1 Information Security Fundamentals 27-04-2023
1 Information Security Fundamentals 27-04-2023
security
Module 1
• Definitions & challenges of security
• Attacks & services
• Security policies
• Security Controls
• Access control structures
• Cryptography
• Deception
• Ethical Hacking
• Firewalls
• Identify and Access Management (IdAM).
Security- Definitions
• Computer Security
- collection of tools designed to protect data and
from the hackers.
• Network Security
- measures to protect data during their transmission.
• Internet Security
- measures to protect data during their transmission
over a collection of interconnected networks.
INFORMATION SECURITY
Data
recording of “something” measured
Raw material, just measured
Information
Information is the result of processing, manipulating and organizing
data in a way that adds to the knowledge of the receiver.
Processed data
Knowledge
Knowledge is normally processed by means of structuring,
grouping, filtering, organizing or pattern recognition.
Highly structured information
Attacks - Definition
An attack is the deliberate act that exploits
vulnerability.
It is accomplished by a threat agent that damages
or steals an organization’s information or physical
asset.
An exploit is a technique to compromise a system.
Vulnerability is an identified weakness of a
controlled system with controls that are not
present or are no longer effective.
An attack is the use of an exploit to achieve the
compromise of a controlled system.
Security Challenges
Information Assets and Threats: Malware
Threats
• Malware is abbreviated term of Malicious
Software
• Malware defines wide variety of potential
harmful software.
• Malicious software is a umbrella term and it is
designed for
– gaining access to target machines.
– Stealing information and harm the target system
Information Assets and Threats: Examples
of Malware
• Trojan Horse • Virus
• Backdoor • Worms
• Rootkit • Spyware
• Ransomware • Botnet
• Adware • Crypter
Information Assets and Threats:
Different Ways a Malware can Get into a System
Trojan
• A Malicious program misleading the user about
its actual intention is classified as Trojan. Trojan
are typically spread by Social Engineering.
• These Trojan may provide access to personal
information as well as unauthorized access to the
attacker.
• The Trojan can also leads to infection of other
connected devices across a network.
Information Assets and Threats: Trojan
Worms:
• Computer worms are malicious programs
that replicate, execute, and spread across the network
connections independently without human interaction.
• Most of the worms are created only to
– replicate and spread across a network,
– consuming available computing resources;
– however, some worms carry a payload to damage the host system.
• Attackers use worm payload to install backdoors in infected
computers, which turns them into zombies and creates botnet;
these botnets can be used to carry further cyber attacks.
Information Assets and Threats:
How is a Worm Different from a Virus?
• Replicates on its own: A worm is a special type
of malware that can replicate itself and use
memory, but cannot attach itself to other
programs.
• Spreads through the Infected Network: A
worm takes advantages
of file or information transport features on
computer systems and spread through the infected
network automatically but a virus does not.
Information Assets and Threats:
Virus vs Worm
Virus Worm
Worm infects a system by exploiting a
Virus infects a system by inserting itselft into a
vulnerability in an OS or application
file or executable program
by replicating itself
Typically, a worm does not modify any stored
It might delete or alter content in files, or
programs. It only exploits the CPU and
change the location of files in the system
memory
It consumes network bandwidth, system
It alters the way a computer system operates,
memory, etc., excessively overloading servers
without the knowledge or consent of a user
and computer systems
2.Traffic analysis
29
Security Attacks
• 2. Active
attack:
Attempts to
alter the
system
resources.
30
Passive Attacks TYPES
1.Release of Message Contents
31
Passive Attacks TYPES
1.Release of Message Contents
32
Passive Attacks TYPES
2.Traffic Analysis
33
Passive Attacks TYPES
2.Traffic Analysis
36
Active Attacks (1)
Masquerade
37
Active Attacks (2)
Replay
38
Active Attacks (3)
Modification of Messages
39
Active Attacks (4)
Denial of Service
40
Handling Attacks
42
Social engineering
44
Current Phishing Techniques
• JavaScript Attacks
• Certificates
– Phishers can acquire certificates for domains
they own
– Certificate authorities make mistakes
Spear-Phishing: Improved Target Selection
WHOIS 210.104.211.21: