Importance of Information Security
Importance of Information Security
What is Security?
• Security is about
– Honest user
– Dishonest Attacker
– How the Attacker
• Disrupts honest user’s use of the system (Integrity, Availability)
1. Cross-Site Scripting (XSS) - Cross-site scripting (XSS) is a type of web application attack that
involves injecting malicious scripts into web pages that are viewed by other users.
2. Cross-Site Request Forgery (CSRF) - a type of web application attack that tricks a user into
executing an unwanted action on a web application that they are already authenticated with.
This is typically accomplished by sending a specially crafted link or script to the user, which
then performs the unwanted action when clicked.
3. XML External Entity (XXE) - XML External Entity (XXE) is a type of web application attack that
involves exploiting vulnerabilities in XML parsers used by a web application. This can allow an
attacker to read sensitive data or execute unauthorized actions on the web application’s server.
4. Injection Attacks - Injection attacks involve inserting malicious code into a web application,
typically in the form of input data such as SQL queries, commands, or scripts.
5. Fuzz testing - also known as fuzzing, is a technique used to discover vulnerabilities in a web
application by sending it random or invalid input data. The goal of fuzz testing is to identify how
the web application responds to different inputs and to find errors and crashes.
Common Type of Web Application Attacks
• botnet - is a network of computers infected by malware that are under the control of a
single attacking party, known as the “bot-herder.” Each individual machine under the control
of the bot-herder is known as a bot.
Common botnet actions include: email spam and financial breach
Attacker
SYSTEM
Maintaining Productivity
– Cleaning up after an attack diverts resources such as time
and money away from normal activities
Cost of attacks
Importance of Information Security
• Foiling cyberterrorism
– Cyberterrorism
• Attacks by terrorist groups using computer technology and the
Internet
– Utility telecommunications, and financial services companies
are considered prime target of cyberterrorists