9781435483712_PPT_ch05 - Cyber Safety Chapter 5: Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cyber Safety Chapter 5: Security Threats and Attacks Copyright by EC-Council All rights Objectives  Recognize the various security threats and attacks, including:  Social engineering  Phishing  Viruses, Trojans, and worms  Spyware and Adware  Keyloggers  Denial of service  Spamming  Port Scanners  Password crackers Copyright by EC-Council All rights Case Example  John recently installed the Lycos antispam screensaver that he received in an e-mail attachment titled, Lycos screensaver to fight spam.zip  Alice downloaded a software package, ShareIT 3.1 that will allow her to share files over the Internet using a peer-to-peer sharing site  Unbeknownst to Alice, the company has bundled a great value application, StealthDialer.exe, which is a hidden dialer application  Denise always clicks OK whenever she is prompted to by her computer  Before long, ads are being displayed on her screen Copyright by EC-Council All rights Introduction  This chapter introduces the various security threats and attacks to which todays computer user is vulnerable  Security threat  Potential danger to the safety of data and software on a personal computer (PC)  Security attack  Occurs when the security of data or software on a PC is compromised  Security vulnerability  Flaw in a product that poses a threat and exposes the system to an attack, even in intended use Copyright by EC-Council All rights Social Engineering  Social engineering  Practice of conning people into revealing sensitive data on a computer system or information that can be used on networks and systems  Examples of social engineering include:  Con e-mails (free vacation)  Pop-ups  Phone calls or survey visits asking for information  Peeping over shoulders  Checking dumpsters for information Copyright by EC-Council All rights Phishing  Phishing  Illegal acquisition of sensitive personal information by criminals pretending to be legitimate entities with a real need for such information  Shorthand for password harvesting fishing  Precautions:  Do not reply or click on the link in an e-mail or pop-up message that asks for personal or financial information  Do not e-mail personal or financial information  Review credit card and bank account statements as soon as you receive them Copyright by...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 23

9781435483712_PPT_ch05 - Cyber Safety Chapter 5: Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online