Information Security College of Informatics Sulaimani Polytechnic University 2019-2020
Information Security College of Informatics Sulaimani Polytechnic University 2019-2020
College of Informatics
Sulaimani Polytechnic University
2019-2020
e-mail: [email protected]
Lecture 1
Introduction to Security &
security concepts
1
Information Security #1 Lectured by : Rebaz Najeeb
Today’s class outline
Introduction to infoSec
Administrative
Do you have information that needs to be kept confidential (secret), accurate ($), or
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all
Human being in the modern societies are heavily rely on ICT. (phone ,
1971 , Bob Thomas travels I’M THE CREEPER: CATCH ME IF YOU CAN through on TENEX OS.
Ray Tomlinson , create the same thing but replicating itself , then he made Reaper anti.
1986 , first computer virus (Brain by Basit and Amjad) then ILOVEYOU 2000, code red, Stuxnet.
1988, first computer worm (Morris worm) by Robert Morris, copying itself to fill memory , then mydoom 2004.
infection.
Such as :
DoS
Eavesdropping
Phishing Spoofing
Direct-access
Attackers can deny service to individual victims, such as by deliberately entering a wrong
password enough consecutive times to cause the victim account to be locked, or they may
overload the capabilities of a machine or network and block all users at once.
2015 BBC 602 GbS– GitHub -> 1.3 Tbps , Arbor Networks ->1.7
Information Security #9 Lectured by : Rebaz Najeeb
Know this guy ?
programs such as Carnivore and NarusInSight have been used by the FBI and NSA to
installing software worms, keyloggers, covert listening devices or using wireless mice
3. MAC spoofing, where an attacker modifies the Media Access Control (MAC) address.
Phishing is typically carried out by email spoofing or instant messaging, and it often directs