You are on page 1of 5

Information Security TIPS

Introduction to IT Security, Ethical Hacking, PT&VA

 Importance of Information Security

 Information Security and Ethical Hacking terminologies

 Common Network / Internet Threats

 Differentiating Ethical Hacking from Hacking

Importance of Information Security

 Nobody believes anything bad can happen to them, until it Happen !!!

 Bad things may happen and surprisingly often

 Confidential information must be kept Private

 Technology is only a partial solution to information security

 Requirement of well-trained Professionals, Good Processes, and Technology

 End User Awareness

Threats
The Internal Threats

 The biggest threat to your firm's security might well come from inside the company
itself.

 Unsatisfied Employee

 Weak Security Policy

 Ineffective Security Administrator

 Lack of User Security Awareness


The External Threats

Hacker & Cracker

 A person who enjoys learning and to stretch their capabilities

 One who programs enthusiastically

 A set of People who get a kick out of breaking into computers

 Hackers build things, Crackers break them

Malicious Programs

 Virus and Worms

 Trapdoor

 Logic Bomb

 Trojan Horse

 The Importance of Information Security


Ethical Hacking Terminologies
Active Attack

 An attack that works by carrying out some action against the target

The Attack can be

 Modification

 Insertion

 Masquerading

 DoS

Backdoor

Something a hacker leaves behind on a system in order to be able to get back in at a later time.

Exploit

A technique of breaking into a system

Hijack

An attack whereby the hacker attempts to take over one side of an existing (authenticated)
connection

Man-in-the-Middle

An attacker where the hacker interposes himself in the middle between two people

Penetration Testing

A penetration test is where a client hires ethical hackers to attempt to break into their systems

Threat

A threat is an action or event that might breach security. Normally a threat is a potential
security Violation

Vulnerability

Vulnerability allows a system to be attacked or broken into.


Common Network / Internet Threats
Network Security Problems

 Technology weakness

 TCP/IP

 Computer and Network Operating Systems

 Network Device Weaknesses

 Policy weakness

 Configuration weakness

 Ineffective access control lists failing to block intended traffic

 Unneeded ports or services left active

 unprotected remote access

The Major Types of Network Threats


 Unstructured threats

 Structured threats

 Internal threats

 External threats

Understanding Viruses, Worms and Trojans

 Viruses are "programs" that modify other programs on a computer, inserting copies
of themselves.  Viruses are not distinct programs - they cannot run on their own,
and need to have some host program, of which they are a part, executed to activate
them.

 Worms are programs that propagate from computer to computer on a network,


without necessarily modifying other programs on the target machines.  Worms  can
run independently and travel from machine to machine across network
connections; worms may have portions of themselves running on many different
machines. Worms do not change other programs, although they may carry other
code that does (for example, a true virus).

 Trojan horses are programs that appear to have one function but actually perform
another function. Trojan horses are named after the Trojan horse of myth.
Analogous to their namesake, modern-day Trojan horses resemble a program that
the user wishes to run - a game, a spreadsheet, or an editor. While the program
appears to be doing what the user wants, it is also doing something else unrelated
to its advertised purpose, and without the user's knowledge.

You might also like