SlideShare a Scribd company logo
Cyber Security
By
Gaurav Singh
• The only system which is truly secure is one which is switched off and
unplugged, locked in a titanium safe, buried in a concrete bunker, and
is surrounded by nerve gas and very highly paid armed guards. Even
then, I wouldn’t stake my life on it.
(By Professor Gene Spafford)
Need For Cyber Security
• Advances in information and communications technologies have
revolutionised government, scientific , educational and commercial
infrastructures.
• The IT infrastructure has become integral part of the critical infrastructure
which supports national capabilities such as power grids, emergency
communication systems, financial systems , defence systems and air traffic
control networks. The operational stability and security of critical
information infrastructure is vital for economic security of the country.
• It also enables large scale processes through out the economy by
facilitating complex interactions among individuals, organisations and
systems across global networks for trade and economic requirements.
Contd
• Increasing complexity of IT systems and networks will mount security
challenges for both providers and consumers.
• The evolving nature of the telecommunications infrastructure, as the
traditional phone systems and IT networks converge into a more
unified architecture.
• The expanding wireless connectivity to individual computers and
networks making it increasingly difficult to determine the physical
and logical boundaries of networks.
• The increasing interconnectivity and accessibility (and consequently
risk) to computer based systems that are critical to country’s
economy.
Security Trends
• Increasing complexity of IT systems and networks will mount security
challenges for both providers and consumers.
• The evolving nature of the telecommunications infrastructure, as the
traditional phone systems and IT networks converge into a more
unified architecture.
• The expanding wireless connectivity to individual computers and
networks making it increasingly difficult to determine the physical
and logical boundaries of networks.
• The increasing interconnectivity and accessibility (and consequently
risk) to computer based systems that are critical to country’s
economy.
Threats : National Security
• Increasing complexity of IT systems and networks will mount security
challenges for both providers and consumers.
• The evolving nature of the telecommunications infrastructure, as the
traditional phone systems and IT networks converge into a more
unified architecture.
• The expanding wireless connectivity to individual computers and
networks making it increasingly difficult to determine the physical
and logical boundaries of networks.
• The increasing interconnectivity and accessibility (and consequently
risk) to computer based systems that are critical to country’s
economy.
Threats : Public
Online services are becoming prime targets for cyber criminals
• Cyber criminals continue to refine their means of deceit as well as their victims In summary, the global threats
affecting users are:
 New & sophisticated forms of attacks.
 Attacks targeting new technologies, such as VoIP (vishing – phishing via VoIP & phreaking – hacking tel
networks to make free long distance calls) and peer-to-peer services.
 Attacks targeting online social networks.
 Attacks targeting online services, particularly online banking services.
• There is a new level of complexity in malware not seen before. These are more resilient, are modified over and
over again and contain highly sophisticated functionality such as encryption (Ex. Nuwar also known as ‘Zhelatin’
and ‘Storm’ worm’ – with a new variant appearing almost daily)
• As a trend we will see an increase in threats that hijack PCs with bots. Another challenging trend is the arrival of
self-modifying threats
• Given the exponential growth in social networking sites, social engineering may shortly become the easiest &
quickest way to commit ID theft
Hi-Tech Crime is a Growing Market
The market is growing for zero-day threats & tools for cyber crime
• With so many PCs now infected (around 5 % of all global machines are zombies), competition to supply
botnets has become intense. The cost of renting a platform for spamming is now around $ 3 - 7 Cents per
zombie per week.
• A budget as little as $ 25 to $ 1500 USD can buy you a trojan that is built to steal credit card data and mail it
you. Malware is being custom written to target specific companies and agencies.
• Computer skills are no longer necessary to execute cyber crime. On the flip side malware writers today need
not commit crimes themselves. People can subscribe to the tools that can keep them updated with latest
vulnerabilities and even test themselves against security solutions (Ex. MPACK pr Pinch include support
service).
• The black market for stolen data (Ex. Credit cards, e-mails, skype accounts etc) is now well established and
the cost of obtaining credit cards is upwards of $ 5 USD.
• Another black market that is causing alarm to Govts is that of Zero-day exploits. In Jan 2006 a Microsoft
WMF (windows meta file) exploit was sold for $ 4000 USD.
• Competition is so intense among cyber criminals that ‘customer service’ has now become a specific selling
point
Possible Future
Trends suggest an increase in safe havens for cyber criminals and hence
the need for International cooperation arrangements.
• It is an inevitable that some countries will become safe havens for
cyber criminals and international pressure to crack down won’t work
well.
• It is believed that in next few years Govts are likely to get aggressive
and pursue action against the specific individuals/groups/companies,
regardless of location.
• It is also likely that Govts will start putting pressure on intermediary
bodies that have the skills and resources, such as banks, ISPs and
software vendors to protect the public from malware, hacking and
social engineering.
• We may see industry sector codes of practice demanding improved
security measures, backed probably by assurance and insurance
schemes.
• Greater connectivity, more embedded systems and less obvious
perimeters.
• Compliance regulations will drive upgrades and changes and also
increase system complexity and legal wrangles – increase in civil suits
for security breaches.
• Massive data storing patterns that ensure data never goes away – a
boon to law enforcement agencies .
• As of now, cyber criminals seem to have no real threat of prosecution.
Our job is to create a climate of fear of effective prosecution, as in
other types of crime.
Categories of Cyber Crime
• We may see industry sector codes of practice demanding improved
security measures, backed probably by assurance and insurance
schemes.
• Greater connectivity, more embedded systems and less obvious
perimeters.
• Compliance regulations will drive upgrades and changes and also
increase system complexity and legal wrangles – increase in civil suits
for security breaches.
• Massive data storing patterns that ensure data never goes away – a
boon to law enforcement agencies .
• As of now, cyber criminals seem to have no real threat of prosecution.
Our job is to create a climate of fear of effective prosecution, as in
other types of crime.
Common Methods of Cyber Crime
• Hacking – Unauthorised attempts to bypass the security mechanism
of an information system or network.
• Data theft ( using flash/pen drives, digital cameras).
• Virus or worms, Malware or Trojan horses.
• Identity Theft
• E- mail spoofing
• Botnets and Zombies
• Scareware
Cybercrime Components
• Computers
• Cell Phones
• PDA’s
• Game Consoles
Basic Principles of Cyber Security
• Confidentiality: Information which is sensitive or confidential must
remain so and be shared only with appropriate users. For example,
our confidential medical records should be released only to those
people or organizations (i.e. doctor, hospital, insurance, government
agency, you) authorized to see it.
• Integrity: Information must retain its integrity and not be altered
from its original state. The records should be well protected so that no
one can change the information without authorization.
• Availability: Information and systems must be available to those who
need it. The records should be available and accessible to authorized
users.
Computer Security
Computer Security - Threats
• Malware
• Software that has a malicious purpose
• Viruses
• Trojan horse
• Spyware
Computer Security - Threats
• Intrusions
• Any attempt to gain unauthorized access to a system
• Cracking
• Hacking
• Social Engineering
• War-driving
Computer Security - Threats
• Denial-of-Service (DOS)
• Prevention of legitimate access to systems
• Also Distributed-Denial-of-Service (DDoS)
• Different types:
• Ping-of-Death
• Teardrop
• Smurf
• SYN
Computer Security - Threats
Figure 1.1 – DoS and DDoS Models
Computer Security - Terminology
• People
• Hackers
• White Hat – Good guys. Report hacks/vulnerabilities to appropriate people
• Black Hat – Only interested in personal goals, regardless of impact.
• Gray Hat – Somewhere in between.
Computer Security - Terminology
• Script Kiddies
• Someone that calls themselves a ‘hacker’ but really isn’t
• Ethical Hacker
• Someone hired to hack a system to find vulnerabilities and report on them.
• Also called a ‘sneaker’
Computer Security - Terminology
• Security Devices
• Firewall
• Barrier between network and the outside world.
• Proxy server
• Sits between users and server. Two main functions are to improve performance and
filter requests.
• Intrusion Detection Systems (IDS)
• Monitors network traffic for suspicious activity.
Computer Security - Terminology
• Activities
• Phreaking
• Breaking into telephone systems (used in conjunction with war-dialing)
• Authentication
• Determines whether credentials are authorized to access a resource
• Auditing
• Reviewing logs, records, or procedures for compliance with standards
Computer Security - Careers
• Information Security Analyst
US National Average Salary

