Week-3
Week-3
SERVICE (DoS)
ATTACK
Ms. Carol Kate M. Estacio, LPT
Objectives
Determine the organizations business need for
information security;
Identify why a successful information security
program is the responsibility of both an
organization’s general management and IT
management,
Identify the threats posed to information security
and the more common attacks associated with those
threats
What is “DoS
Attack” Denial-of-
Service Attack?
DoS Attack is a malicious attempt by a single
person or a group of people to cause the
victim, site, or node to deny service to its
client.
Penetration
Eavesdropping
Man-In-The-Middle
Flooding
Penetration-the action or process of making a way through or into something.
Eavesdropping-secretly listen to a conversation.
A man-in-the-middle (MitM) attack is a type of cyber attack in which
the attacker secretly intercepts and relays messages between two
parties who believe they are communicating directly with each other.
DoS Attacks Penetration
Firewalls
Switches
Routers
Firewalls block incoming threats based on a set of pre-programmed
rules that also can dictate which users can access specific network
areas.
Most routers come with built-in firewalls, so check your settings to
make sure your router's firewall is turned on.
Most routers come with built-in firewalls, so check your settings to
make sure your router's firewall is turned on.
Malware on
basis of
Actions
Adware (or advertising software) is the term used for various pop-up
advertisements that show up on your computer or mobile device.
Adware Adware has the potential to become
malicious and harm your device by
slowing it down, hijacking your browser
Scareware Scareware
encrypting your files. A criminal group will
is ademand
then
have detected
type of amalware
ransom attack that claims
in exchange for to
a virus or other issue on a device and
decryption.
Rootkits
directs the user to download or buy malicious
software
A common to resolve
rootkit the problem
definition is a type of malware program tha
enables cyber criminals to gain access to and infiltrate data f
Zombies
machines without being detected. It covers software toolboxe
designed to infect computers, give the attacker remote contr
remain hidden for a long period of time.
A Zombie is a malicious program that is installed on a device that
transforms it into a “zombie” that attacks other systems. A computer
or other device transformed by zombie malware is first infected by a
OLD
GENERATION
ATTACKS (still
continue these
days)
Theft of Intellectual property
Identity theft
Theft of equipment and information
Sabotage
Information extortion
NEW
GENERATION
ATTACKS/
THREATS
Technology with weak security
Social Media Attacks
Mobile Malware
Outdated Security Software
Corporate data on Personal devices
Social Engineering