0% found this document useful (0 votes)
33 views83 pages

02 NeedForSecurity

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views83 pages

02 NeedForSecurity

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Principles of Information Security

Chapter 2 – The Need for Security

Based on the Fourth Edition of:


M. E. Whitman, H. J. Mattord:. Principles of Information Security

School of Business, Department of Information Technology


Introduction Business Needs First Threats Attacks

For our bad neighbor makes us early stirrers;


which is both healthful and good husbandry.

William Shakespeare (1564-1616)

Chapter 2 – The Need for Security Principles of Information Security 2


Introduction Business Needs First Threats Attacks

Learning Objectives

Demonstrate that organizations have a business need for


information security.

Explain why a successful information security program is the


responsibility of both an organization’s general management
and IT management.

Identify the threats posed to information security and the


more common attacks associated with those threats.

Chapter 2 – The Need for Security Principles of Information Security 3


Introduction Business Needs First Threats Attacks

Outline

1 Introduction

2 Business Needs First

3 Threats

4 Attacks

Chapter 2 – The Need for Security Principles of Information Security 4


Introduction Business Needs First Threats Attacks

Introduction

Primary mission of information security is to ensure systems


and contents stay the same

If no threats existed, resources could be focused on improving


systems, resulting in vast improvements in ease of use and
usefulness

Attacks on information systems are a daily occurrence

Chapter 2 – The Need for Security Principles of Information Security 5


Introduction Business Needs First Threats Attacks

Business Needs First

Information security performs the following four important


functions for an organization:
1 Protects the organization’s ability to function.

2 Enables the safe operation of applications implemented in the


organization’s IT systems.

3 Protects the data the organization collects and uses.

4 Safeguards the technology assets in use at the organization.

Chapter 2 – The Need for Security Principles of Information Security 6


Introduction Business Needs First Threats Attacks

Business Needs First (cont.)

1 Protecting the Functionality of an Organization


Both general management and IT management are responsible
for implementing information security to protect the ability of
the organization to function
Information security is both management issue and people
issue
Organization should address information security in terms of
business impact and cost

Chapter 2 – The Need for Security Principles of Information Security 7


Introduction Business Needs First Threats Attacks

Business Needs First (cont.)

2 Enabling the Safe Operation of Applications


Organization needs environments that safeguard applications
using IT systems.
Management must continue to oversee infrastructure once in
place –not defer to IT department.

Chapter 2 – The Need for Security Principles of Information Security 8


Introduction Business Needs First Threats Attacks

Business Needs First (cont.)

3 Protecting Data that Organizations Collect and Use


Organization, without data, loses its record of transactions
and/or ability to deliver value to customers.
Protecting data in motion and data at rest are both critical
aspects of information security.

Chapter 2 – The Need for Security Principles of Information Security 9


Introduction Business Needs First Threats Attacks

Business Needs First (cont.)

4 Safeguarding Technology Assets in Organizations


Organizations must have secure infrastructure services based
on size and scope of enterprise.
Additional security services may be needed as organization
expands.
More robust solutions may be needed to replace security
programs the organization has outgrown.

Chapter 2 – The Need for Security Principles of Information Security 10


Introduction Business Needs First Threats Attacks

Quick Quiz

1 The principal goal of the information security program should


be to .
Answer:

Chapter 2 – The Need for Security Principles of Information Security 11


Introduction Business Needs First Threats Attacks

Quick Quiz

1 The principal goal of the information security program should


be to .
Answer: ensure that systems and their contents remain the
same

Chapter 2 – The Need for Security Principles of Information Security 11


Introduction Business Needs First Threats Attacks

Quick Quiz

1 The principal goal of the information security program should


be to .
Answer: ensure that systems and their contents remain the
same

2 Information security has more to do with than with


.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 11


Introduction Business Needs First Threats Attacks

Quick Quiz

1 The principal goal of the information security program should


be to .
Answer: ensure that systems and their contents remain the
same

2 Information security has more to do with than with


.
Answer: management, technology

Chapter 2 – The Need for Security Principles of Information Security 11


Introduction Business Needs First Threats Attacks

Quick Quiz

1 The principal goal of the information security program should


be to .
Answer: ensure that systems and their contents remain the
same

2 Information security has more to do with than with


.
Answer: management, technology

3 True or False: Many organizations find that their most


valuable asset is their data.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 11


Introduction Business Needs First Threats Attacks

Quick Quiz

1 The principal goal of the information security program should


be to .
Answer: ensure that systems and their contents remain the
same

2 Information security has more to do with than with


.
Answer: management, technology

3 True or False: Many organizations find that their most


valuable asset is their data.
Answer: True

Chapter 2 – The Need for Security Principles of Information Security 11


Introduction Business Needs First Threats Attacks

Threats

A threat is an object, person, or other entity that represents a


constant danger to an asset.

Management must be informed of the different threats facing


the organization

Overall security is improving

The 2009 CSI/FBI survey found


64% of organizations had malware infections
14% indicated system penetration by an outsider

Chapter 2 – The Need for Security Principles of Information Security 12


Introduction Business Needs First Threats Attacks

Threats (cont.)

Table 2-1 Threats to Information Security4

Chapter 2 – The Need for Security Principles of Information Security 13


Introduction Business Needs First Threats Attacks

Threats (cont.)

Figure 2-1 World Internet usage3


Chapter 2 – The Need for Security Principles of Information Security 14
Introduction Business Needs First Threats Attacks

Threats –Compromises to Intellectual Property

Intellectual property (IP): ownership of ideas and control over


the tangible or virtual representation of those ideas.

The most common IP breaches involve software piracy.

Chapter 2 – The Need for Security Principles of Information Security 15


Introduction Business Needs First Threats Attacks

Threats –Compromises to Intellectual Property

Intellectual property (IP): ownership of ideas and control over


the tangible or virtual representation of those ideas.

The most common IP breaches involve software piracy.

Two watchdog organizations investigate software abuse:


1 Software & Information Industry Association (SIIA).
2 Business Software Alliance (BSA)

Enforcement of copyright law has been attempted with


technical security mechanisms (e.g. digital watermarks).

Chapter 2 – The Need for Security Principles of Information Security 15


Introduction Business Needs First Threats Attacks

Threats –Deliberate Software Attacks

Malicious software (malware) designed to damage, destroy, or


deny service to target systems. Includes viruses, worms,
Trojan horses, back doors, and denial-of-service attacks.

A macro virus is embedded in the automatically executing


macro code. A boot virus infects key operating system files
located in a computer’s boot sector.

Chapter 2 – The Need for Security Principles of Information Security 16


Introduction Business Needs First Threats Attacks

Threats –Deliberate Software Attacks

Malicious software (malware) designed to damage, destroy, or


deny service to target systems. Includes viruses, worms,
Trojan horses, back doors, and denial-of-service attacks.

A macro virus is embedded in the automatically executing


macro code. A boot virus infects key operating system files
located in a computer’s boot sector.

Worms are malicious programs that replicate themselves


constantly without requiring another program.

Trojan horses are software programs that hide their true


nature and reveal their designed behavior only when activated.

Chapter 2 – The Need for Security Principles of Information Security 16


Introduction Business Needs First Threats Attacks

Threats –Deliberate Software Attacks (cont.)

Figure 2-4 Trojan Horse Attack

Chapter 2 – The Need for Security Principles of Information Security 17


Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

Access of protected information by unauthorized individuals.

Competitive intelligence (legal) vs. industrial espionage


(illegal).

Shoulder surfing can occur anywhere a person accesses


confidential information.

Controls let trespassers know they are encroaching on


organization’s cyberspace.

Chapter 2 – The Need for Security Principles of Information Security 18


Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

Access of protected information by unauthorized individuals.

Competitive intelligence (legal) vs. industrial espionage


(illegal).

Shoulder surfing can occur anywhere a person accesses


confidential information.

Controls let trespassers know they are encroaching on


organization’s cyberspace.

Hackers use skill, guile, or fraud to bypass controls protecting


others’ information

Chapter 2 – The Need for Security Principles of Information Security 18


Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

Figure 2-5 Shoulder Surfing


Chapter 2 – The Need for Security Principles of Information Security 19
Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

Expert hacker:
Develops software scripts and program exploits

Usually a master of many skills

Will often create attack software and share with others

Chapter 2 – The Need for Security Principles of Information Security 20


Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

Expert hacker:
Develops software scripts and program exploits

Usually a master of many skills

Will often create attack software and share with others

Unskilled hacker:
Many more unskilled hackers than expert hackers

Use expertly written software to exploit a system

Do not usually fully understand the systems they hack

Chapter 2 – The Need for Security Principles of Information Security 20


Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

Figure 2-6 Hacker Profiles

Chapter 2 – The Need for Security Principles of Information Security 21


Introduction Business Needs First Threats Attacks

Threats –Espionage or Deliberate Acts of Trespass

There are other terms for system rule breakers:

The term cracker is now commonly associated with an


individual who cracks or removes software protection that is
designed to prevent unauthorized duplication.

A phreaker hacks the public telephone network to make free


calls and/or disrupt services.

Chapter 2 – The Need for Security Principles of Information Security 22


Introduction Business Needs First Threats Attacks

Threats –Deliberate Acts of Information Extortion

Attacker steals information from computer system and


demands compensation for its return or nondisclosure.

Commonly done in credit card number theft.

Chapter 2 – The Need for Security Principles of Information Security 23


Introduction Business Needs First Threats Attacks

Threats –Acts of Human Error or Failure

This category includes the possibility of acts performed


without intent or malicious purpose by an individual who is an
employee of an organization.

Inexperience, improper training, making incorrect


assumptions, and other circumstances can cause problems.

Many threats can be prevented with controls, ranging from


simple procedures, such as requiring the user to type a critical
command twice, to more complex procedures, such as the
verification of commands by a second party.

Chapter 2 – The Need for Security Principles of Information Security 24


Introduction Business Needs First Threats Attacks

Threats –Acts of Human Error or Failure

Figure 2-8 Acts of Human Error or Failure


Chapter 2 – The Need for Security Principles of Information Security 25
Introduction Business Needs First Threats Attacks

Quick Quiz

1 A is an object, person, or other entity that represents


a constant danger to an asses.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 26


Introduction Business Needs First Threats Attacks

Quick Quiz

1 A is an object, person, or other entity that represents


a constant danger to an asses.
Answer: threat

Chapter 2 – The Need for Security Principles of Information Security 26


Introduction Business Needs First Threats Attacks

Quick Quiz

1 A is an object, person, or other entity that represents


a constant danger to an asses.
Answer: threat

2 When an unauthorized individual gains access to the


information an organization is trying to protect, that act is
categorized as a deliberate acts of .
Answer:

Chapter 2 – The Need for Security Principles of Information Security 26


Introduction Business Needs First Threats Attacks

Quick Quiz

1 A is an object, person, or other entity that represents


a constant danger to an asses.
Answer: threat

2 When an unauthorized individual gains access to the


information an organization is trying to protect, that act is
categorized as a deliberate acts of .
Answer: trespass

Chapter 2 – The Need for Security Principles of Information Security 26


Introduction Business Needs First Threats Attacks

Quick Quiz

1 A is an object, person, or other entity that represents


a constant danger to an asses.
Answer: threat

2 When an unauthorized individual gains access to the


information an organization is trying to protect, that act is
categorized as a deliberate acts of .
Answer: trespass

3 A hacks the public telephone network to make free


calls or disrupt services.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 26


Introduction Business Needs First Threats Attacks

Quick Quiz

1 A is an object, person, or other entity that represents


a constant danger to an asses.
Answer: threat

2 When an unauthorized individual gains access to the


information an organization is trying to protect, that act is
categorized as a deliberate acts of .
Answer: trespass

3 A hacks the public telephone network to make free


calls or disrupt services.
Answer: phreaker

Chapter 2 – The Need for Security Principles of Information Security 26


Introduction Business Needs First Threats Attacks

Threats –Deliberate Acts of Sabotage or Vandalism

Attacks on the face of an organization –its Web site. Threats


can range from petty vandalism to organized sabotage.

