SlideShare a Scribd company logo
Information Systems Security: An
Overview
Sotirios Kontogiannis1 and Apostolos Syropoulos2
1Western Macedonia
University of Applied Sciences
Grevena, Greece
skontog@ee.duth.gr
2Independent scholar
Xanthi, Greece
asyropoulos@yahoo.com
January 13, 2016
Xanthi
Introduction System Protection Malware Cyber-security Finale
Presentation Overview
1 Introduction
2 System Protection
3 Malware
4 Cyber-security
5 Finale
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Access Control and restrictions per user per role;
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Access Control and restrictions per user per role;
System policy and restrictions; and
Introduction System Protection Malware Cyber-security Finale
What is IS Security?
Information system security is the software and hardware
mechanisms that prevent access to certain system resources:
Access Control and restrictions per user per role;
System policy and restrictions; and
Access Control and restriction per network/machine per role.
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Physical attacks (e.g., boot computer with OS DVD);
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Physical attacks (e.g., boot computer with OS DVD);
IS attacks via modified hardware [e.g., Mifare attacks (RFID
systems), etc.] and
Introduction System Protection Malware Cyber-security Finale
What IS security does include?
Prevention of
System level security (e.g., OS attacks, application overflow,
etc.);
Network level security (e.g., network data evesdroping,
machine impersonization, etc.);
Physical attacks (e.g., boot computer with OS DVD);
IS attacks via modified hardware [e.g., Mifare attacks (RFID
systems), etc.] and
IS malfunction via Hardware I/O attacks (e.g., USB device
plugged into a system).
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
The system hardware, which must be protected physically.
Maxim: Protect thy console before thy self!
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
The system hardware, which must be protected physically.
Maxim: Protect thy console before thy self!
The system’s OS and software resources. Also, users’ files
and per user OS restrictions.
Introduction System Protection Malware Cyber-security Finale
What does System Security protects?
The system hardware, which must be protected physically.
Maxim: Protect thy console before thy self!
The system’s OS and software resources. Also, users’ files
and per user OS restrictions.
The system’s local services (e.g., shared service resources).
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
System services available to end users via the Internet or
Local network.
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
System services available to end users via the Internet or
Local network.
The data that traverses through the network.
Introduction System Protection Malware Cyber-security Finale
What does Network Security protects?
System services available to end users via the Internet or
Local network.
The data that traverses through the network.
The machine network information and the levels of per
machine (pc) access on network resources (provided from
other machines).
Introduction System Protection Malware Cyber-security Finale
Hackers…
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Jonathan James: US department of defence hacker-spy.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Jonathan James: US department of defence hacker-spy.
Gary Mckinnon: US Air Force, US Navy, and NASA systems
hacker.
Introduction System Protection Malware Cyber-security Finale
Hackers…
A person who secretly gets access to a computer system in
order to get information, cause damage, etc.
Robert Tapan Morris: He released a worm that took down
one-tenth of the Internet, crippling 6,000 plus computer
systems.
Vladimir Levin: Citybank hacker (1994).
Michael Calce: Yahoo hack (2000).
David Smith: Melisa e-mail clone virus (2000).
Adrian Lamo: The homeless hacker of Microsoft, New York
Times and Yahoo! (2000).
Jonathan James: US department of defence hacker-spy.
Gary Mckinnon: US Air Force, US Navy, and NASA systems
hacker.
Kevin Mitnick: switching system (PBX) phreacker (one who
gains illegal access to the telephone system).
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
lamer A person who knows little and uses nukes to do his
work
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
lamer A person who knows little and uses nukes to do his
work
cracker Someone who uses software cracking to modify a
program.
Introduction System Protection Malware Cyber-security Finale
Vocabulary PART I
noob Someone who knows little and has no will to learn any
more.
script kiddie Someone who relies on premade exploit
programs and files (”scripts”) to conduct his hacking, and
refuses to bother to learn how they work.
lamer A person who knows little and uses nukes to do his
work
cracker Someone who uses software cracking to modify a
program.
Warez Copyrighted works distributed without fees or
royalties, and may be traded, in general violation of
copyright law.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Guru An authority on computers and computing.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Guru An authority on computers and computing.
Poser One who tries to fit in but with exaggeration; pretends
to be someone whose not.
Introduction System Protection Malware Cyber-security Finale
Vocabulary Part II
warez d00dz Are part of the darkest internet subculture.
They usually copy the warez from their own software,
breaking copy protection if need be.
Guru An authority on computers and computing.
