SlideShare a Scribd company logo
3
Most read
5
Most read
7
Most read
SystemSystem
VulnerabilityVulnerability
and Abuseand Abuse
• By Prakash Raval
Why Systems Are VulnerableWhy Systems Are Vulnerable
• Hardware problems
• Breakdowns, configuration errors, damage from improper use
or crime.
• Software problems
• Programming errors, installation errors, unauthorized
changes.
• Disasters
• Power failures, flood, fires, and so on.
System Vulnerability and Abuse
Contemporary Security Challenges and VulnerabilitiesContemporary Security Challenges and Vulnerabilities
The architecture of a Web-based application typically includes a Web client, a server,
and corporate information systems linked to databases. Each of these components
presents security challenges and vulnerabilities. Floods, fires, power failures, and other
electrical problems in the network.
System Vulnerability and Abuse
Figure 7-1
• Internet vulnerabilities
• Network open to anyone
• Size of Internet means abuses can have wide impact
• Use of fixed Internet addresses with permanent
connections to Internet eases identification by hackers
• E-mail attachments
• E-mail used for transmitting trade secrets
• IM messages lack security, can be easily intercepted
System Vulnerability and Abuse
• Wireless security challenges
• SSIDs (service set identifiers)
• Identify access points.
• Broadcast multiple times.
• War driving
• Eavesdroppers drive by buildings and try to intercept network
traffic
• When hacker gains access to SSID, has access to network’s
resources
• WEP (Wired Equivalent Privacy)
• Security standard for 802.11
• Basic specification uses shared password for both users and
access point
• Users often fail to use security features
System Vulnerability and Abuse
Wi-Fi Security ChallengesWi-Fi Security Challenges
Figure 7-2
Many Wi-Fi
networks can be
penetrated easily
by intruders using
sniffer programs to
obtain an address
to access the
resources of a
network without
authorization.
System Vulnerability and Abuse
Malicious Software: Viruses, Worms, Trojan Horses,Malicious Software: Viruses, Worms, Trojan Horses,
and Spywareand Spyware
• Malware
• Viruses
• Rogue software program that attaches itself to other
software programs or data files in order to be executed
• Worms
• Independent computer programs that copy themselves from
one computer to other computers over a network
• Trojan horses
• Software program that appears to be benign but then does
something other than expected.
System Vulnerability and Abuse
Malicious Software: Viruses, Worms, Trojan Horses,Malicious Software: Viruses, Worms, Trojan Horses,
and Spywareand Spyware
• Malware (cont.)
• Spyware
• Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and serve
up advertising
• Key loggers
• Record every keystroke on computer to steal serial
numbers, passwords, launch Internet attacks
System Vulnerability and Abuse
Hackers and Computer CrimeHackers and Computer Crime
System Vulnerability and Abuse
• Hackers versus crackers
• Activities include:
• System intrusion
• System damage
• Cybervandalism
• Intentional disruption, defacement,
destruction of Web site or corporate
information system
Hackers and Computer CrimeHackers and Computer Crime
System Vulnerability and Abuse
• Spoofing
• Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else
• Redirecting Web link to address different from intended one,
with site masquerading as intended destination
• Sniffer
• Eavesdropping program that monitors information traveling
over network
• Enables hackers to steal proprietary information such as e-
mail, company files, and so on
Hackers and Computer CrimeHackers and Computer Crime
System Vulnerability and Abuse
• Denial-of-service attacks (DoS)
• Flooding server with thousands of false requests to crash the
network.
• Distributed denial-of-service attacks (DDoS)
• Use of numerous computers to launch a DoS
• Botnets
• Networks of “zombie” PCs infiltrated by bot malware
Hackers and Computer CrimeHackers and Computer Crime
System Vulnerability and Abuse
• Computer crime
• Defined as “any violations of criminal law that involve a
knowledge of computer technology for their perpetration,
investigation, or prosecution”
• Computer may be target of crime:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime:
• Theft of trade secrets
• Using e-mail for threats or harassment
Hackers and Computer CrimeHackers and Computer Crime
System Vulnerability and Abuse
• Identity theft
• Theft of personal information (social security id, driver’s
license, or credit card numbers) to impersonate someone else
• Phishing
• Setting up fake Web sites or sending e-mail messages that
look like legitimate businesses to ask users for confidential
personal data
• Evil twins
• Wireless networks that pretend to offer trustworthy Wi-Fi
connections to the Internet
Hackers and Computer CrimeHackers and Computer Crime
System Vulnerability and Abuse
• Pharming
• Redirects users to a bogus Web page, even when
individual types correct Web page address into his
or her browser
• Click fraud
• Occurs when individual or computer program
fraudulently clicks on online ad without any intention
of learning more about the advertiser or making a
purchase

More Related Content

PPTX
INFORMATION SECURITY
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Business Continuity & Disaster Recovery
PPTX
Supervision and management
PPTX
Cost of capital
PDF
Information Security Risk Management
PPTX
CVP Analysis
PPTX
Artificial Intelligence(AI).
INFORMATION SECURITY
Network security (vulnerabilities, threats, and attacks)
Business Continuity & Disaster Recovery
Supervision and management
Cost of capital
Information Security Risk Management
CVP Analysis
Artificial Intelligence(AI).

What's hot (20)

PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
PPTX
Security and control in mis
PDF
Basics of Cyber Security
PPT
Chapter 5 Planning for Security-students.ppt
PPTX
Cyber security government ppt By Vishwadeep Badgujar
PPTX
Computer security concepts
PPTX
CYBER SECURITY
PPT
Security & control in management information system
PPTX
Types of attacks
PPTX
System Analysis and Design
PPT
Ethical And Social Issues in MIS - Management Information System
PPTX
Introduction to Information Security
PPTX
PPTX
Cyber security
PPTX
Cyber Security
PPTX
Security threats
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPT
Information security and Attacks
PPTX
Introduction to cyber security
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Security and control in mis
Basics of Cyber Security
Chapter 5 Planning for Security-students.ppt
Cyber security government ppt By Vishwadeep Badgujar
Computer security concepts
CYBER SECURITY
Security & control in management information system
Types of attacks
System Analysis and Design
Ethical And Social Issues in MIS - Management Information System
Introduction to Information Security
Cyber security
Cyber Security
Security threats
Cyber Security Presentation "It Will Never Happen To Me"
Information security and Attacks
Introduction to cyber security
Ad

Similar to System vulnerability and abuse (20)

PPTX
securing_information_systems_._lec6.pptx
PPTX
Ethics,security and privacy control
PPTX
9 - Security
PPT
PDF
8 - Securing Info Systems
PPTX
Ppt on cyber security
PDF
ppt pdf ajay.pdf
PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Information cyber security
PPTX
Computer Security Presentation
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Cybersecurity Training
PPTX
Hacking and cyber security
PPTX
malicious attacks on digital forensics..
PPTX
Network security and firewalls
PPTX
Cyber crime and secuity
PPTX
Cyber crime and secuity
PDF
Computer security
PDF
Security and Privacy.PDF
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
securing_information_systems_._lec6.pptx
Ethics,security and privacy control
9 - Security
8 - Securing Info Systems
Ppt on cyber security
ppt pdf ajay.pdf
Information & cyber security, Winter training ,bsnl. online
Information cyber security
Computer Security Presentation
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Cybersecurity Training
Hacking and cyber security
malicious attacks on digital forensics..
Network security and firewalls
Cyber crime and secuity
Cyber crime and secuity
Computer security
Security and Privacy.PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
Ad

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Institutional Correction lecture only . . .
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Classroom Observation Tools for Teachers
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Complications of Minimal Access Surgery at WLH
Anesthesia in Laparoscopic Surgery in India
Pharma ospi slides which help in ospi learning
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Institutional Correction lecture only . . .
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Classroom Observation Tools for Teachers
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
TR - Agricultural Crops Production NC III.pdf
Microbial diseases, their pathogenesis and prophylaxis
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Cell Structure & Organelles in detailed.
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Complications of Minimal Access Surgery at WLH

System vulnerability and abuse

  • 2. Why Systems Are VulnerableWhy Systems Are Vulnerable • Hardware problems • Breakdowns, configuration errors, damage from improper use or crime. • Software problems • Programming errors, installation errors, unauthorized changes. • Disasters • Power failures, flood, fires, and so on. System Vulnerability and Abuse
  • 3. Contemporary Security Challenges and VulnerabilitiesContemporary Security Challenges and Vulnerabilities The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems in the network. System Vulnerability and Abuse Figure 7-1
  • 4. • Internet vulnerabilities • Network open to anyone • Size of Internet means abuses can have wide impact • Use of fixed Internet addresses with permanent connections to Internet eases identification by hackers • E-mail attachments • E-mail used for transmitting trade secrets • IM messages lack security, can be easily intercepted System Vulnerability and Abuse
  • 5. • Wireless security challenges • SSIDs (service set identifiers) • Identify access points. • Broadcast multiple times. • War driving • Eavesdroppers drive by buildings and try to intercept network traffic • When hacker gains access to SSID, has access to network’s resources • WEP (Wired Equivalent Privacy) • Security standard for 802.11 • Basic specification uses shared password for both users and access point • Users often fail to use security features System Vulnerability and Abuse
  • 6. Wi-Fi Security ChallengesWi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse
  • 7. Malicious Software: Viruses, Worms, Trojan Horses,Malicious Software: Viruses, Worms, Trojan Horses, and Spywareand Spyware • Malware • Viruses • Rogue software program that attaches itself to other software programs or data files in order to be executed • Worms • Independent computer programs that copy themselves from one computer to other computers over a network • Trojan horses • Software program that appears to be benign but then does something other than expected. System Vulnerability and Abuse
  • 8. Malicious Software: Viruses, Worms, Trojan Horses,Malicious Software: Viruses, Worms, Trojan Horses, and Spywareand Spyware • Malware (cont.) • Spyware • Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising • Key loggers • Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks System Vulnerability and Abuse
  • 9. Hackers and Computer CrimeHackers and Computer Crime System Vulnerability and Abuse • Hackers versus crackers • Activities include: • System intrusion • System damage • Cybervandalism • Intentional disruption, defacement, destruction of Web site or corporate information system
  • 10. Hackers and Computer CrimeHackers and Computer Crime System Vulnerability and Abuse • Spoofing • Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else • Redirecting Web link to address different from intended one, with site masquerading as intended destination • Sniffer • Eavesdropping program that monitors information traveling over network • Enables hackers to steal proprietary information such as e- mail, company files, and so on
  • 11. Hackers and Computer CrimeHackers and Computer Crime System Vulnerability and Abuse • Denial-of-service attacks (DoS) • Flooding server with thousands of false requests to crash the network. • Distributed denial-of-service attacks (DDoS) • Use of numerous computers to launch a DoS • Botnets • Networks of “zombie” PCs infiltrated by bot malware
  • 12. Hackers and Computer CrimeHackers and Computer Crime System Vulnerability and Abuse • Computer crime • Defined as “any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution” • Computer may be target of crime: • Breaching confidentiality of protected computerized data • Accessing a computer system without authority • Computer may be instrument of crime: • Theft of trade secrets • Using e-mail for threats or harassment
  • 13. Hackers and Computer CrimeHackers and Computer Crime System Vulnerability and Abuse • Identity theft • Theft of personal information (social security id, driver’s license, or credit card numbers) to impersonate someone else • Phishing • Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data • Evil twins • Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
  • 14. Hackers and Computer CrimeHackers and Computer Crime System Vulnerability and Abuse • Pharming • Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser • Click fraud • Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

Editor's Notes