P. 1
Final ITAM Ppt

Final ITAM Ppt

|Views: 4|Likes:
Published by Aditi Singh

More info:

Published by: Aditi Singh on Sep 05, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less







Confidentiality.). etc. disclosure. modification. recording or destruction.INTRODUCTION • Information security. sometimes shortened to InfoSec. use.e. • Two major aspects of information security are: IT Security Information assurance • Information Security Attributes or qualities i. physical.. inspection. Integrity & Availability (CIA) . is the practice of defending information from unauthorized access. disruption. perusal.. It is a general term that can be used regardless of the form the data may take (electronic.

• Types of IP Spoofing: Flooding Blind Spoofing Non-blind Spoofing . where by the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. or trusted.IP SPOOFING • IP spoofing is a technique used to gain unauthorized access to computers. • Attacker puts an internal. The access control device sees the IP address as trusted and lets it through. A hacker uses an authorized external IP address that is trusted. • Two general techniques are used during IP spoofing: A hacker uses an IP address that is within the range of trusted IP addresses. IP address as its source.

making it sound more like that of B A C B If we now . B is on line A disguising his voice. replace the 3 people by computers and change the term “voice” with “IP-Address” then you would know what we mean by IP-SPOOFING… .REAL LIFE EXAMPLE TO EXPLAIN WHAT IS IP SPOOFING.

EXAMPLE: If various Internet service providers are getting their DNS information from the compromised server. the poisoned DNS entry will spread to the Internet service providers and be cached there. and store it. It will then spread to home routers and the DNS caches on computers as they look up the DNS entry. • A DNS cache can become poisoned if it contains an incorrect entry. receive the incorrect response.DNS POISONING • DNS spoofing (or DNS cache poisoning) is a computer hacking attack. whereby data is introduced into a Domain Name System (DNS) name server's cache database. causing the name server to return an incorrect IP address. diverting traffic to another computer (often the attacker's). .

com Caching DNS Server Client .com dns.A SHORT OVERVIEW ON DNS Internet: Authoritive DNS Servers dns.hacker.microsoft.

2. • Precaution: 1. Proper security question. Use email client on computer. Personal Details are correct. Change the password – difficult to crack. . Creative Password 3. 2.ADDRESS BOOK THEFT • Stealing of email address book • Spamming • Solution: 1.

Hybrid Attack 3. Preventive measure for easily crackable passwords • Methods: 1. Recover forgotten password 2. Brute Force Attack . Dictionary Attack 2. Gain unauthorized access 3.PASSWORD CRACKERS • Recovering passwords from data stored in computer systems • Purpose: 1.

John the Ripper. ElcomSoft •Mixture of cracking strategies – brute force and dictionary attacks – most productive . Hashcat.PASSWORD CRACKING SOFTWARE •Password cracking software tools •Most popular – Cain and Abel. SolarWinds. Hydra.

TROJAN HORSE •A Trojan Horse is a program that installs malicious software while under the guise of doing something else. •It erases or Overwrites data on a computer. . In this case the Trojan horse is called a 'dropper'. such as viruses. spreading other malware.

• Secup also serves undesirable commercial advertisements. • When the user clicks on such a message the Trojan opens malicious web site that quietly installs potentially harmful software. . which is then sent to the hacker. Dmsys easily steals user passwords and captures private conversations. This information is written into a log file.TYPES OF TROJAN AceBot • AceBot is a tremendous backdoor Trojan. which was designed for performing a lot of destructive actions. • By using its keystroke logging technique. • AceBot also connects to the IRC network and uses it for giving the hacker a remote control over the computerised system. Dmsys • Dmsys is a dangerous Trojan that specializes in infecting various instant messengers and stealing user confidential information. Secup • The Secup Trojan displays fake security related messages. the Trojan is able to connect to various malicious servers and download other harmful parasites from there. Moreover. • The parasite detects. terminates and totally disables running antivirus software installed on the target computer.

COMPUTER WORM Worms A worm is a computer program that has : • The ability to copy itself from machine to machine. • Worms use up computer processing time and network bandwidth when they replicate. .

CODE RED (THE WORM) The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character 'N' to overflow a buffer allowing the worm to execute arbitrary code and infect the machine .

a logic bomb struck machines "and wiped the hard drives and master boot records of at least three banks and two media companies simultaneously". a programmer may hide a piece of code that starts deleting files (such as a salary) • On March 20.LOGIC BOMB • A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. 2013 an attack was launched against South Korea. For example. . Symantec reported that the malware also contained a component that was capable of wiping Linux machines.

provision to third-parties. and displaying of information pertaining to oneself via the Internet Examples: •Sony CD spyware •AOL search leak •Google Street View .IT PRIVACY Internet privacy involves the right or mandate of personal privacy concerning the storing. repurposing.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->