Poser One who tries to fit in but with exaggeration; pretends
to be someone whose not.
Leecher In the context of to peer to peer file sharing
protocols, or networks (e.g., Bittorrent), someone who
consumes bandwidth by downloading, yet has no will to
upload or give back to a community.
Introduction System Protection Malware Cyber-security Finale
Hackers…
Introduction System Protection Malware Cyber-security Finale
Hackers…
The population pyramid of  potential 
Information System attackers
AVERAGE NON­SKILLED USER 
NOOB
KIDDIE SCRIPTER
LAMER
CRACKER
PHREAKS/WAREZ D00DZ
HACKER
GURU
>25,000
>50,000
<8,000
<3,000
<500
<150
POSER/WANNABEE
LEECHER
Population/10,000,000
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
They do not portscan or sniff or expose themselves to
danger. They have lamers for this.
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
They do not portscan or sniff or expose themselves to
danger. They have lamers for this.
They never delete systems, only deface and install rootkits or
backdoors.
Introduction System Protection Malware Cyber-security Finale
Hacker Manners
They use Jargon
(http://www.catb.org/jargon/html/go01.html).
The use nicknames from irc channesl (#hack or #linux).
Always two there are a master and an apprentice (Yoda
syntax!).
Exchange knowledge with knowledge or zero date exploits
with remote access.
Follow strategy and protection measures (e.g., connect from
owned IP)
They do not portscan or sniff or expose themselves to
danger. They have lamers for this.
They never delete systems, only deface and install rootkits or
backdoors.
Maintain low profile and utilize social engineering
techniques.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Spyware Software that aims to gather information about a
person or force a person visit specific web, view ads using
popup windows sites or metasearch engines.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Spyware Software that aims to gather information about a
person or force a person visit specific web, view ads using
popup windows sites or metasearch engines.
Trojans A type of malware that is often disguised as
legitimate software. Users are typically tricked by some form
of social engineering into loading and executing Trojans on
their systems.
Introduction System Protection Malware Cyber-security Finale
Malware or more …ware!
Computer Virus A binary patch set to a system’s executable
file “accidentally” by an administrator role.
Worm Something similar to a virus by design and is
considered to be a sub-class of a virus. Also, a worm has the
capability to travel without any human “intervention.”
Spyware Software that aims to gather information about a
person or force a person visit specific web, view ads using
popup windows sites or metasearch engines.
Trojans A type of malware that is often disguised as
legitimate software. Users are typically tricked by some form
of social engineering into loading and executing Trojans on
their systems.
Exploit A small program (source code) that uses a system’s
vulnerability in order to gain unauthorized access to IS
resources
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Local exploits Applicable when the program requires local
system user access.
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Local exploits Applicable when the program requires local
system user access.
Remote exploits Applicable when the program requires only
service connection or service user access.
Introduction System Protection Malware Cyber-security Finale
Types of Exploits
Local exploits Applicable when the program requires local
system user access.
Remote exploits Applicable when the program requires only
service connection or service user access.
Zero date When the code is published in the Internet is less
that 3 months time.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Spy Trojans Usaually a standalone program that allows a
hacker to monitor user’s activities on an infected computer.
Typically, they capture screen, keyboard, I/O operations.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Spy Trojans Usaually a standalone program that allows a
hacker to monitor user’s activities on an infected computer.
Typically, they capture screen, keyboard, I/O operations.
Trojans to hide Trojans Malicious software that hides itself,
so its activity doesn’t appear in the list of processes.
Introduction System Protection Malware Cyber-security Finale
Types of Trojans
Root kit A collection of programs that enable
administrator-level access to a computer or computer
network.
Backdoor A method, often secret, of bypassing normal
authentication in a product, computer system, cryptosystem
or algorithm etc.
Fake Antivirus It masquerades as legitimate software, but is
actually a malicious program that extorts money from you to
“fix” your computer.
Spy Trojans Usaually a standalone program that allows a
hacker to monitor user’s activities on an infected computer.
Typically, they capture screen, keyboard, I/O operations.
Trojans to hide Trojans Malicious software that hides itself,
so its activity doesn’t appear in the list of processes.
OS kernel module Trojans A kind of Trojan horse which
combines with kernel Rootkit technologies.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
IP Address Spoofing A hijacking technique in which a
cracker masquerades as a trusted host to conceal his identity
(e.g., sending e-mail from…NASA!).
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
IP Address Spoofing A hijacking technique in which a
cracker masquerades as a trusted host to conceal his identity
(e.g., sending e-mail from…NASA!).
Synchronize Packet Flood A cracker sends many connection
requests in a rapid pace without responding. This activity
leaves the first packet in the buffer so that other legitimate
connection requests cannot be completed
Introduction System Protection Malware Cyber-security Finale
Network Security Malware
Port scanners (which posts are open?) and TCP
Fingerprinters (Detecting remote OS and its version).
Magic Packet Activated Backdoor The backdoor opens a
port, executes a signle command, initiates a session or
perform some other action when it received a single magic
packet.
IP Address Spoofing A hijacking technique in which a
cracker masquerades as a trusted host to conceal his identity
(e.g., sending e-mail from…NASA!).
Synchronize Packet Flood A cracker sends many connection
requests in a rapid pace without responding. This activity
leaves the first packet in the buffer so that other legitimate
connection requests cannot be completed
Sniffer A network sniffers monitors data flowing over
computer network links.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Man-in-the-middle Attacks  type of cyberattack where a
malicious actor inserts him/herself into a conversation
between two parties, impersonates both parties and gains
access to information that the two parties were trying to send
to each other.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Man-in-the-middle Attacks  type of cyberattack where a
malicious actor inserts him/herself into a conversation
between two parties, impersonates both parties and gains
access to information that the two parties were trying to send
to each other.
Remote xploits Exploits done remotely by a cracker across
the Internet or by a user’s having privileges on the system.
Example: Fred Durst’s home computer was remotely
attacked and someone made a copy of a 2003 three-minute
private video in Durst’s possession.
Introduction System Protection Malware Cyber-security Finale
Network Security Malware II
Man-in-the-middle Attacks  type of cyberattack where a
malicious actor inserts him/herself into a conversation
between two parties, impersonates both parties and gains
access to information that the two parties were trying to send
to each other.
Remote xploits Exploits done remotely by a cracker across
the Internet or by a user’s having privileges on the system.
Example: Fred Durst’s home computer was remotely
attacked and someone made a copy of a 2003 three-minute
private video in Durst’s possession.
Denial of Service (DoS) An attacker attempts to prevent
legitimate users from accessing information or services. By
targeting your computer and its network connection, or the
computers and network of the sites you are trying to use, an
attacker may be able to prevent you from accessing websites
or other services that rely on the affected computer.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
It is achieved by making information unintelligible.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
It is achieved by making information unintelligible.
Here is how it works:
plaintext
encryption
ciphertext
decryption
plaintext
Example: Caesar’s cipher is a type of substitution cipher in
which each letter in the plaintext is “shifted” a certain
number of places down the alphabet. For instance the word
“Lillija” is ecrypted as “Uruursj” if we shift 9 places.
Introduction System Protection Malware Cyber-security Finale
What is Cryptography?
Cryptography is the art and science of keeping information
secure from unintended audiences.
It is achieved by making information unintelligible.
Here is how it works:
plaintext
encryption
ciphertext
decryption
plaintext
Example: Caesar’s cipher is a type of substitution cipher in
which each letter in the plaintext is “shifted” a certain
number of places down the alphabet. For instance the word
“Lillija” is ecrypted as “Uruursj” if we shift 9 places.
Post-quantum cryptography.
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
http://www.securityfocus.com/
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
http://www.securityfocus.com/
Periodically use vulnerability scanner software:
Introduction System Protection Malware Cyber-security Finale
System Security Countermeasures
Keep The Operating System up to date.
Depending on your OS install antivirus software.
Gather Information about zero day threats:
http://www.symantec.com/security_response/
http://www.esecurityplanet.com/
http://www.securityfocus.com/
Periodically use vulnerability scanner software:
http://sectools.org/tag/vuln-scanners/
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Check thoroughly network services configuration.
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Check thoroughly network services configuration. Update
services and check shared service resources permissions
Introduction System Protection Malware Cyber-security Finale
Network Security Countermeasures
Use custom configured firewall that filters traffic.
Use port sensitive sniffers (port sentry) to detect scanners.
Check thoroughly network services configuration. Update
services and check shared service resources permissions
Use Network Intrusion Detection System to catch threats
targeting your vulnerable systems.
Introduction System Protection Malware Cyber-security Finale
Finale!
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
the various forms of malware;
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
the various forms of malware;
advice on cyber-security.
Introduction System Protection Malware Cyber-security Finale
Finale!
We presented
general information about IS;
what system protection means;
the various forms of malware;
advice on cyber-security.
Thank you very much for your attension!

More Related Content

PDF
Information Security Overview
PPTX
Information Security Overview
PPTX
Network security
PPTX
06. security concept
PDF
Intrusion in computing
PPT
Ch1 cse
PPTX
Cyber crime
PPTX
Cia security model
Information Security Overview
Information Security Overview
Network security
06. security concept
Intrusion in computing
Ch1 cse
Cyber crime
Cia security model

What's hot (20)

PPTX
Data security
PPTX
Computer security concepts
PDF
Chapter 1 introduction(web security)
PPT
Chapter1 intro network_security_sunorganised
PPTX
Data Security
PPT
Introduction to information security
PPSX
Cyber security
PPTX
5 Security Tips to Protect Your Login Credentials and More
PPT
Ch01 Introduction to Security
PPT
22 need-for-security
PPT
2 Security And Internet Security
PDF
Isaca june 19, 2010
PPT
Cyber security 22-07-29=013
PPTX
Securing information system
PPT
Introduction to Information Security
PPTX
Introduction to Network Security
PPTX
Introduction to information security
PPTX
Network security
PDF
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Data security
Computer security concepts
Chapter 1 introduction(web security)
Chapter1 intro network_security_sunorganised
Data Security
Introduction to information security
Cyber security
5 Security Tips to Protect Your Login Credentials and More
Ch01 Introduction to Security
22 need-for-security
2 Security And Internet Security
Isaca june 19, 2010
Cyber security 22-07-29=013
Securing information system
Introduction to Information Security
Introduction to Network Security
Introduction to information security
Network security
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Ad

Viewers also liked (20)

PPTX
INFORMATION SECURITY SYSTEM
PPTX
Information System Security - Prinsip Manajemen Keamanan
PDF
An Overview of Social Media
PPT
Infomation System Security
PDF
Distributed Operating System_3
PDF
Fuzzy Topological Systems
PPTX
Information System Security - Serangan dan Pengawasan
PPTX
RO impact of excessive computer use on global health state
PPTX
Information System Security - Kriptografi
PPSX
Web Introduction
PPTX
RO internet impact on child and adolescent brain
PPTX
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
PDF
Distributed Operating System_2
PPTX
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
PDF
Distributed Operating System_4
PPTX
OpenGL Introduction
PDF
Distributed Operating System_1
PPT
OpenGL Basics
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
PPT
Intrinsic and Extrinsic Motivation
INFORMATION SECURITY SYSTEM
Information System Security - Prinsip Manajemen Keamanan
An Overview of Social Media
Infomation System Security
Distributed Operating System_3
Fuzzy Topological Systems
Information System Security - Serangan dan Pengawasan
RO impact of excessive computer use on global health state
Information System Security - Kriptografi
Web Introduction
RO internet impact on child and adolescent brain
RESPONSIBILITY ACCOUNTING WITH SPECIAL REFERENCE TO STANDARD COSTING AND BUDG...
Distributed Operating System_2
Women Entrepreneur - India : Vandana luthra curls & curves india ltd(vlcc)
Distributed Operating System_4
OpenGL Introduction
Distributed Operating System_1
OpenGL Basics
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Intrinsic and Extrinsic Motivation
Ad

Similar to Information Systems Security: An Overview (20)

PPTX
Cyber security
PPTX
Network security presentation
PPT
Security and privacy
PPT
Lecture8 to identify the (Cyber Crime).ppt
PPTX
Cyber security
PPT
Security and privacy
PPTX
Chap11
PPT
Chap11
PDF
Information cyber security
PDF
Information &amp; cyber security, Winter training ,bsnl. online
PPTX
Ethical hacking ppt
PPTX
Computer Security and Ethics
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PPT
computer security
PPTX
Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx
PPTX
CYBERSECURITY | Why it is important?
PPT
Computer security: hackers and Viruses
PPT
PPT
CYBER CRIME AND SECURITY
PPT
presentation on cyber crime and security
Cyber security
Network security presentation
Security and privacy
Lecture8 to identify the (Cyber Crime).ppt
Cyber security
Security and privacy
Chap11
Chap11
Information cyber security
Information &amp; cyber security, Winter training ,bsnl. online
Ethical hacking ppt
Computer Security and Ethics
Guest Lecture-Computer and Cyber Security.pptx
computer security
Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx
CYBERSECURITY | Why it is important?
