23
TopInformationSecurity
Threats
1.UnsecureorPoorlySecuredSystems
•Thespeedandtechnologicaldevelopment
–Oftenleadstocompromisesinsecurity
measures.
•Inothercases,systemsaredeveloped
without securityinmind,
–Remaininoperationatanorganizationas
legacy systems.
•Organizationsmustidentifythesepoorly
secured systems,
–andmitigatethethreatbysecuringorpatching
them orisolatingthem.
24
2.SocialMedia
Attacks•Manypeoplehavesocialmediaaccounts,
–wheretheyoftenunintentionallysharealot
of informationaboutthemselves.
•Attackerscanlaunchattacksdirectlyvia
social media,
–Eg.Byspreadingmalwareviasocial
media messages,orindirectly,byusing
information obtainedfromthesesitesto
analyzeuserand organizational
vulnerabilities,andusethemto
designanattack.
34
•SECUREYOURWI-FI
–ChangeDefaultAdministratorPasswords
and UsernamesoftheWi-Fi Router
–UsecomplexpasswordandchangePassword
after regularintervals
–PositiontheRouterorAccessPointSafely
–TurnofftheNetwork/Wi-Firoutersifitisnot
in use
35
•SECUREYOURBROWSING
–Whatyouputonlinewillalwaysremain
there
–Nevertrustanyfreeonlinecontent
–Dontprovidepersonalinformationonlineto
get somethingfree
–Don’tclickonlinksinsidee-mailsor
messages
Active
Attack•Activeattacksinvolvesomemodification
of thedatastreamorcreationofafalse
stream. Anactiveattackattemptstoalter
system resourcesoraffecttheir
operation.
46
FourtypesofActive
attacks•Masquerade:Here,anentitypretendstobe
some otherentity.Itusuallyincludes
oneoftheotherforms
of activeattack
–Example:Ifthelegitimateuserleavesthe
terminalorsessionopenandloggedin,a
coworkermayactasamasqueradeattacker.
–Vulnerableauthenticationisoneofthe
otherfactorthatcantriggeramasquerade
attack,asithelpstheattackertogainaccess
mucheasily.
47