Computer security ch2
Computer security ch2
BURIE CAMPUS
DEPARTMENT OF COMPUTER SCIENCE
Computer Security
By:
Amare W.
1
2
3/2/2018
6 01/27/2025
3/2/2018
7 01/27/2025
3/2/2018
8 01/27/2025
2.1.4 Spyware
♥ It is a type of malware that spies on a person or an
organisation by gathering information about them, without the
knowledge of the user.
♥ It records and sends the collected information to an external
entity without consent or knowledge of the user.
♥ Spyware usually tracks internet usage data and sells
them to advertisers.
♥ They can also be used to track and capture credit card or bank
account information, login and password information or user’s
personal identity.
3/2/2018
12 01/27/2025
target host.
14 01/27/2025
install and hide software that will be used later by the hackers.
15 01/27/2025
….cont’d
♥ The attacker does not need prior access to the target, only a path
to the target. Once the path is realized, great paralyzing damage
can be caused.
♥ Because many DoS attacks are relatively easy to initiate and can
be performed anonymously, it is the most feared attack on the
Internet.
♥ A Distributed Denial of Service (DDoS) attack is one in which the
source of the attack is many computers (usually spread across a
large geographic area) making it very difficult to find and stop the
3/2/2018
source(s).
17 01/27/2025
♥ A buffer is a temporary area for data storage. When more data (than was
originally allocated to be stored) gets placed by a program or system
process, the extra data overflows.
♥ It causes some of that data to leak out into other buffers, which can corrupt
or overwrite whatever data they were holding.
♥ In a buffer-overflow attack, the extra data sometimes holds specific
instructions for actions intended by a hacker or malicious user; for example,
the data could trigger a response that damages files, changes data or
exposes private information.
♥ Attacker would use a buffer-overflow exploit to take advantage
3/2/2018
of a
program that is waiting on a user’s input.
21 01/27/2025
3/2/2018
22 01/27/2025
♥ Consider a Web application that allows a user to edit pages, and also
allows administrators to lock pages to prevent editing.
♥ A user requests to edit a page, getting a form which can be used to
alter its content.
♥ Before the user submits the form, an administrator locks the page,
which should prevent editing.
♥ However, since editing has already begun, when the user submits the
form, those edits (which have already been made) are accepted.
♥ When the user began editing, the appropriate authorization was
3/2/2018
3. INCOMPLETE MEDIATION::
♥ Incomplete mediation is another security problem. Attackers
are exploiting it to cause security problems.
♥ Supplying wrong type of data in wrong length.
♥ It is easy to exploit, but it has been exercised less often than
buffer overflows, nevertheless, unchecked data values
represent a serious potential vulnerability.
3/2/2018
24 01/27/2025
Security Defences
3/2/2018
27 01/27/2025
3/2/2018
29
Thank you