Web site defacing can erode consumer confidence, dropping


sales and organization’s net worth.

Chapter 2 – The Need for Security Principles of Information Security 27


Introduction Business Needs First Threats Attacks

Threats –Deliberate Acts of Sabotage or Vandalism

Attacks on the face of an organization –its Web site. Threats


can range from petty vandalism to organized sabotage.

Web site defacing can erode consumer confidence, dropping


sales and organization’s net worth.

Today, security experts are noticing a rise in another form of


online vandalism, hacktivist or cyberactivist operations. A
more extreme version is referred to as cyberterrorism, who
hack systems to conduct terrorist activities via network or
Internet pathways.

Chapter 2 – The Need for Security Principles of Information Security 27


Introduction Business Needs First Threats Attacks

Threats (cont.)

Figure 2-9 Cyber Activists Wanted


Chapter 2 – The Need for Security Principles of Information Security 28
Introduction Business Needs First Threats Attacks

Threats –Deliberate Acts of Theft

Theft is the illegal taking of another’s property. Within an


organization, that property can be physical, electronic or
intellectual.

The value of information suffers when it is copied and taken


away without the owner’s knowledge.

Chapter 2 – The Need for Security Principles of Information Security 29


Introduction Business Needs First Threats Attacks

Threats –Deliberate Acts of Theft

Theft is the illegal taking of another’s property. Within an


organization, that property can be physical, electronic or
intellectual.

The value of information suffers when it is copied and taken


away without the owner’s knowledge.

Physical theft can be controlled quite easily. Many measures


can be taken, including locking doors, training security
personnel, and installing alarm systems.

Electronic theft, however, is a more complex problem to


manage and control. Organizations may not even know it has
occurred.

Chapter 2 – The Need for Security Principles of Information Security 29


Introduction Business Needs First Threats Attacks

Threats –Forces of Nature

Forces of nature, force majeure, or acts of God pose some of


the most dangerous threats, because they are unexpected and
can occur with very little warning (e.g. Fire, Flood,
Earthquake, Tsunami, etc.).

Disrupt not only individual lives, but also storage,


transmission, and use of information.

Organizations must implement controls to limit damage and


prepare contingency plans for continued operations.

Chapter 2 – The Need for Security Principles of Information Security 30


Introduction Business Needs First Threats Attacks

Threats –Deviations in Quality of Service

This category represents situations in which a product or


services are not delivered to the organization as expected.

Internet service, communications, and power irregularities


dramatically affect availability of information and systems.

Other utility services can impact organizations as well. Among


these are telephone, water, wastewater, trash pickup, cable
television, natural or propane gas, and custodial services.

Chapter 2 – The Need for Security Principles of Information Security 31


Introduction Business Needs First Threats Attacks

Threats –Technical Hardware Failures or Errors

Occur when manufacturer distributes equipment containing


flaws to users.

Can cause system to perform outside of expected parameters,


resulting in unreliable or poor service.

Some errors are terminal in that they result in the


unrecoverable loss of the equipment. Some errors are
intermittent in that they only periodically manifest
themselves, resulting in faults that are not easily repeated.

Chapter 2 – The Need for Security Principles of Information Security 32


Introduction Business Needs First Threats Attacks

Threats –Technical Software Failure or Errors

This category involves threats that come from purchasing


software with unknown, hidden faults

Combinations of certain software and hardware can reveal new


software bugs

Large quantities of computer code are written, debugged,


published, and sold before all of their bugs are detected and
resolved

Chapter 2 – The Need for Security Principles of Information Security 33


Introduction Business Needs First Threats Attacks

Quick Quiz

1 When an individual steals information from computer system


and demands compensation for its return or nondisclosure,
that act is categorized as a deliberate acts of .
Answer:

Chapter 2 – The Need for Security Principles of Information Security 34


Introduction Business Needs First Threats Attacks

Quick Quiz

1 When an individual steals information from computer system


and demands compensation for its return or nondisclosure,
that act is categorized as a deliberate acts of .
Answer: information extortion

Chapter 2 – The Need for Security Principles of Information Security 34


Introduction Business Needs First Threats Attacks

Quick Quiz

1 When an individual steals information from computer system


and demands compensation for its return or nondisclosure,
that act is categorized as a deliberate acts of .
Answer: information extortion

2 Attacks on the face of organization (i.e. its Web site), is


categorized as a deliberate acts of .
Answer:

Chapter 2 – The Need for Security Principles of Information Security 34


Introduction Business Needs First Threats Attacks

Quick Quiz

1 When an individual steals information from computer system


and demands compensation for its return or nondisclosure,
that act is categorized as a deliberate acts of .
Answer: information extortion

2 Attacks on the face of organization (i.e. its Web site), is


categorized as a deliberate acts of .
Answer: sabotage or vandalism

Chapter 2 – The Need for Security Principles of Information Security 34


Introduction Business Needs First Threats Attacks

Quick Quiz

1 When an individual steals information from computer system


and demands compensation for its return or nondisclosure,
that act is categorized as a deliberate acts of .
Answer: information extortion

2 Attacks on the face of organization (i.e. its Web site), is


categorized as a deliberate acts of .
Answer: sabotage or vandalism

3 are software programs that hide their true nature and


reveal their designed behavior only when activated.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 34


Introduction Business Needs First Threats Attacks

Quick Quiz

1 When an individual steals information from computer system


and demands compensation for its return or nondisclosure,
that act is categorized as a deliberate acts of .
Answer: information extortion

2 Attacks on the face of organization (i.e. its Web site), is


categorized as a deliberate acts of .
Answer: sabotage or vandalism

3 are software programs that hide their true nature and


reveal their designed behavior only when activated.
Answer: Trojan horses

Chapter 2 – The Need for Security Principles of Information Security 34


Introduction Business Needs First Threats Attacks

Attacks

A vulnerability is an identified weakness of a controlled system


where controls are not present or are no longer effective.

An attack is a deliberate act that exploits a vulnerability to


compromise a controlled system.

An attack is accomplished by a threat agent that damages or


steals an organization’s information or physical asset.

Chapter 2 – The Need for Security Principles of Information Security 35


Introduction Business Needs First Threats Attacks

Attack (cont.)

New Table

Table 2-2 Attack Replication Vectors


Chapter 2 – The Need for Security Principles of Information Security 36
Introduction Business Needs First Threats Attacks

Attack (cont.)

Malicious code: includes execution of viruses, worms, Trojan


horses, and active Web scripts with intent to destroy or steal
information.

Hoaxes: transmission of a virus hoax with a real virus


attached; more devious form of attack.

Back door: gaining access to system or network using known


or previously unknown/newly discovered access mechanism.

Password crack: attempting to reverse calculate a password.

Brute force attack: trying every possible combination of


options of a password.

Chapter 2 – The Need for Security Principles of Information Security 37


Introduction Business Needs First Threats Attacks

Attacks (cont.)

Dictionary attack: selects specific accounts to attack and uses


commonly used passwords (i.e., the dictionary) to guide
guesses.

Denial-of-service (DoS): attacker sends large number of


connection or information requests to a target.
Target system cannot handle successfully along with other,
legitimate service requests,
May result in system crash or inability to perform ordinary
functions.

Chapter 2 – The Need for Security Principles of Information Security 38


Introduction Business Needs First Threats Attacks

Attacks (cont.)

Dictionary attack: selects specific accounts to attack and uses


commonly used passwords (i.e., the dictionary) to guide
guesses.

Denial-of-service (DoS): attacker sends large number of


connection or information requests to a target.
Target system cannot handle successfully along with other,
legitimate service requests,
May result in system crash or inability to perform ordinary
functions.
Distributed denial-of-service (DDoS): coordinated stream of
requests is launched against target from many locations
simultaneously.

Chapter 2 – The Need for Security Principles of Information Security 38


Introduction Business Needs First Threats Attacks

Attacks (cont.)

Figure 2-11 Denial-of-Service Attacks

Chapter 2 – The Need for Security Principles of Information Security 39


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 40


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

Chapter 2 – The Need for Security Principles of Information Security 40


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

2 Applying computer and network resources to try exhaustive


combinations for access is called a(n) attack.
Answer:

Chapter 2 – The Need for Security Principles of Information Security 40


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

2 Applying computer and network resources to try exhaustive


combinations for access is called a(n) attack.
Answer: brute force

Chapter 2 – The Need for Security Principles of Information Security 40


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

2 Applying computer and network resources to try exhaustive


combinations for access is called a(n) attack.
Answer: brute force

3 When a program tries using all commonly used passwords,


this is known as a(n) .
Answer:

Chapter 2 – The Need for Security Principles of Information Security 40


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

2 Applying computer and network resources to try exhaustive


combinations for access is called a(n) attack.
Answer: brute force

3 When a program tries using all commonly used passwords,


this is known as a(n) .
Answer: dictionary attack

Chapter 2 – The Need for Security Principles of Information Security 40


Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

2 Applying computer and network resources to try exhaustive


combinations for access is called a(n) attack.
Answer: brute force

3 When a program tries using all commonly used passwords,


this is known as a(n) .
Answer: dictionary attack

4 When a program tries to reverse-calculate passwords, this is


known as a(n) .
Answer:
Chapter 2 – The Need for Security Principles of Information Security 40
Introduction Business Needs First Threats Attacks

Quick Quiz

1 True or False: Warnings of attacks that are not valid are


usually called hoaxes.
Answer: True

2 Applying computer and network resources to try exhaustive


combinations for access is called a(n) attack.
Answer: brute force

3 When a program tries using all commonly used passwords,


this is known as a(n) .
Answer: dictionary attack

4 When a program tries to reverse-calculate passwords, this is


known as a(n) .
Answer: password crack
Chapter 2 – The Need for Security Principles of Information Security 40
Introduction Business Needs First Threats Attacks

Attacks (cont.)

Spoofing is a technique used to gain unauthorized access to


computers, wherein the intruder sends messages to a
computer containing an IP address that indicates that the
messages are coming from a trusted host.

Man-in-the-middle: attacker monitors network packets,


modifies them, and inserts them back into network.

Chapter 2 – The Need for Security Principles of Information Security 41


Introduction Business Needs First Threats Attacks

Attacks (cont.)

Spoofing is a technique used to gain unauthorized access to


computers, wherein the intruder sends messages to a
computer containing an IP address that indicates that the
messages are coming from a trusted host.

Man-in-the-middle: attacker monitors network packets,


modifies them, and inserts them back into network.

Spam: unsolicited commercial e-mail; more a nuisance than


an attack, though is emerging as a vector for some attacks.

Mail bombing: also a DoS; attacker routes large quantities of


e-mail to target.

Chapter 2 – The Need for Security Principles of Information Security 41


Introduction Business Needs First Threats Attacks

Attacks (cont.)

Figure 2-12 IP Spoofing

Chapter 2 – The Need for Security Principles of Information Security 42


Introduction Business Needs First Threats Attacks

Attacks (cont.)

