
Dictionary: selects specific accounts to attack and uses

commonly used passwords (i.e., the dictionary) to guide guesses

35

36

Attacks (continued)
Denial-of-service (DoS): attacker sends large number of

connection or information requests to a target


Target system cannot handle successfully along with other,

legitimate service requests


May result in system crash or inability to perform

ordinary functions

Distributed denial-of-service (DDoS): coordinated

stream of requests is launched against target from many locations simultaneously

37

Figure 2-9 - Denial-of-Service Attacks

38

Attacks
Spoofing: This type of attack is usually considered as an

access attack.
IP spoofing : make the data look like it came from a

trusted host
DNS spoofing : send users to a website other than the

one they wanted to go to

39

40

Attacks
Man-in-the-middle: attacker monitors network packets,

modifies them, and inserts them back into network

41

Figure 2-11 - Man-in-the-Middle

42

Attacks
Spam: unsolicited commercial e-mail; more a nuisance

than an attack, though is emerging as a vector for some attacks

43

Attacks
Mail bombing: also a DoS; attacker routes large

quantities of e-mail to target

44

Attacks
Sniffers: program or device that monitors data traveling

over network; can be used both for legitimate purposes and for stealing information from a network
Social engineering: using social skills to convince people

to reveal access credentials or other valuable information to attacker

45

Attacks
Buffer overflow: application error occurring when more

data is sent to a buffer than can be handled


Timing attack: relatively new; works by exploring

contents of a Web browsers cache to create malicious cookie

46

Summary
Threat: object, person, or other entity representing a

constant danger to an asset


Attack: a deliberate act that exploits vulnerability

47

References
Books : Principles of Information Security Michael E.Whitman,

Herbert J.Mattord , Information Security Fundamentals Thomas R.Peltier, Justin Peltier, John Blackley Threats to Information Security Michael E.Whitman
Websites : infosecisland.com, anninhthongtin.com,

news.tech24.vn,xahoithongtin.com.vn,hocbao.com

48

Thanks For Listenning !

Das könnte Ihnen auch gefallen