Information Security Awareness


Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords



Download 3,81 Mb.
bet3/5
Sana22.04.2022
Hajmi3,81 Mb.
#575175
1   2   3   4   5
Bog'liq
3. Information and security

Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords.

  • Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords.

The link provided in the e-mail leads to a fake webpage which collects important information and submits it to the owner.

  • The link provided in the e-mail leads to a fake webpage which collects important information and submits it to the owner.
  • The fake web page looks like the real thing
    • Extracts account information

A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.

  • A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.
  • The compromised computers are called zombies

An attacker pretends to be your final destination on the network. If a person tries to connect to a specific WLAN access point or web server, an attacker can mislead him to his computer, pretending to be that access point or server.

  • An attacker pretends to be your final destination on the network. If a person tries to connect to a specific WLAN access point or web server, an attacker can mislead him to his computer, pretending to be that access point or server.

Upon penetrating a computer, a hacker installs a collection of programs, called a rootkit.

  • Upon penetrating a computer, a hacker installs a collection of programs, called a rootkit.
  • May enable:
    • Easy access for the hacker (and others)
    • Keystroke logger
  • Eliminates evidence of break-in
  • Modifies the operating system
  • Backdoor entry
  • Keystroke Logger
  • Hidden user
  • Pattern
  • Calculation
  • Result
  • Personal Info: interests, relatives
  • 20
  • Manual 5 minutes
  • Social Engineering
  • 1
  • American Dictionary
  • 80,000
  • < 1 second
  • 4 chars: lower case alpha
  • 264
  • 5x105
  • 8 chars: lower case alpha
  • 268
  • 2x1011
  • 8 chars: alpha
  • 528
  • 5x1013
  • 8 chars: alphanumeric
  • 628
  • 2x1014
  • 3.4 min.
  • 8 chars alphanumeric +10
  • 728
  • 7x1014
  • 12 min.
  • 958
  • 7x1015
  • 2 hours
  • 12 chars: alphanumeric
  • 6212
  • 3x1021
  • 96 years
  • 12 chars: alphanumeric + 10
  • 7212
  • 2x1022
  • 500 years
  • 12 chars: all keyboard
  • 9512
  • 5x1023
  • 16 chars: alphanumeric
  • 6216
  • 5x1028

Download 3,81 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish