CH2 CS Lecture
CH2 CS Lecture
CH2 CS Lecture
By: Getaneh T.
Computer Threats
Computer threats refer to various
malicious activities and risks that can
compromise the security and integrity of
computer systems, networks, and data.
Computer Security
Key objectives:
confidentiality
integrity
availability
Confidentiality
term covers two related concepts:
Data
• assures that private or confidential information is
not made available or disclosed to unauthorized
individuals
Privacy
• assures that individuals control or influence what
information related to them may be collected and
stored and by whom and to whom that information
may be disclosed
Integrity
term covers two related concepts:
Data integrity
• assures that information and programs are
changed only in a specified and authorized manner
System integrity
• assures that a system performs its intended
function in an unimpaired manner, free from
deliberate or inadvertent unauthorized
manipulation of the system
Availability
assures that
systems work
promptly and
service is not
denied to
authorized users
Loss of Security
The loss of security in each category:
Confidentiality
• unauthorized disclosure of information
Integrity
• unauthorized modification or destruction of
information
Availability
• disruption of access to or use of information or an
information system
Additional Security Objectives
Some information security professionals
feel that two more objectives need to be
added:
Authenticity
• being genuine and able to be verified and trusted
Accountability
• actions of an entity can be traced uniquely to that
entity
• non-repudiation
Computer and Network Assets,
with Examples of Threats
Availability Confidentiality Integrity
Equipment is stolen or
Hardware disabled, thus denying
service.
A working program is
modified, either to
Programs are deleted, An unauthorized copy cause it to fail during
Software
denying access to users. of software is made. execution or to cause it
to do some unintended
task.
An unauthorized read
of data is performed. Existing files are
Files are deleted,
Data An analysis of modified or new files
denying access to users.
statistical data reveals are fabricated.
underlying data.
Messages are destroyed Messages are modified,
or deleted. Messages are read. The delayed, reordered, or
Communication
Communication lines traffic pattern of duplicated. False
Lines
or networks are messages is observed. messages are
rendered unavailable. fabricated.
Hardware
most vulnerable to attack
least susceptible to automated controls
threats
accidental damage
intentional damage
theft
Software
includes operating system, utilities and
application programs
key threats:
easy to delete
can be modified
incorrect but
destruction of unauthorized
theft of files intentional
files reading of files
analysis of data
Communication Lines &
Networks
Network Security attack classification:
Back Doors
Buffer Overflow
Password
Compromise
Root Kits
Social Engineering
Class of attacks
Attacks can be classified into various
categories based on different criteria. Here
are some common classifications of
attacks:
1. Network Attacks:
1. Denial of Service (DoS) Attack
2. Distributed Denial of Service (DDoS) Attack
3. Man-in-the-Middle (MitM) Attack
4. Packet Sniffing
5. IP Spoofing
6. Port Scanning
7. ARP Poisoning
Class of attacks
Malware Attacks:
Viruses
Worms
Trojans
Ransomware
Spyware
Adware
Botnets
Class of attacks
1. Social Engineering Attacks:
1. Phishing
2. Spear Phishing
3. Whaling
4. Vishing (Voice Phishing)
5. Smishing (SMS Phishing)
6. Pretexting
7. Baiting
8. Shoulder Surfing
Class of attacks
Web Application Attacks:
SQL Injection
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
Clickjacking
Remote File Inclusion (RFI)
Local File Inclusion (LFI)
Server-Side Request Forgery (SSRF)
XML External Entity (XXE) Attack
Class of attacks
1. Wireless Attacks:
1. Wi-Fi Eavesdropping
2. Wi-Fi Password Cracking
3. Evil Twin Attack
4. Rogue Access Point
5. Wi-Fi Deauthentication Attack
6. Bluetooth Hacking
7. Near Field Communication (NFC) Attacks
Class of attacks
1. Physical Attacks:
1. Theft of Devices
2. Tampering with Hardware
3. Dumpster Diving
4. Tailgating (Unauthorized Access)
5. Shoulder Surfing
6. Skimming (Credit Card or ATM)
Class of attacks
1. Insider Attacks:
1. Insider Threats
2. Unauthorized Access by Employees
3. Data Theft or Leakage
4. Sabotage
5. Fraudulent Activities
Malicious Software
Terminology
Backdoor (trapdoor) Any mechanisms that bypasses a normal security check; it may allow
unauthorized access to functionality.
Mobile code Software (e.g., script, macro, or other portable instruction) that can be
of
shipped unchanged to a heterogeneous collection of platforms and
execute with identical semantics.
Exploits Code specific to a single vulnerability or set of vulnerabilities.
Downloaders
Auto-rooter
Program that installs other items on a machine that is under attack.
Usually, a downloader is sent in an e-mail.
Malicious hacker tools used to break into new machines remotely.
Malicious
Kit (virus generator)
Spammer programs
Set of tools for generating new viruses automatically.
Used to send large volumes of unwanted e-mail.
Programs
Flooders Used to attack networked computer systems with a large volume of
traffic to carry out a denial-of-service (DoS) attack.
Keyloggers Captures keystrokes on a compromised system.
Rootkit Set of hacker tools used after attacker has broken into a computer
system and gained root-level access.
Zombie, bot Program activated on an infected machine that is activated to launch
attacks on other machines.
Spyware Software that collects information from a computer and transmits it to
another system.
Adware Advertising that is integrated into software. It can result in pop-up ads or
redirection of a browser to a commercial site.
Backdoor
trapdoor
is a secret entry point into a program that can
allow unauthorized access to the data
backdoors are common among the programming
community and are used for a variety of
maintenance tasks (maintenance hook)
it is important to not allow backdoors into
production environments
Logic Bomb BOOM
BOOM
Trojan Horse
program that contains hidden code that, when invoked,
causes harm to the system or system infrastructure it
was launched from
• infection
has mechanism
three • trigger
parts
• payload
Virus Lifecycle
• Virus is
activated
Propagation to perform Execution
• The function
virus is • The virus for which
idle and places a it was • Virus
waiting copy of intended function is
Dormant itself into performed
Trigger
other
programs
Worms
self replicating – usually very quickly
usually performs some unwanted function
actively seeks out more machines to infect
Self Replicating
Vehicles
• Email
• Remote Execution
• Remote Login
Worms
In the propagation Phases
phase the Worm will
Propagation
establish remote
connections Trigger