Untitled
Untitled
Security
- Quality or state of being secure and free from danger or harm
- Actions taken to make someone or something secure
Accounting - Reviews log files to hold subjects accountable for their actions
Nonrepudiation - Ensures that the subject of an activity or event cannot deny that the
(undeniable) event occurred
Security Objectives
Confidentiality - Preserving authorized restrictions on information access and disclosure
- Protecting personal privacy and proprietary information
Least privilege - Users should only have sufficient access privilege that allow them
to perform their assigned work
Security Controls
- The management, operations and technical safeguard or countermeasures employed within
and organization information system
→ To protect the C.I.A of the system and its information
Accuracy - Describes how data is free or errors and has the value that the user
expects
Utility - Describes how data has value or usefulness for an end purpose
Risk Control
- Once the ranked vulnerability risk worksheet is complete
- The organization must choose one of five strategies to control each risk
→ Defense (Protection)
→ Transference (Transfer to someone else to bear the risk)
→ Mitigation (Lower down impact)
→ Acceptance (Take the risk, no control)
→ Termination (Stop the activities, no need to bear the risk)
Expert hackers
- Develop software scripts and program exploits
- Usually a master of many skills
- Will often create attack software and share with others
Unskilled hackers
- More unskilled hackers than expert hackers
- Use expert hacker’s written software to exploit a system
- Usually do not fully understand the systems they hack
Password attacks
- Cracking
- Brute force
- Dictionary
- Rainbow tables
- Social engineering
Social Engineering
- People are the weakest link
- Even if you have the best technology → firewalls, intrusion-detection system
- Advance-fee fraud → Money and small advance fee or personal banking inforamtion
- Phishing → attempt to gain personal confidential information that redirects user to
theird-party site by having embedded code within the mail
Software Attacks
- Malware is used to gain access to protected systems via hidden means
- Occur when an individual design and deploy software to attack a system
- Types of attacks include:
→ Back door
=>
→ Denial-of-service (DoS)
=>
Back door - Gaining accessto system using known or newly discovered access
mechanism
Mail bombing (also - Routes large amount of email to target to overwhelm the receiver
a DoS)
Pharming - An attack that redirect the users to a fake site for the purpose of
obtaining private information
Man-in-the-middle - Attacker monitors the network packets, modifies them, and inserts
them back into the network.
- An attack that perform between the target user and the server