Threats and Attacks: CSE 4471: Information Security Instructor: Adam C. Champion, PH.D
Threats and Attacks: CSE 4471: Information Security Instructor: Adam C. Champion, PH.D
Threats and Attacks: CSE 4471: Information Security Instructor: Adam C. Champion, PH.D
3
Threats (1)
• Threat: an object, person, or other entity that
represents a constant danger to an asset
5
Table 2.1: Threats to Info. Security
Threat Category Examples
Acts of human error or failure Accidents, employee mistakes
Intellectual property compromise Piracy, copyright infringement
Deliberate espionage or trespass Unauthorized access, data collection
Deliberate information extortion Blackmail of info. disclosure
Deliberate sabotage or vandalism Destruction of systems or info.
Deliberate theft Illegally taking equipment or info.
Deliberate software attacks Viruses, worms, denial of service
Forces of nature Fires, floods, earthquakes
Deviations in service from providers Power and Internet provider issues
Technological hardware failures Equipment failure
Technological software failures Bugs, code problems, unknown loopholes
Technological obsolescence Antiquated or outdated technologies 6
Acts of Human Error or Failure (1)
• Includes actions without malicious intent
• Causes include:
– Inexperience
– Improper training
– Incorrect assumptions
• Employees: among the greatest threats to
organization’s data
7
Acts of Human Error or Failure (2)
• Employee mistakes can easily lead to:
– Revelation of classified data
– Entry of erroneous data
– Accidental data deletion or modification
– Data storage in unprotected areas
– Failure to protect information
8
Questions
• Who poses the biggest threat to your company?
– “Script kiddie” software hacker?
– Convicted burglar in area?
– Employee who accidentally deletes sole copy of
project source code?
• How can we guard against these threats?
9
Deliberate Acts of Espionage/Trespass
• Unauthorized people access protected information
• Competitive intelligence (legal) vs. industrial
espionage (illegal)
• Shoulder surfing occurs anywhere a person accesses
confidential information
• Controls let trespassers know they are encroaching on
organization’s cyberspace
• Hackers uses skill, guile, or fraud to bypass controls
protecting others’ information
• European Network and Info. Sec. Agency video
10
Deliberate Acts of Theft
• Illegal taking of
another’s physical,
electronic, or
intellectual property
• Physical theft can be
easily controlled
• Electronic theft is more
complex: evidence of
crime not obvious
11
Source: Pixabay/OpenClipArt
Deliberate Software Attacks
• Malicious software (malware) damages,
destroys, or denies service to target systems
• Includes:
– Viruses: Malware propagating with human help
– Worms: Self-propagating malware over networks
– Trojan horses: Malware claiming benign purpose
– Logic bombs: Malicious code placed in software,
triggered by attacker
– Backdoors: Hidden bypass of system authentication
– Denial-of-service (DoS) attacks: Attackers’ traffic
floods take down Internet services (one type)
12
Forces of Nature
• Forces of nature: among
most dangerous threats
• Disrupt individual lives
plus information
storage, transfer, use
• Organizations must
implement controls to
limit damage, prepare
for worst-case scenarios
15
Attacks (1)
• Act or action that exploits vulnerability (i.e.,
an identified weakness) in controlled system
• Accomplished by threat agent which damages
or steals organization’s information
16
Attacks (2)
• Malicious code: launching viruses, worms,
Trojan horses, and active Web scripts aiming to
steal or destroy info.
• Backdoor: accessing system or network using
known or previously unknown mechanism
• Password crack: attempting to reverse calculate
a password
• Brute force: trying every possible combination
of options of a password
• Dictionary: selects specific accounts to attack
and uses commonly used passwords (i.e., the
dictionary) to guide guesses
17
Attacks (3)
§ Denial-of-service (DoS): attacker sends large
number of connection or information requests to
a target
§ Target system cannot handle successfully along with
other, legitimate service requests
§ May result in system crash or inability to perform
ordinary functions
§ Distributed denial-of-service (DDoS):
coordinated stream of requests is launched
against target from many locations
simultaneously
18
Attacks (4)
• Spoofing: technique used to gain unauthorized
access; intruder assumes a trusted IP address
21
Table 2.2: Attack Replication Vectors
Attack Vector Description
IP Scan and Attack Malware-infected system scans for target IP addresses, then
probes for vulnerable system components (e.g., Conficker).
Web Browsing Malware-infected systems with webpage write privileges
infects Web content (e.g., HTML files).
Viruses Malware-infected system infects other systems to which it
has access via executable scripts (human activity required).
Unprotected Shares Malware-infected system uses file system vulnerabilities to
spread malware to all writable locations.
Mass Email Malware-infected system spams all contacts found in users’
address books.
Simple Network Malware-infected systems use SNMP to guess common or
Management Protocol weak passwords on other network-connected systems, then
(SNMP) spread. (Vendors have fixed many of these bugs.)
22
IP Spoofing Attack
23
Source: Wikipedia
Denial-of-Service Attack
Source: Wikipedia 24
Man-in-the-Middle Attack
26