Computer security: hackers and Viruses
CYBER CRIME AND SECURITY
presentation on cyber crime and security

More from Apostolos Syropoulos (20)

PDF
A Presentation of Braga. It was made by students of school
PPTX
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
PPTX
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
PDF
A gentle introduction to Artificial Intelligence
PPTX
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
PPTX
Το Ορφανοτροφείο Θηλέων Ξάνθης
PPTX
Το Αρχαιολογικό Μουσείο Αβδήρων
PPTX
Ταφικά έθιμα στα αρχαία Άβδηρα
PPTX
Το ορφανοτροφείο της Ξάνθης
PPTX
Μικρασιατική κατατστροφή - Μέρος 3
PPTX
Μικρασιατική κατατστροφή - Μέρος 2
PPTX
Αφιέρωμα στη Μικρά Ασία
PPTX
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
PDF
How to Convert Units of Measure
PDF
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
PDF
Inflected Forms of Nouns and Adjectives
PDF
Learning Simple Phrases in Greek
PDF
Computational Thinking and...the Greek Alphabet
PPTX
Το Αποτύπωμα του 1821 στον Τόπο μου
PDF
Παγκόσμια ημέρα της σταθεράς π=3,14...
A Presentation of Braga. It was made by students of school
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
A gentle introduction to Artificial Intelligence
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Αρχαιολογικό Μουσείο Αβδήρων
Ταφικά έθιμα στα αρχαία Άβδηρα
Το ορφανοτροφείο της Ξάνθης
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 2
Αφιέρωμα στη Μικρά Ασία
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
How to Convert Units of Measure
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Inflected Forms of Nouns and Adjectives
Learning Simple Phrases in Greek
Computational Thinking and...the Greek Alphabet
Το Αποτύπωμα του 1821 στον Τόπο μου
Παγκόσμια ημέρα της σταθεράς π=3,14...

Recently uploaded (20)

PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PPTX
2. Earth - The Living Planet Module 2ELS
PPTX
2. Earth - The Living Planet earth and life
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PDF
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
PDF
The scientific heritage No 166 (166) (2025)
PPTX
2Systematics of Living Organisms t-.pptx
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PPTX
Cell Membrane: Structure, Composition & Functions
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PDF
Sciences of Europe No 170 (2025)
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PPTX
Taita Taveta Laboratory Technician Workshop Presentation.pptx
PPTX
neck nodes and dissection types and lymph nodes levels
PDF
lecture 2026 of Sjogren's syndrome l .pdf
PPTX
Microbiology with diagram medical studies .pptx
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
2. Earth - The Living Planet Module 2ELS
2. Earth - The Living Planet earth and life
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
The scientific heritage No 166 (166) (2025)
2Systematics of Living Organisms t-.pptx
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
Cell Membrane: Structure, Composition & Functions
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
Sciences of Europe No 170 (2025)
Comparative Structure of Integument in Vertebrates.pptx
7. General Toxicologyfor clinical phrmacy.pptx
Classification Systems_TAXONOMY_SCIENCE8.pptx
Taita Taveta Laboratory Technician Workshop Presentation.pptx
neck nodes and dissection types and lymph nodes levels
lecture 2026 of Sjogren's syndrome l .pdf
Microbiology with diagram medical studies .pptx
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud

Information Systems Security: An Overview

  • 1. Information Systems Security: An Overview Sotirios Kontogiannis1 and Apostolos Syropoulos2 1Western Macedonia University of Applied Sciences Grevena, Greece skontog@ee.duth.gr 2Independent scholar Xanthi, Greece asyropoulos@yahoo.com January 13, 2016 Xanthi
  • 2. Introduction System Protection Malware Cyber-security Finale Presentation Overview 1 Introduction 2 System Protection 3 Malware 4 Cyber-security 5 Finale
  • 3. Introduction System Protection Malware Cyber-security Finale What is IS Security?
  • 4. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources:
  • 5. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources: Access Control and restrictions per user per role;
  • 6. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources: Access Control and restrictions per user per role; System policy and restrictions; and
  • 7. Introduction System Protection Malware Cyber-security Finale What is IS Security? Information system security is the software and hardware mechanisms that prevent access to certain system resources: Access Control and restrictions per user per role; System policy and restrictions; and Access Control and restriction per network/machine per role.
  • 8. Introduction System Protection Malware Cyber-security Finale What IS security does include?