More Related Content

PDF
Cyber Security
Tushar Nikam
 
PPTX
Cyber security by Anushka Jha
Anushka Jha
 
PPTX
Cyber security
MurugesanMurugesan12
 
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
PPTX
cyber security PPT
Nitesh Dubey
 
PPTX
Cyber security Information security
AYESHA JAVED
 
PPTX
Introduction to cyber security amos
Amos Oyoo
 
PPTX
Cyber security
manoj duli
 
Cyber Security
Tushar Nikam
 
Cyber security by Anushka Jha
Anushka Jha
 
Cyber security
MurugesanMurugesan12
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
cyber security PPT
Nitesh Dubey
 
Cyber security Information security
AYESHA JAVED
 
Introduction to cyber security amos
Amos Oyoo
 
Cyber security
manoj duli
 

What's hot (20)

PPTX
Cyber security
Sachith Lekamge
 
PPTX
Cyber security system presentation
A.S. Sabuj
 
PPTX
Cyber Security Presentation
HaniyaMaha
 
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
PPTX
Pranavi verma-cyber-security-ppt
PranaviVerma
 
PPTX
CYBER SECURITY
PranjalShah18
 
PDF
cyber-security course outline
ShoaibBhattiM
 
PPTX
Cyber security & awareness
Rishab garg
 
PPTX
Cyber security
Manjushree Mashal
 
PPTX
Cyber security presentation
Parab Mishra
 
PPTX
Cyber security
Pihu Goel
 
PPTX
Cyber security
Rishav Sadhu
 
PPTX
Cyber security
Sapna Patil
 
PPTX
cyber security presentation.pptx
kishore golla
 
PPTX
CYBER SECURITY
Mohammad Shakirul islam
 
PPTX
Cyber security
Shivaani srinivas iyer
 
PPTX
Cyber Security Terms
Suryaprakash Nehra
 
PPTX
Web Security
Tripad M
 
PPT
Home cyber security
Michael File
 
PPTX
Cyber security ppt
DebrajKarmakar
 
Cyber security
Sachith Lekamge
 
Cyber security system presentation
A.S. Sabuj
 
Cyber Security Presentation
HaniyaMaha
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Pranavi verma-cyber-security-ppt
PranaviVerma
 
CYBER SECURITY
PranjalShah18
 
cyber-security course outline
ShoaibBhattiM
 
Cyber security & awareness
Rishab garg
 
Cyber security
Manjushree Mashal
 
Cyber security presentation
Parab Mishra
 
Cyber security
Pihu Goel
 
Cyber security
Rishav Sadhu
 
Cyber security
Sapna Patil
 
cyber security presentation.pptx
kishore golla
 
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber security
Shivaani srinivas iyer
 
Cyber Security Terms
Suryaprakash Nehra
 
Web Security
Tripad M
 
Home cyber security
Michael File
 
Cyber security ppt
DebrajKarmakar
 
Ad

Similar to Cyber security by Gaurav Singh (20)

PPTX
Brooks18
Chuck Brooks
 
PDF
Presentation 10 (1).pdf
KARANSINGHD
 
PDF
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
PPTX
A Wake-Up Call for IoT
Ahmed Banafa
 
PPTX
Introduction Of Cyber Security in 2024.pptx
shivjohncena789
 
PPTX
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
PDF
Cyber Security Notes Unit 1 for Engineering
nctitacademic
 
PPTX
Cyber Security – Indian Perspective.pptx
SharifulShishir
 
PPTX
CYBERSECURITY AND PRIVACY ENHANCEMENTS.pptx
DaveCalapis3
 
PPTX
Introduction to computer forensic in IT World
norhasiahakhir1
 
PPTX
Cyber terrorism
Hiren Selani
 
PPTX
chapter1 Introduction to Software Security.pptx
Lina Shimelis
 
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
PDF
CyberSecurityConclaveAtVigyanBhavanDelhi_1.pdf
gejamienterprises
 
PDF
Lecture5
Majid Taghiloo
 
PPTX
Cyber Security in Society
Rubal Sagwal
 
PDF
C018131821
IOSR Journals
 
DOCX
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
SoniChandan
 
PPTX
M1_Introduction_IPS.pptx
imanuelantoniussohir
 
Brooks18
Chuck Brooks
 
Presentation 10 (1).pdf
KARANSINGHD
 
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
A Wake-Up Call for IoT
Ahmed Banafa
 
Introduction Of Cyber Security in 2024.pptx
shivjohncena789
 
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
Cyber Security Notes Unit 1 for Engineering
nctitacademic
 
Cyber Security – Indian Perspective.pptx
SharifulShishir
 
CYBERSECURITY AND PRIVACY ENHANCEMENTS.pptx
DaveCalapis3
 
Introduction to computer forensic in IT World
norhasiahakhir1
 
Cyber terrorism
Hiren Selani
 
chapter1 Introduction to Software Security.pptx
Lina Shimelis
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
CyberSecurityConclaveAtVigyanBhavanDelhi_1.pdf
gejamienterprises
 
