Nis Is Unit1
Nis Is Unit1
• Sequence of actions,
• Exploiting weak points…….until attackers' goal is
not completed,
• Risk is calculated as
• Assets
• In computer security assets are any data,
device, other component
• Assets are identified and valued
• Asset can be - hardware, software, confidential
information
• E.g. server, switches, support system
• Valuation of assets :
• Hardware – easy to evaluate.
• Data and information – difficult to evaluate – leaked
information is indirect loss.
• used to determine potential direct and indirect costs to the company based
on value of assets and their exposure to risk.
• For example –
• Categories of threats:
• Disclosure: disclosure of confidential information
• It is a piece of code.
• overwriting virus
• overwrites the code with its own code.
• Stealth virus
• Virus who hides the modifications made in the file or boot record.
• Macro virus
• These are not executable.
• They affect Microsoft word like documents
• They can spread through email.
• Polymorphic virus
• It produces fully operational copies of itself- in an
attempt to avoid signature detection.
• Companion virus
• It creates a new program instead of modifying an
existing file.
• Email virus
• Virus gets executed when email attachment is open
by recipient
• Virus sends itself to everyone on the mailing list of
senders
• Metamorphic virus
• It keeps rewriting itself every time.
• It may change their behavior as well as appearance
code.
• Dealing with Viruses
• There is no direct way to test/find the hidden code but we can
attempt to detect, identify and remove viruses.
collection.
• Intruder attack ranges from simple (just checking data)
• Active attacks
• Active attacks
system.
Operating System.
phase).
introduced.
• Hackers often plant a backdoor on previously
reliable manner.
• Sniffing
• Email Text
• Files in Transfer
• Network Sniffing
• a network sniffer is software or hardware device that is used
to observe traffic as- it passes through a network on shared
broadcast media.
• Junk mails.
URL XYZ.Corp.com
• An individual receiving a message from the spoofed
portion of packet.
on that network
system.
• An attacker can take advantage of this by sending a
• Here one benefit to attacker is that the doesn’t have to avoid any
ciphertext,
• For example, a key where all bits are 0's will result
the ciphertext that is the same as the original
plaintext. That means this will be a weak key for
this encryption algorithm.
• Any key with long strings of 0's will yield portions of the
ciphertext that are same as the plaintext. In this
example, there will be many keys that can be considered
as a weak key.
• Every bit that is added to the length of a key doubles the number
of keys those have to be tested in brute force attack on the
encryption.
• Indirect Attacks
• Common way of attacking is to find weaknesses in mechanisms in
the cryptography.
Quickly.
• Patch
• A large software update that may address several or many
software problems.
active internet connection is required for => both web based and
automatic updates.
• By registering your system and user profile with Red Hat, you can
get a customized list of updates for your specific system.
• Information Security
• Information is combination of following three parts:
• Password
• Setup:
• Create methos for delivering the message.
• Attack:
• Phisher sends fake message to trick the victim into revealing sensitive
information.
• Collection:
• Phisher records victims’ information such as – login
credentials or personal details after tricking the into
providing them.
• Identity theft
• Fraud
• Goal is to exploit stolen data for financial and other harmful purpose.
• Types of Attacks: Adware
• It is a type of software designed to deliver advertisements to
users, often without their consent.
• Root access provides control over all functions and services of OS.
• monitoring processes
• E.g. when app lists files it may not show files associated wit rootkit.
• Kernel Mode:
• Intercepts calls to native API in kernel mode.
• Rootkit can hide presence of malware process by removing it from the list
of kernel’s active processes.
• Types of Attacks: Keyloggers
• Keyloggers software is capable of recording the
keystrokes and capturing screenshots, storing
them in encrypted log file.