Lecture 2B
Lecture 2B
2
COMPROMISES TO
INTELLECTUAL PROPERTY
3
FORCES OF NATURE
Forces of nature, force majeure, or acts of God are dangerous because they are
unexpected and can occur with very little warning
Can disrupt not only the lives of individuals, but also the storage, transmission, and
use of information
Include fire, flood, earthquake, and lightning as well as volcanic eruption and insect
infestation
Since it is not possible to avoid many of these threats, management must implement
controls to limit damage and also prepare contingency plans for continued
operations
4
TECHNICAL HARDWARE FAILURES
OR ERRORS
This category of threats comes from purchasing software with unrevealed faults
Large quantities of computer code are written, debugged, published, and sold only to
determine that not all bugs were resolved
Sometimes, unique combinations of certain software and hardware reveal new bugs
Sometimes, these items aren’t errors, but are purposeful shortcuts left by
programmers for honest or dishonest reasons
6
TECHNOLOGICAL OBSOLESCENCE
7
ATTACKS
8
This kind of attack includes the
MALICIOUS CODE
execution of viruses, worms,
Trojan horses, and active web
scripts with the intent to
destroy or steal information
The state of the art in
attacking systems in 2002 is
the multi-vector worm using
up to six attack vectors to
exploit a variety of
vulnerabilities in commonly
found information system
devices
9
10
ATTACK DESCRIPTIONS
11
ATTACK DESCRIPTIONS
Unprotected Shares - using file shares to copy viral component to all reachable
locations
Mass Mail - sending e-mail infections to addresses found in address book
Simple Network Management Protocol - SNMP vulnerabilities used to
compromise and infect
Hoaxes - A more devious approach to attacking computer systems is the
transmission of a virus hoax, with a real virus attached
12
ATTACK DESCRIPTIONS
Back Doors - Using a known or previously unknown and newly discovered access
mechanism, an attacker can gain access to a system or network resource
Password Crack - Attempting to reverse calculate a password
Brute Force - The application of computing and network resources to try every
possible combination of options of a password
Dictionary - The dictionary password attack narrows the field by selecting specific
accounts to attack and uses a list of commonly used passwords (the dictionary) to
guide guesses
13
ATTACK DESCRIPTIONS
Denial-of-service (DoS) –
attacker sends a large number of connection or information requests to a target
so many requests are made that the target system cannot handle them
successfully along with other, legitimate requests for service
may result in a system crash, or merely an inability to perform ordinary functions
Distributed Denial-of-service (DDoS) - an attack in which a
coordinated stream of requests is launched against a target from many
locations at the same time
14
15
ATTACK DESCRIPTIONS
19
ATTACK DESCRIPTIONS
“People are the weakest link.You can have the best technology; firewalls,
intrusion-detection systems, biometric devices ... and somebody can call
an unsuspecting employee. That's all she wrote, baby. They got
everything.”
“brick attack” – the best configured firewall in the world can’t stand up
to a well placed brick
20
ATTACK DESCRIPTIONS
Buffer Overflow –
application error occurs when more data is sent to a buffer than it
can handle
when the buffer overflows, the attacker can make the target system
execute instructions, or the attacker can take advantage of some
other unintended consequence of the failure
Usually the attacker fill the overflow buffer with executable program
code to elevate the attacker’s permission to that of an administrator.
21
ATTACK DESCRIPTIONS
Ping of Death Attacks --
A type of DoS attack
Attacker creates an ICMP packet that is larger than the maximum
allowed 65,535 bytes.
The large packet is fragmented into smaller packets and reassembled at
its destination.
Destination user cannot handle the reassembled oversized packet,
thereby causing the system to crash or freeze.
22
ATTACK DESCRIPTIONS
Timing Attack –
relatively new
works by exploring the contents of a web browser’s cache
can allow collection of information on access to password-protected sites
another attack by the same name involves attempting to intercept cryptographic
elements to determine keys and encryption algorithms
23
SUMMARY
Unlike any other aspect of IT, information security’s primary mission to ensure
things stay the way they are
Information security performs four important functions:
25
READINGS AND ASSIGNMENT
Check out the following White House site for the document on “The National Strategy to Secure
Cyberspace”
http://www.whitehouse.gov/pcipb/priority_1.pdf
As your hand-in exercise:
read this document
Using a minimum of about 3 pages ( double spaced) write about how this document enhances national
security.
Due February 1, 2007.
Must have a cover page with a title, class, and name
Must have references.
26