Lecture5
Majid Taghiloo
 
Cyber Security in Society
Rubal Sagwal
 
C018131821
IOSR Journals
 
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
SoniChandan
 
M1_Introduction_IPS.pptx
imanuelantoniussohir
 
Ad

Recently uploaded (20)

PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPT
Transformaciones de las funciones elementales.ppt
rirosel211
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PPTX
Parallel & Concurrent ...
yashpavasiya892
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PDF
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PDF
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
PPTX
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
PPTX
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PPTX
AI ad its imp i military life read it ag
ShwetaBharti31
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
Transformaciones de las funciones elementales.ppt
rirosel211
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
Different Generation Of Computers .pptx
divcoder9507
 
Parallel & Concurrent ...
yashpavasiya892
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
AI ad its imp i military life read it ag
ShwetaBharti31
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 

Cyber security by Gaurav Singh

  • 2. • The only system which is truly secure is one which is switched off and unplugged, locked in a titanium safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn’t stake my life on it. (By Professor Gene Spafford)
  • 3. Need For Cyber Security • Advances in information and communications technologies have revolutionised government, scientific , educational and commercial infrastructures. • The IT infrastructure has become integral part of the critical infrastructure which supports national capabilities such as power grids, emergency communication systems, financial systems , defence systems and air traffic control networks. The operational stability and security of critical information infrastructure is vital for economic security of the country. • It also enables large scale processes through out the economy by facilitating complex interactions among individuals, organisations and systems across global networks for trade and economic requirements.
  • 4. Contd • Increasing complexity of IT systems and networks will mount security challenges for both providers and consumers. • The evolving nature of the telecommunications infrastructure, as the traditional phone systems and IT networks converge into a more unified architecture. • The expanding wireless connectivity to individual computers and networks making it increasingly difficult to determine the physical and logical boundaries of networks. • The increasing interconnectivity and accessibility (and consequently risk) to computer based systems that are critical to country’s economy.
  • 5. Security Trends • Increasing complexity of IT systems and networks will mount security challenges for both providers and consumers. • The evolving nature of the telecommunications infrastructure, as the traditional phone systems and IT networks converge into a more unified architecture. • The expanding wireless connectivity to individual computers and networks making it increasingly difficult to determine the physical and logical boundaries of networks. • The increasing interconnectivity and accessibility (and consequently risk) to computer based systems that are critical to country’s economy.
  • 6. Threats : National Security • Increasing complexity of IT systems and networks will mount security challenges for both providers and consumers. • The evolving nature of the telecommunications infrastructure, as the traditional phone systems and IT networks converge into a more unified architecture. • The expanding wireless connectivity to individual computers and networks making it increasingly difficult to determine the physical and logical boundaries of networks. • The increasing interconnectivity and accessibility (and consequently risk) to computer based systems that are critical to country’s economy.
  • 7. Threats : Public Online services are becoming prime targets for cyber criminals • Cyber criminals continue to refine their means of deceit as well as their victims In summary, the global threats affecting users are:  New & sophisticated forms of attacks.  Attacks targeting new technologies, such as VoIP (vishing – phishing via VoIP & phreaking – hacking tel networks to make free long distance calls) and peer-to-peer services.  Attacks targeting online social networks.  Attacks targeting online services, particularly online banking services. • There is a new level of complexity in malware not seen before. These are more resilient, are modified over and over again and contain highly sophisticated functionality such as encryption (Ex. Nuwar also known as ‘Zhelatin’ and ‘Storm’ worm’ – with a new variant appearing almost daily) • As a trend we will see an increase in threats that hijack PCs with bots. Another challenging trend is the arrival of self-modifying threats • Given the exponential growth in social networking sites, social engineering may shortly become the easiest & quickest way to commit ID theft
  • 8. Hi-Tech Crime is a Growing Market The market is growing for zero-day threats & tools for cyber crime • With so many PCs now infected (around 5 % of all global machines are zombies), competition to supply botnets has become intense. The cost of renting a platform for spamming is now around $ 3 - 7 Cents per zombie per week. • A budget as little as $ 25 to $ 1500 USD can buy you a trojan that is built to steal credit card data and mail it you. Malware is being custom written to target specific companies and agencies. • Computer skills are no longer necessary to execute cyber crime. On the flip side malware writers today need not commit crimes themselves. People can subscribe to the tools that can keep them updated with latest vulnerabilities and even test themselves against security solutions (Ex. MPACK pr Pinch include support service). • The black market for stolen data (Ex. Credit cards, e-mails, skype accounts etc) is now well established and the cost of obtaining credit cards is upwards of $ 5 USD. • Another black market that is causing alarm to Govts is that of Zero-day exploits. In Jan 2006 a Microsoft WMF (windows meta file) exploit was sold for $ 4000 USD. • Competition is so intense among cyber criminals that ‘customer service’ has now become a specific selling point
  • 9. Possible Future Trends suggest an increase in safe havens for cyber criminals and hence the need for International cooperation arrangements. • It is an inevitable that some countries will become safe havens for cyber criminals and international pressure to crack down won’t work well. • It is believed that in next few years Govts are likely to get aggressive and pursue action against the specific individuals/groups/companies, regardless of location. • It is also likely that Govts will start putting pressure on intermediary bodies that have the skills and resources, such as banks, ISPs and software vendors to protect the public from malware, hacking and social engineering.
  • 10. • We may see industry sector codes of practice demanding improved security measures, backed probably by assurance and insurance schemes. • Greater connectivity, more embedded systems and less obvious perimeters. • Compliance regulations will drive upgrades and changes and also increase system complexity and legal wrangles – increase in civil suits for security breaches. • Massive data storing patterns that ensure data never goes away – a boon to law enforcement agencies . • As of now, cyber criminals seem to have no real threat of prosecution. Our job is to create a climate of fear of effective prosecution, as in other types of crime.
  • 11. Categories of Cyber Crime • We may see industry sector codes of practice demanding improved security measures, backed probably by assurance and insurance schemes. • Greater connectivity, more embedded systems and less obvious perimeters. • Compliance regulations will drive upgrades and changes and also increase system complexity and legal wrangles – increase in civil suits for security breaches. • Massive data storing patterns that ensure data never goes away – a boon to law enforcement agencies . • As of now, cyber criminals seem to have no real threat of prosecution. Our job is to create a climate of fear of effective prosecution, as in other types of crime.
  • 12. Common Methods of Cyber Crime • Hacking – Unauthorised attempts to bypass the security mechanism of an information system or network. • Data theft ( using flash/pen drives, digital cameras). • Virus or worms, Malware or Trojan horses. • Identity Theft • E- mail spoofing • Botnets and Zombies • Scareware
  • 13. Cybercrime Components • Computers • Cell Phones • PDA’s • Game Consoles
  • 14. Basic Principles of Cyber Security • Confidentiality: Information which is sensitive or confidential must remain so and be shared only with appropriate users. For example, our confidential medical records should be released only to those people or organizations (i.e. doctor, hospital, insurance, government agency, you) authorized to see it. • Integrity: Information must retain its integrity and not be altered from its original state. The records should be well protected so that no one can change the information without authorization. • Availability: Information and systems must be available to those who need it. The records should be available and accessible to authorized users.
  • 16. Computer Security - Threats • Malware • Software that has a malicious purpose • Viruses • Trojan horse • Spyware
  • 17. Computer Security - Threats • Intrusions • Any attempt to gain unauthorized access to a system • Cracking • Hacking • Social Engineering • War-driving
  • 18. Computer Security - Threats • Denial-of-Service (DOS) • Prevention of legitimate access to systems • Also Distributed-Denial-of-Service (DDoS) • Different types: • Ping-of-Death • Teardrop • Smurf • SYN
  • 19. Computer Security - Threats Figure 1.1 – DoS and DDoS Models
  • 20. Computer Security - Terminology • People • Hackers • White Hat – Good guys. Report hacks/vulnerabilities to appropriate people • Black Hat – Only interested in personal goals, regardless of impact. • Gray Hat – Somewhere in between.
  • 21. Computer Security - Terminology • Script Kiddies • Someone that calls themselves a ‘hacker’ but really isn’t • Ethical Hacker • Someone hired to hack a system to find vulnerabilities and report on them. • Also called a ‘sneaker’
  • 22. Computer Security - Terminology • Security Devices • Firewall • Barrier between network and the outside world. • Proxy server • Sits between users and server. Two main functions are to improve performance and filter requests. • Intrusion Detection Systems (IDS) • Monitors network traffic for suspicious activity.
  • 23. Computer Security - Terminology • Activities • Phreaking • Breaking into telephone systems (used in conjunction with war-dialing) • Authentication • Determines whether credentials are authorized to access a resource • Auditing • Reviewing logs, records, or procedures for compliance with standards
  • 24. Computer Security - Careers • Information Security Analyst US National Average Salary