  • 9. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of
  • 10. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.);
  • 11. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.);
  • 12. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.); Physical attacks (e.g., boot computer with OS DVD);
  • 13. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.); Physical attacks (e.g., boot computer with OS DVD); IS attacks via modified hardware [e.g., Mifare attacks (RFID systems), etc.] and
  • 14. Introduction System Protection Malware Cyber-security Finale What IS security does include? Prevention of System level security (e.g., OS attacks, application overflow, etc.); Network level security (e.g., network data evesdroping, machine impersonization, etc.); Physical attacks (e.g., boot computer with OS DVD); IS attacks via modified hardware [e.g., Mifare attacks (RFID systems), etc.] and IS malfunction via Hardware I/O attacks (e.g., USB device plugged into a system).
  • 15. Introduction System Protection Malware Cyber-security Finale What does System Security protects?
  • 16. Introduction System Protection Malware Cyber-security Finale What does System Security protects? The system hardware, which must be protected physically. Maxim: Protect thy console before thy self!
  • 17. Introduction System Protection Malware Cyber-security Finale What does System Security protects? The system hardware, which must be protected physically. Maxim: Protect thy console before thy self! The system’s OS and software resources. Also, users’ files and per user OS restrictions.
  • 18. Introduction System Protection Malware Cyber-security Finale What does System Security protects? The system hardware, which must be protected physically. Maxim: Protect thy console before thy self! The system’s OS and software resources. Also, users’ files and per user OS restrictions. The system’s local services (e.g., shared service resources).
  • 19. Introduction System Protection Malware Cyber-security Finale What does Network Security protects?
  • 20. Introduction System Protection Malware Cyber-security Finale What does Network Security protects? System services available to end users via the Internet or Local network.
  • 21. Introduction System Protection Malware Cyber-security Finale What does Network Security protects? System services available to end users via the Internet or Local network. The data that traverses through the network.
  • 22. Introduction System Protection Malware Cyber-security Finale What does Network Security protects? System services available to end users via the Internet or Local network. The data that traverses through the network. The machine network information and the levels of per machine (pc) access on network resources (provided from other machines).
  • 23. Introduction System Protection Malware Cyber-security Finale Hackers…
  • 24. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc.
  • 25. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems.
  • 26. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994).
  • 27. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000).
  • 28. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000).
  • 29. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000).
  • 30. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000). Jonathan James: US department of defence hacker-spy.
  • 31. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000). Jonathan James: US department of defence hacker-spy. Gary Mckinnon: US Air Force, US Navy, and NASA systems hacker.
  • 32. Introduction System Protection Malware Cyber-security Finale Hackers… A person who secretly gets access to a computer system in order to get information, cause damage, etc. Robert Tapan Morris: He released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. Vladimir Levin: Citybank hacker (1994). Michael Calce: Yahoo hack (2000). David Smith: Melisa e-mail clone virus (2000). Adrian Lamo: The homeless hacker of Microsoft, New York Times and Yahoo! (2000). Jonathan James: US department of defence hacker-spy. Gary Mckinnon: US Air Force, US Navy, and NASA systems hacker. Kevin Mitnick: switching system (PBX) phreacker (one who gains illegal access to the telephone system).
  • 33. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I
  • 34. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more.
  • 35. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work.
  • 36. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work. lamer A person who knows little and uses nukes to do his work
  • 37. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work. lamer A person who knows little and uses nukes to do his work cracker Someone who uses software cracking to modify a program.
  • 38. Introduction System Protection Malware Cyber-security Finale Vocabulary PART I noob Someone who knows little and has no will to learn any more. script kiddie Someone who relies on premade exploit programs and files (”scripts”) to conduct his hacking, and refuses to bother to learn how they work. lamer A person who knows little and uses nukes to do his work cracker Someone who uses software cracking to modify a program. Warez Copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law.
  • 39. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II
  • 40. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be.
  • 41. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be. Guru An authority on computers and computing.
  • 42. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be. Guru An authority on computers and computing. Poser One who tries to fit in but with exaggeration; pretends to be someone whose not.
  • 43. Introduction System Protection Malware Cyber-security Finale Vocabulary Part II warez d00dz Are part of the darkest internet subculture. They usually copy the warez from their own software, breaking copy protection if need be. Guru An authority on computers and computing. Poser One who tries to fit in but with exaggeration; pretends to be someone whose not. Leecher In the context of to peer to peer file sharing protocols, or networks (e.g., Bittorrent), someone who consumes bandwidth by downloading, yet has no will to upload or give back to a community.
  • 44. Introduction System Protection Malware Cyber-security Finale Hackers…
  • 45. Introduction System Protection Malware Cyber-security Finale Hackers… The population pyramid of  potential  Information System attackers AVERAGE NON­SKILLED USER  NOOB KIDDIE SCRIPTER LAMER CRACKER PHREAKS/WAREZ D00DZ HACKER GURU >25,000 >50,000 <8,000 <3,000 <500 <150 POSER/WANNABEE LEECHER Population/10,000,000
  • 46. Introduction System Protection Malware Cyber-security Finale Hacker Manners
  • 47. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html).
  • 48. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux).
  • 49. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!).
  • 50. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access.
  • 51. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP)
  • 52. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP) They do not portscan or sniff or expose themselves to danger. They have lamers for this.
  • 53. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP) They do not portscan or sniff or expose themselves to danger. They have lamers for this. They never delete systems, only deface and install rootkits or backdoors.
  • 54. Introduction System Protection Malware Cyber-security Finale Hacker Manners They use Jargon (http://www.catb.org/jargon/html/go01.html). The use nicknames from irc channesl (#hack or #linux). Always two there are a master and an apprentice (Yoda syntax!). Exchange knowledge with knowledge or zero date exploits with remote access. Follow strategy and protection measures (e.g., connect from owned IP) They do not portscan or sniff or expose themselves to danger. They have lamers for this. They never delete systems, only deface and install rootkits or backdoors. Maintain low profile and utilize social engineering techniques.
  • 55. Introduction System Protection Malware Cyber-security Finale Malware or more …ware!
  • 56. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role.
  • 57. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.”
  • 58. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.” Spyware Software that aims to gather information about a person or force a person visit specific web, view ads using popup windows sites or metasearch engines.
  • 59. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.” Spyware Software that aims to gather information about a person or force a person visit specific web, view ads using popup windows sites or metasearch engines. Trojans A type of malware that is often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
  • 60. Introduction System Protection Malware Cyber-security Finale Malware or more …ware! Computer Virus A binary patch set to a system’s executable file “accidentally” by an administrator role. Worm Something similar to a virus by design and is considered to be a sub-class of a virus. Also, a worm has the capability to travel without any human “intervention.” Spyware Software that aims to gather information about a person or force a person visit specific web, view ads using popup windows sites or metasearch engines. Trojans A type of malware that is often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Exploit A small program (source code) that uses a system’s vulnerability in order to gain unauthorized access to IS resources
  • 61. Introduction System Protection Malware Cyber-security Finale Types of Exploits
  • 62. Introduction System Protection Malware Cyber-security Finale Types of Exploits Local exploits Applicable when the program requires local system user access.
  • 63. Introduction System Protection Malware Cyber-security Finale Types of Exploits Local exploits Applicable when the program requires local system user access. Remote exploits Applicable when the program requires only service connection or service user access.
  • 64. Introduction System Protection Malware Cyber-security Finale Types of Exploits Local exploits Applicable when the program requires local system user access. Remote exploits Applicable when the program requires only service connection or service user access. Zero date When the code is published in the Internet is less that 3 months time.
  • 65. Introduction System Protection Malware Cyber-security Finale Types of Trojans
  • 66. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network.
  • 67. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
  • 68. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer.
  • 69. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer. Spy Trojans Usaually a standalone program that allows a hacker to monitor user’s activities on an infected computer. Typically, they capture screen, keyboard, I/O operations.
  • 70. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer. Spy Trojans Usaually a standalone program that allows a hacker to monitor user’s activities on an infected computer. Typically, they capture screen, keyboard, I/O operations. Trojans to hide Trojans Malicious software that hides itself, so its activity doesn’t appear in the list of processes.
  • 71. Introduction System Protection Malware Cyber-security Finale Types of Trojans Root kit A collection of programs that enable administrator-level access to a computer or computer network. Backdoor A method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Fake Antivirus It masquerades as legitimate software, but is actually a malicious program that extorts money from you to “fix” your computer. Spy Trojans Usaually a standalone program that allows a hacker to monitor user’s activities on an infected computer. Typically, they capture screen, keyboard, I/O operations. Trojans to hide Trojans Malicious software that hides itself, so its activity doesn’t appear in the list of processes. OS kernel module Trojans A kind of Trojan horse which combines with kernel Rootkit technologies.
  • 72. Introduction System Protection Malware Cyber-security Finale Network Security Malware
  • 73. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version).
  • 74. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet.
  • 75. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet. IP Address Spoofing A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity (e.g., sending e-mail from…NASA!).
  • 76. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet. IP Address Spoofing A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity (e.g., sending e-mail from…NASA!). Synchronize Packet Flood A cracker sends many connection requests in a rapid pace without responding. This activity leaves the first packet in the buffer so that other legitimate connection requests cannot be completed
  • 77. Introduction System Protection Malware Cyber-security Finale Network Security Malware Port scanners (which posts are open?) and TCP Fingerprinters (Detecting remote OS and its version). Magic Packet Activated Backdoor The backdoor opens a port, executes a signle command, initiates a session or perform some other action when it received a single magic packet. IP Address Spoofing A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity (e.g., sending e-mail from…NASA!). Synchronize Packet Flood A cracker sends many connection requests in a rapid pace without responding. This activity leaves the first packet in the buffer so that other legitimate connection requests cannot be completed Sniffer A network sniffers monitors data flowing over computer network links.
  • 78. Introduction System Protection Malware Cyber-security Finale Network Security Malware II
  • 79. Introduction System Protection Malware Cyber-security Finale Network Security Malware II Man-in-the-middle Attacks type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other.
  • 80. Introduction System Protection Malware Cyber-security Finale Network Security Malware II Man-in-the-middle Attacks type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. Remote xploits Exploits done remotely by a cracker across the Internet or by a user’s having privileges on the system. Example: Fred Durst’s home computer was remotely attacked and someone made a copy of a 2003 three-minute private video in Durst’s possession.
  • 81. Introduction System Protection Malware Cyber-security Finale Network Security Malware II Man-in-the-middle Attacks type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. Remote xploits Exploits done remotely by a cracker across the Internet or by a user’s having privileges on the system. Example: Fred Durst’s home computer was remotely attacked and someone made a copy of a 2003 three-minute private video in Durst’s possession. Denial of Service (DoS) An attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing websites or other services that rely on the affected computer.
  • 82. Introduction System Protection Malware Cyber-security Finale What is Cryptography?
  • 83. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences.
  • 84. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences. It is achieved by making information unintelligible.
  • 85. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences. It is achieved by making information unintelligible. Here is how it works: plaintext encryption ciphertext decryption plaintext Example: Caesar’s cipher is a type of substitution cipher in which each letter in the plaintext is “shifted” a certain number of places down the alphabet. For instance the word “Lillija” is ecrypted as “Uruursj” if we shift 9 places.
  • 86. Introduction System Protection Malware Cyber-security Finale What is Cryptography? Cryptography is the art and science of keeping information secure from unintended audiences. It is achieved by making information unintelligible. Here is how it works: plaintext encryption ciphertext decryption plaintext Example: Caesar’s cipher is a type of substitution cipher in which each letter in the plaintext is “shifted” a certain number of places down the alphabet. For instance the word “Lillija” is ecrypted as “Uruursj” if we shift 9 places. Post-quantum cryptography.
  • 87. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures
  • 88. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date.
  • 89. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software.
  • 90. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats:
  • 91. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/
  • 92. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/
  • 93. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/ http://www.securityfocus.com/
  • 94. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/ http://www.securityfocus.com/ Periodically use vulnerability scanner software:
  • 95. Introduction System Protection Malware Cyber-security Finale System Security Countermeasures Keep The Operating System up to date. Depending on your OS install antivirus software. Gather Information about zero day threats: http://www.symantec.com/security_response/ http://www.esecurityplanet.com/ http://www.securityfocus.com/ Periodically use vulnerability scanner software: http://sectools.org/tag/vuln-scanners/
  • 96. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures
  • 97. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic.
  • 98. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners.
  • 99. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners. Check thoroughly network services configuration.
  • 100. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners. Check thoroughly network services configuration. Update services and check shared service resources permissions
  • 101. Introduction System Protection Malware Cyber-security Finale Network Security Countermeasures Use custom configured firewall that filters traffic. Use port sensitive sniffers (port sentry) to detect scanners. Check thoroughly network services configuration. Update services and check shared service resources permissions Use Network Intrusion Detection System to catch threats targeting your vulnerable systems.
  • 102. Introduction System Protection Malware Cyber-security Finale Finale!
  • 103. Introduction System Protection Malware Cyber-security Finale Finale! We presented
  • 104. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS;
  • 105. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means;
  • 106. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means; the various forms of malware;
  • 107. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means; the various forms of malware; advice on cyber-security.
  • 108. Introduction System Protection Malware Cyber-security Finale Finale! We presented general information about IS; what system protection means; the various forms of malware; advice on cyber-security. Thank you very much for your attension!