Computer security slide for chapter 2 for catholic comprehensive community college IT students by Theko Moima.
Size: 972.24 KB
Language: en
Added: Feb 23, 2019
Slides: 18 pages
Slide Content
CSE 334: COMPUTER SECURITY Semester 6, 2019 Instructor: Mr. Theko Michael Moima C|EH Email: [email protected]
About Hacking WHAT IS THIS HACKING? Hacking means to attack systems, networks and applications by exploiting their weaknesses (vulnerabilities) in order to gain unauthorized access. WHAT ARE THE GOALS OF HACKING? Data theft, Destruction or alteration, Unauthorized access, elevated privileges or any other unauthorized action or purpose.
Ethical Hacking WHAT IS IT THEN? - Use of hacking knowledge, tools and techniques to demonstrate the true exploitable vulnerabilities in a system, network or the IT infrastructure for the purpose of securing it. - Ethical hacking is what we shall be doing for this CSE334 course.
Hacking Terminology Target: the individual or the organization which shall be attacked by the hacker. Target value: the value (basically in terms of dollars, criticallity and aid to reputation) of a target to the hacker. Vulnerability: a weakness in a system, organization, software or a network that could lead to data disclosure or alteration, denial of service or unauthorized access e.t.c . An Exploit: a method or a technique used to exercise the vulnerability. “Zero-day” attack: an exploit for an unpublished vulnerability or for a vulnerability that for which there is no published patch or mitigation.
Examples- Attack vectors Virtual machines and infrastructure Databases Untrained users Untrained administrators Networks Social engineering Malware Mobile devices Operating systems Client-server applications Social media Web applications Voip and PABX
Motivations for hackers Money Revenge ( e.g bitter ex boyfrieds ) Hacking for cause Fun Espionage Intellectual property theft Damage to people and organizations Hacker reputation.
Recap on hacker types How did we say we classify hackers? Hackers can be categorized in several different ways based on based upon : -Motivation -Which side they are on (good or bad) -skills e.t.c
Hacker classification Script kiddies attributes : -Novice hackers. -Little technical knowledge. -use other people’s pre developed tools. -No IT programming or networking background. Black hats: - use hacking skills to purposely offend individuals or organizations - often motivated by money, revenge, terrorism, activism -Most of them are cyber terrorists
Hacker classifications cont.. White hats: - use hacking skills to defend against network attacks and make systems more secure. - Often called security consultants, analysts or engineers. Grey hats - can be good or bad or both - Often reformed black hats, or roque white hats State sponsored hackers -trained, funded, and supported agents of a nation state or gov -their goals are espionage or cyber warfare.
Hacker classes cont.. Hacktivists - Hackers who launch attack to spread their message about a cause. -they deface websites, causes Ddos attacks or disclose private data. - e.g anonymous and the shadow brokers e.t.c
Hacker classes cont.. Corporate hackers - target organizations intellectual property, or proprietary data -goal is to have the competitive advantage, money making or blackmailing purposes.
Types of testing Types of tests depend on what your goal is.: We have: -vulnerability testing -full penetration testing -targeted testing -Black box testing -Grey box testing -White box testing
Testing types Types of testing Testing for vulnerabilities only:- no exploits Vulnerability testing Full pentesting Full on testing for all targets with all attack vector exploitation . Testing on specific spots on the infrastructure. Targeted testing Black box testing No prior knowledge about the target
Testing types cont.. Types of testing Some limited knowledge about the target Grey box testing White box testing Full knowledge about the target system
Targeted Testing Databases Web application testing Client-server application testing Code review Physical security tests Social engineering Malware detection Network scanning Information leakage Red team testing Defensive testing only Incident response testing
Security controls Are security measures you use to secure the systems, organization and its data. Use a defense-in-depth strategy Administrative / management control Operational / physical control Logical / technical control
Defenses User education Patches Secure configuration Anti-malware Policies and procedures Planning Network security devices Data encryption Secure authentication Access controls, alarms, guns, gates and CCTVs.