Common security
threats.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Directed security threats.
– Opportunity security threats.
PACE-IT.
Page 4
Attacks don’t always fall
into a neatly confined
security category.
Many attacks combine the different categories to
increase their effectiveness. User education is the
best method of mitigating these common security
threats.
PACE-IT.
Page 5
Common security threats.
Page 6
– Shoulder surfing.
» Someone looking over the shoulder in an attempt to get
access to information they are not supposed to have.
» The user doesn’t need to be present for shoulder surfing
to occur.
– Social engineering.
» Someone using social pressure to get the user to divulge
information or secrets.
» Can occur in person, over the phone, through email, by
fake memos, and through other means.
Common security threats.
Page 7
– Phishing.
» A type of social engineering.
» Attempting to get the end user to divulge sensitive
information (as in usernames and passwords) by
masquerading as a trusted entity. Communication is
usually through email or some other electronic media.
– Pharming.
» Closely related to phishing, but can be more passive in
nature.
» Pharming specifically uses a webpage or site to glean
sensitive information.
» The website or page tricks the user into thinking they are
at a trusted site, often through the use of redirection.
Common security threats.
Page 8
Common security threats.
Page 9
– Malware
» Malicious software used with the intent of causing harm;
however, malware can also be used to describe
legitimate code that is written poorly.
» Broad category that contains all code based security
threats.
» Is often hidden in legitimate code.
– Rootkits.
» Stealth software that takes over the root (administrative)
account.
» Attempts to hide its presence from the end user and
antivirus through its authority level.
» Rootkits can be extremely difficult to remove because of
their level of access to the system.
Common security threats.
Page 10
Spyware is software that
installs itself with the intent
of collecting a user’s data or
information on habits,
without the user’s consent.
Spyware is often configured to collect the
information and then periodically transmit it to a
remote site. A key logger is a form of spyware that
collects all of the user’s keystrokes during the
collection period.
Common security threats.
Page 11
– Virus.
» Malware that attaches itself to a host file.
» When the host file is run so is the executable file of the
virus.
– Types of viruses.
» Program or application: attaches to a program or
application; when the host file is opened, the virus runs.
» Boot sector: attaches to the boot sector of the PC; when
the PC is booted, the virus loads (think rootkit).
» Polymorphic: attempts to hide its presence by changing
its signature.
» Stealth: uses various methods to hide its presence.
» Multipartite: combines several components into one
package. None of the components on their own are
effective.
Common security threats.
Page 12
– Worm
» Malware that doesn’t need a host file.
» Exploits network resources and services to propagate
and move.
» Self replicating.
» Consumes network resources, often resulting in a
downed network.
– Trojan
» Malware that hides its purpose by disguising itself as
something that the end user desires.
» Used to get the end user to download a virus package.
» This is often the method that is used to establish botnets
or zombie nodes.
Common security threats.
Page 13
Common security threats.
Shoulder surfing requires the attacker to be nearby. Social engineering is
using social pressure to exploit a user and gain knowledge. Phishing and
pharming are similar. Phishing uses electronic media to get the user to
voluntarily divulge information. Pharming uses a website or page.
Topic
Directed security threats.
Summary
Malware encompasses any code-based security threat. Rootkits gain
access to the root level. Spyware records a user’s information and habits.
Viruses require a host file, worms require network access, and a Trojan is
not what it seams.
Opportunity security threats.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: IT Security Measures
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT: Securing the Workstation
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT: IT Security Measures
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT: Securing the Workstation
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT: Physical Network Security Control
PACE-IT, Security+3.6: Security Enhancement Techniques

What's hot (20)

PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT: Common Threats (part 2)
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT: Risk and Security Related Concepts
PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 1)
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT: Common Network Vulnerabilities
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT: Common Network Security Issues
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+1.5: Wireless Security Considerations
Ad

Similar to Pace IT - Common Security Threats (20)

PPTX
Pace IT - Threats & Vulnerabilities Mitigation
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
Pace IT - Secure Mobile Devices
PDF
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
PPTX
Pace IT - Troubleshooting Security
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PPTX
Introduction to cyber security
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPTX
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
PPT
Information Technology Security Basics
PPTX
Social engineering
PDF
Cybersecurity Interview Questions and Answers.pdf
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PDF
The Small Business Cyber Security Best Practice Guide
PDF
Mark Lanterman - The Risk Report October 2015
PDF
Cyber Security Matters a book by Hama David Bundo
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PPTX
Mobile security
Pace IT - Threats & Vulnerabilities Mitigation
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT - Secure Mobile Devices
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
Pace IT - Troubleshooting Security
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
Introduction to cyber security
I’ve Been Hacked  The Essential Steps to Take Next
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Information Technology Security Basics
Social engineering
Cybersecurity Interview Questions and Answers.pdf
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
The Small Business Cyber Security Best Practice Guide
Mark Lanterman - The Risk Report October 2015
Cyber Security Matters a book by Hama David Bundo
Principles of Information Security 6th Edition Whitman Solutions Manual
Mobile security
Ad

More from Pace IT at Edmonds Community College (16)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.9: Goals of Security Controls

Recently uploaded (20)

PPTX
What’s under the hood: Parsing standardized learning content for AI
PPTX
Module on health assessment of CHN. pptx
PDF
English Textual Question & Ans (12th Class).pdf
PDF
International_Financial_Reporting_Standa.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
Computer Architecture Input Output Memory.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
advance database management system book.pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Hazard Identification & Risk Assessment .pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
What’s under the hood: Parsing standardized learning content for AI
Module on health assessment of CHN. pptx
English Textual Question & Ans (12th Class).pdf
International_Financial_Reporting_Standa.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Unit 4 Computer Architecture Multicore Processor.pptx
Empowerment Technology for Senior High School Guide
Computer Architecture Input Output Memory.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
advance database management system book.pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Hazard Identification & Risk Assessment .pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Virtual and Augmented Reality in Current Scenario
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf

Pace IT - Common Security Threats

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Directed security threats. – Opportunity security threats. PACE-IT.
  • 4. Page 4 Attacks don’t always fall into a neatly confined security category. Many attacks combine the different categories to increase their effectiveness. User education is the best method of mitigating these common security threats. PACE-IT.
  • 6. Page 6 – Shoulder surfing. » Someone looking over the shoulder in an attempt to get access to information they are not supposed to have. » The user doesn’t need to be present for shoulder surfing to occur. – Social engineering. » Someone using social pressure to get the user to divulge information or secrets. » Can occur in person, over the phone, through email, by fake memos, and through other means. Common security threats.
  • 7. Page 7 – Phishing. » A type of social engineering. » Attempting to get the end user to divulge sensitive information (as in usernames and passwords) by masquerading as a trusted entity. Communication is usually through email or some other electronic media. – Pharming. » Closely related to phishing, but can be more passive in nature. » Pharming specifically uses a webpage or site to glean sensitive information. » The website or page tricks the user into thinking they are at a trusted site, often through the use of redirection. Common security threats.
  • 9. Page 9 – Malware » Malicious software used with the intent of causing harm; however, malware can also be used to describe legitimate code that is written poorly. » Broad category that contains all code based security threats. » Is often hidden in legitimate code. – Rootkits. » Stealth software that takes over the root (administrative) account. » Attempts to hide its presence from the end user and antivirus through its authority level. » Rootkits can be extremely difficult to remove because of their level of access to the system. Common security threats.
  • 10. Page 10 Spyware is software that installs itself with the intent of collecting a user’s data or information on habits, without the user’s consent. Spyware is often configured to collect the information and then periodically transmit it to a remote site. A key logger is a form of spyware that collects all of the user’s keystrokes during the collection period. Common security threats.
  • 11. Page 11 – Virus. » Malware that attaches itself to a host file. » When the host file is run so is the executable file of the virus. – Types of viruses. » Program or application: attaches to a program or application; when the host file is opened, the virus runs. » Boot sector: attaches to the boot sector of the PC; when the PC is booted, the virus loads (think rootkit). » Polymorphic: attempts to hide its presence by changing its signature. » Stealth: uses various methods to hide its presence. » Multipartite: combines several components into one package. None of the components on their own are effective. Common security threats.
  • 12. Page 12 – Worm » Malware that doesn’t need a host file. » Exploits network resources and services to propagate and move. » Self replicating. » Consumes network resources, often resulting in a downed network. – Trojan » Malware that hides its purpose by disguising itself as something that the end user desires. » Used to get the end user to download a virus package. » This is often the method that is used to establish botnets or zombie nodes. Common security threats.
  • 13. Page 13 Common security threats. Shoulder surfing requires the attacker to be nearby. Social engineering is using social pressure to exploit a user and gain knowledge. Phishing and pharming are similar. Phishing uses electronic media to get the user to voluntarily divulge information. Pharming uses a website or page. Topic Directed security threats. Summary Malware encompasses any code-based security threat. Rootkits gain access to the root level. Spyware records a user’s information and habits. Viruses require a host file, worms require network access, and a Trojan is not what it seams. Opportunity security threats.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.