Beruflich Dokumente
Kultur Dokumente
Abuse Techniques
JIMMY DE VERA ROLDAN, MSIT
Computer Attacks and
Abuse
All computers connected to the Internet, especially those with
important trade secrets or valuable IT assets are under
constant attack from hackers, foreign governments, terrorist
groups, disaffected employees, industrial spies, and
competitors. These people attack computers looking for
valuable data or trying to harm the computer system.
Common Attack Techniques
Hacking is the unauthorized access, modification, or use of an
electronic device or some element of a computer system. Most
hackers break into systems using known flaws in operating
systems or application programs, or as a result of poor access
controls.
Hacker
Common Attack Techniques
Masquerading or impersonation is pretending to be an
authorized user to access a system. This is possible when the
perpetrator knows the user’s ID number and password or uses
the computer after the user logs in.
Piggybacking
• The clandestine use of a neighbor’s WiFi network; this can be
prevented by enabling the security features in the wireless
network.
• Tapping into a communication line and electronically latching
onto a legitimate user before the user enters a secure
system; the legitimate user unknowingly carries the
perpetrator into the system.
Common Attack Techniques
• An unauthorized person following an authorized person
through a secure door, bypassing physical security controls
such as keypads, ID cards, or biometric identification
scanners.
Time bombs and logic bombs are trojan horses that lie idle until
triggered by a specified date or time, by a change in the
system, by a message sent to the system, or by an event that
does not occur. Once triggered, the bomb goes off, destroying
programs, data, or both.