1. Trang chủ
  2. » Cao đẳng - Đại học

Slide an toàn và hệ thống bảo mật thông tin chapter 2 malicious attacks, threats

39 14 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Malicious Attacks, Threats
Định dạng
Số trang 39
Dung lượng 1,24 MB

Nội dung

.c om cu u du o ng th an co ng Malicious Attacks CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Contents Malicious Attack 2) Attack Tools 3) The common types of malicious attacks 4) Malicious Software cu u du o ng th an co ng 1) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng 1.Malicious Attack CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack?  An attack on a computer system or network asset succeeds by exploiting a cu u du o ng th an co ng vulnerability in the system CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? ng An attack can consist of all or a combination of these four categories: co a) Fabrications: involve the creation of some deception in order to trick cu u du o ng th an unsuspecting users CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? b) Interceptions: involve eavesdropping on transmissions and redirecting cu u du o ng th an co ng them for unauthorized use CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack?  c) Interruptions: An interruption causes a break in a communication cu u du o ng th an co ng channel, which blocks the transmission of data CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack?  d) Modifications: A modification is the alteration of data contained in cu u du o ng th an co ng transmissions or files CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Attack Tools CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Attack Tools  Protocol analyzers co ng  Port scanners an  OS fingerprint scanners th  Vulnerability scanners  Wardialers cu  Password crackers u du o ng  Exploit software  Keystroke loggers CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Man-in-the-Middle Attacks cu u du o ng th an co them on to their intended destination ng  An attacker intercepts messages between two parties before transferring CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Social Engineering Social engineering involves tricking authorized users into carrying out co ng actions for unauthorized users th an  Phishing du o u  Pretexting cu  Baiting ng  Spear phishing CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Denial of service - DOS  A Denial-of-Service (DoS) attack is an attack meant to shut down a cu u du o ng th an co ng machine or network, making it inaccessible to its intended users Distributed Denial of Service CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Malicious Software CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is Malicious Software?  Malicious software - Malware, commonly known as malware, is any co ng software that brings harm to a computer system th an Malware exists in two main categories: du o ng  Infecting programs: actively attempt to copy themselves to other u computers (Viruses, Worms) cu  Hiding programs: Trojan horses, Rootkits, Spyware CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Viruses  A computer virus is a software program that attaches itself to or copies co ng itself into another program on a computer th an Virus has three parts: ng  Infection mechanism: How a virus spreads du o  Trigger: The means of deciding whether to deliver the payload or not cu u  Payload: What the virus does, besides spread CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Viruses cu u du o ng th an co ng  Phases of virus: CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Viruses CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Viruses CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om WORM  The worm is a standalone program that replicates and sends copies of itself to co ng other computers, generally across a network, without any user input or action an  Self replicating approaches:  File sharing  Remote login cu u  Remote execution du o ng th  Email CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om WORM  Phases: co ng  Dormant th an  Propagation du o u cu  Execution ng  Trigger CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Trojan horses  A Trojan horse, also called a Trojan, is malware that masquerades as a co ng useful program th an  A Trojan is dierent from a virus as it does not copy its code to other hosts cu u du o ng or boot areas CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Rootkits  Collection of attacker tools installed after an intruder has gained access an th  File/process/user hiding tools co ng  Log cleanners du o  Backdoor programs ng  Network sniffer cu u  Rootkits often work with other malware CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Spyware  Spyware is software that aims to gather information about a person or co ng organization without their knowledge, that may send such information to cu u du o ng th an another entity without the consumer's consent CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt ... network and cu u du o ng th an co ng retransmitting them to produce an unauthorized effect CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Man-in-the-Middle Attacks cu u du o ng th an. .. Fingerprint Scanners  An operating system (OS) fingerprint scanner is a software program that co ng allows an attacker to send a variety of packets to an IP host device, hoping th an to determine... ng th an impersonating another computing system CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Address resolution protocol (ARP) poisoning CuuDuongThanCong.com

Ngày đăng: 18/09/2021, 15:53

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN