Slide an toàn và hệ thống bảo mật thông tin chapter 2 malicious attacks, threats

39 14 0
Slide an toàn và hệ thống bảo mật thông tin chapter 2 malicious attacks, threats

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

.c om cu u du o ng th an co ng Malicious Attacks CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Contents Malicious Attack 2) Attack Tools 3) The common types of malicious attacks 4) Malicious Software cu u du o ng th an co ng 1) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng 1.Malicious Attack CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack?  An attack on a computer system or network asset succeeds by exploiting a cu u du o ng th an co ng vulnerability in the system CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? ng An attack can consist of all or a combination of these four categories: co a) Fabrications: involve the creation of some deception in order to trick cu u du o ng th an unsuspecting users CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? b) Interceptions: involve eavesdropping on transmissions and redirecting cu u du o ng th an co ng them for unauthorized use CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack?  c) Interruptions: An interruption causes a break in a communication cu u du o ng th an co ng channel, which blocks the transmission of data CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack?  d) Modifications: A modification is the alteration of data contained in cu u du o ng th an co ng transmissions or files CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Attack Tools CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Attack Tools  Protocol analyzers co ng  Port scanners an  OS fingerprint scanners th  Vulnerability scanners  Wardialers cu  Password crackers u du o ng  Exploit software  Keystroke loggers CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Man-in-the-Middle Attacks cu u du o ng th an co them on to their intended destination ng  An attacker intercepts messages between two parties before transferring CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Social Engineering Social engineering involves tricking authorized users into carrying out co ng actions for unauthorized users th an  Phishing du o u  Pretexting cu  Baiting ng  Spear phishing CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Denial of service - DOS  A Denial-of-Service (DoS) attack is an attack meant to shut down a cu u du o ng th an co ng machine or network, making it inaccessible to its intended users Distributed Denial of Service CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Malicious Software CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is Malicious Software?  Malicious software - Malware, commonly known as malware, is any co ng software that brings harm to a computer system th an Malware exists in two main categories: du o ng  Infecting programs: actively attempt to copy themselves to other u computers (Viruses, Worms) cu  Hiding programs: Trojan horses, Rootkits, Spyware CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Viruses  A computer virus is a software program that attaches itself to or copies co ng itself into another program on a computer th an Virus has three parts: ng  Infection mechanism: How a virus spreads du o  Trigger: The means of deciding whether to deliver the payload or not cu u  Payload: What the virus does, besides spread CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Viruses cu u du o ng th an co ng  Phases of virus: CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Viruses CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Viruses CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om WORM  The worm is a standalone program that replicates and sends copies of itself to co ng other computers, generally across a network, without any user input or action an  Self replicating approaches:  File sharing  Remote login cu u  Remote execution du o ng th  Email CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om WORM  Phases: co ng  Dormant th an  Propagation du o u cu  Execution ng  Trigger CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Trojan horses  A Trojan horse, also called a Trojan, is malware that masquerades as a co ng useful program th an  A Trojan is dierent from a virus as it does not copy its code to other hosts cu u du o ng or boot areas CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Rootkits  Collection of attacker tools installed after an intruder has gained access an th  File/process/user hiding tools co ng  Log cleanners du o  Backdoor programs ng  Network sniffer cu u  Rootkits often work with other malware CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Spyware  Spyware is software that aims to gather information about a person or co ng organization without their knowledge, that may send such information to cu u du o ng th an another entity without the consumer's consent CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt ... network and cu u du o ng th an co ng retransmitting them to produce an unauthorized effect CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Man-in-the-Middle Attacks cu u du o ng th an. .. Fingerprint Scanners  An operating system (OS) fingerprint scanner is a software program that co ng allows an attacker to send a variety of packets to an IP host device, hoping th an to determine... ng th an impersonating another computing system CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Address resolution protocol (ARP) poisoning CuuDuongThanCong.com

Ngày đăng: 18/09/2021, 15:53

Tài liệu cùng người dùng

Tài liệu liên quan