Ch02 - Attackers and Their Attacks

Ch02 - Attackers and Their Attacks - A...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Attackers and Their Attacks   Chapter 2 Security+ Guide to Network Security Fundamentals  Second Edition
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Develop attacker profiles Describe basic attacks Describe identity attacks Identify denial of service attacks Define malicious code (malware)
Background image of page 2
3 Developing Attacker Profiles Hackers Crackers Script kiddies Spies Employees Cyberterrorists Six categories :
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Hackers Person who uses advanced computer skills to attack computers, but  not with a malicious intent Use their skills to expose security flaws
Background image of page 4
5 Person who violates system security with malicious intent  Have advanced knowledge of computers and networks and the  skills to exploit them Destroy data, deny legitimate users of service, or otherwise cause  serious problems on computers and networks Crackers
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Break into computers to create damage Are unskilled users Download automated hacking software from Web sites and use it  to break into computers Tend to be young computer users with almost unlimited amounts of  leisure time, which they can use to attack systems Script Kiddies
Background image of page 6
7 Person hired to break into a computer and steal information Do not randomly search for unsecured computers to attack Hired to attack a specific computer that contains sensitive  information Spies
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 One of the largest information security threats to business Employees break into their company’s computer for these reasons: To show the company a weakness in their security To say, “I’m smarter than all of you” For money Employees
Background image of page 8
9 Experts fear terrorists will attack the network and computer  infrastructure to cause panic  Cyberterrorists’ motivation may be defined as ideology, or attacking for  the sake of their principles or beliefs One of the targets highest on the list of cyberterrorists is the Internet  itself Three goals of a cyberattack: Deface electronic information to spread disinformation and  propaganda Deny service to legitimate computer users Commit unauthorized intrusions into systems and networks that  result in critical infrastructure outages and corruption of vital data  Cyberterrorists
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Today, the global computing infrastructure is most likely target of  attacks Attackers are becoming more sophisticated, moving away from  searching for bugs in specific software applications toward probing  the underlying software and hardware infrastructure itself  Understanding Basic Attacks
Background image of page 10
11 Easiest way to attack a computer system requires almost no  technical ability and is usually highly successful Social engineering relies on tricking and deceiving someone to access 
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 36

Ch02 - Attackers and Their Attacks - A...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online