Figure 2-13 Man-in-the-Middle Attack

Chapter 2 – The Need for Security Principles of Information Security 43


Introduction Business Needs First Threats Attacks

Attacks (cont.)
A Sniffer is a program or device that monitor data traveling
over a network; can be used both for legitimate purposes and
for stealing information from a network.

Social engineering is the process of using social skills to


convince people to reveal access credentials or other valuable
information to attacker.

Chapter 2 – The Need for Security Principles of Information Security 44


Introduction Business Needs First Threats Attacks

Attacks (cont.)
A Sniffer is a program or device that monitor data traveling
over a network; can be used both for legitimate purposes and
for stealing information from a network.

Social engineering is the process of using social skills to


convince people to reveal access credentials or other valuable
information to attacker.

Phishing: an attempt to gain personal/financial information


from individual, usually by posing as legitimate entity.

Pharming: redirection of legitimate Web traffic (e.g., browser


requests) to illegitimate site for the purpose of obtaining
private information.

Timing attack: relatively new; works by exploring contents of


a Web browser’s cache to create malicious cookie.
Chapter 2 – The Need for Security Principles of Information Security 44
Introduction Business Needs First Threats Attacks

Attacks (cont.)

Figure 2-14 Example of a Nigerian 4-1-9 Fraud

Chapter 2 – The Need for Security Principles of Information Security 45


Introduction Business Needs First Threats Attacks

Quick quiz
1 Using a known or previously installed access mechanism is
called using a .
(a) hidden bomb
(b) vector
(c) spoof
(d) back door
Answer:

Chapter 2 – The Need for Security Principles of Information Security 46


Introduction Business Needs First Threats Attacks

Quick quiz
1 Using a known or previously installed access mechanism is
called using a .
(a) hidden bomb
(b) vector
(c) spoof
(d) back door
Answer: (d)

Chapter 2 – The Need for Security Principles of Information Security 46


Introduction Business Needs First Threats Attacks

Quick quiz
1 Using a known or previously installed access mechanism is
called using a .
(a) hidden bomb
(b) vector
(c) spoof
(d) back door
Answer: (d)
2 Unsolicited commercial e-mail is also called .
Answer:

Chapter 2 – The Need for Security Principles of Information Security 46


Introduction Business Needs First Threats Attacks

Quick quiz
1 Using a known or previously installed access mechanism is
called using a .
(a) hidden bomb
(b) vector
(c) spoof
(d) back door
Answer: (d)
2 Unsolicited commercial e-mail is also called .
Answer: spam

Chapter 2 – The Need for Security Principles of Information Security 46


Introduction Business Needs First Threats Attacks

Quick quiz
1 Using a known or previously installed access mechanism is
called using a .
(a) hidden bomb
(b) vector
(c) spoof
(d) back door
Answer: (d)
2 Unsolicited commercial e-mail is also called .
Answer: spam
3 Another name for TCP hijacking is .
(a) man-in-the-middle
(b) mail bombing
(c) spoofing
(d) denial of service
Answer:
Chapter 2 – The Need for Security Principles of Information Security 46
Introduction Business Needs First Threats Attacks

Quick quiz
1 Using a known or previously installed access mechanism is
called using a .
(a) hidden bomb
(b) vector
(c) spoof
(d) back door
Answer: (d)
2 Unsolicited commercial e-mail is also called .
Answer: spam
3 Another name for TCP hijacking is .
(a) man-in-the-middle
(b) mail bombing
(c) spoofing
(d) denial of service
Answer: (a)
Chapter 2 – The Need for Security Principles of Information Security 46
Introduction Business Needs First Threats Attacks

Additional Resources

1 Governing for Enterprise Security Implementation Guide


[Link]

2 Build Security In:Secure Software Development Lifecycle


[Link]
[Link]/bsi/articles/knowledge/sdlc/[Link]

3 Verizon Data Breach Investigationsw Report (2010)


[Link] 2010-
data-breach-report en [Link]

Chapter 2 – The Need for Security Principles of Information Security 47

You might also like