复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Security

Security Chapter 9 Updated January 2009 boXU Zhengchuan Fudan University
Chapter 9 Updated January 2009 XU Zhengchuan Fudan University Security

The Threat Environment
The Threat Environment

Figure 9-1: CSI/FBI Survey Companies face many Attacks There are many Viruses(and other malware) types of attacks Insider abuse of net access In Order of Laptop theft Decreasing Frequency Unauthorized access by insiders Denial-of-service attacks System penetration Sabotage Theft of proprietary information Fraud Telecoms eavesdropping and active wiretaps
3 Figure 9-1: CSI/FBI Survey • Companies Face Many Attacks – Viruses (and other malware) – Insider abuse of net access – Laptop theft – Unauthorized access by insiders – Denial-of-service attacks – System penetration – Sabotage – Theft of proprietary information – Fraud – Telecoms eavesdropping and active wiretaps In Order of Decreasing Frequency There are many types of attacks

Figure 9-1: CSI/FBI Survey Very Common Successful Incidents Viruses and other malware Insider abuse of net access Laptop theft LOW-Frequency /High-Damage Attacks Theft of proprietary information($2.7 M per incident) Denial-of-service attacks ($1.4 M per incident)
4 Figure 9-1: CSI/FBI Survey • Very Common Successful Incidents – Viruses and other malware – Insider abuse of net access – Laptop theft • Low-Frequency / High-Damage Attacks – Theft of proprietary information ($2.7 M per incident) – Denial-of-service attacks ($1.4 M per incident)

Figure 9-2: Malware Malware A general name for evil software Viruses Pieces of code that attach to other programs When infected programs execute, the virus executes Infect other programs on the computer Spread to other computers by e-mail attachments, IM peer-to-peer file transfers, etc Antivirus programs are needed to scan arriving files Also scans for other malware 5
5 Figure 9-2: Malware • Malware – A general name for evil software • Viruses – Pieces of code that attach to other programs – When infected programs execute, the virus executes – Infect other programs on the computer – Spread to other computers by e-mail attachments, IM, peer-to-peer file transfers, etc. – Antivirus programs are needed to scan arriving files • Also scans for other malware

Figure 9-2: Malware Worms Stand-alone programs that do not need to attach to other programs Can propagate like viruses through e-mail, etc But this require human gullibility, which is slow In addition, vulnerability-enabled worms jump to victim hosts directl Can do this because hosts have vulnerabilities Vulnerability-enabled worms can spread with amazing speed Vendors develop patches for vulnerabilities but companies often fail or are slow to apply them 6
6 Figure 9-2: Malware • Worms – Stand-alone programs that do not need to attach to other programs – Can propagate like viruses through e-mail, etc. • But this require human gullibility, which is slow – In addition, vulnerability-enabled worms jump to victim hosts directly • Can do this because hosts have vulnerabilities • Vulnerability-enabled worms can spread with amazing speed • Vendors develop patches for vulnerabilities but companies often fail or are slow to apply them

Figure 9-2: Malware Payloads After propagation viruses and worms execute their payloads(damage code Payloads erase hard disks, send users to pornography sites if they mistype URLS Trojan horses are exploitation programs that disguise themselves as system files
7 Figure 9-2: Malware • Payloads – After propagation, viruses and worms execute their payloads (damage code) – Payloads erase hard disks, send users to pornography sites if they mistype URLs – Trojan horses are exploitation programs that disguise themselves as system files

Figure 9-2: Malware · Attacks on Individuals Social engineering is tricking the victim into doing something against his or her interests Spam is unsolicited commercial e-mail Credit card number theft is performed by carders Identity theft is collecting enough data to impersonate the victim in large financial transactions Fraud involves get-rich-quick schemes, medical scams 8
8 Figure 9-2: Malware • Attacks on Individuals – Social engineering is tricking the victim into doing something against his or her interests – Spam is unsolicited commercial e-mail – Credit card number theft is performed by carders – Identity theft is collecting enough data to impersonate the victim in large financial transactions – Fraud involves get-rich-quick schemes, medical scams

Figure 9-2: Malware · Attacks on Individuals Adware pops up advertisements Spyware collects sensitive data and sends it to an attacker Phishing: sophisticated social engineering attack in which an authentic-looking e-mail or website entices the user to enter his or her username, password, or other sensitive information 9
9 Figure 9-2: Malware • Attacks on Individuals – Adware pops up advertisements – Spyware collects sensitive data and sends it to an attacker – Phishing: sophisticated social engineering attack in which an authentic-looking e-mail or website entices the user to enter his or her username, password, or other sensitive information

Figure 9-3: Human Break-Ins(Hacking) Human Break-Ins Viruses and worms rely on one main attack method Humans can keep trying different approaches until they succeed Hacking Hacking is breaking into a computer Hacking is intentionally using a computer resource without authorization or in excess of authorization 10
10 Figure 9-3: Human Break-Ins (Hacking) • Human Break-Ins – Viruses and worms rely on one main attack method – Humans can keep trying different approaches until they succeed • Hacking – Hacking is breaking into a computer – Hacking is intentionally using a computer resource without authorization or in excess of authorization
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)TCP/IP Internetworking.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)TCP/IP Internetworking.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)TCP/IP Internetworking.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wide Area Networks(WANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wide Area Networks(WANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wide Area Networks(WANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Telecommunications.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Telecommunications.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Telecommunications.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wireless LANs(WLANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wireless LANs(WLANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wireless LANs(WLANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Token-Ring Networks.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Ethernet LANs.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Ethernet LANs.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Physical Layer Propagation:UTP and Optical Fiber.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Physical Layer Propagation:UTP and Optical Fiber.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Hands On:Cutting and Connectorizing UTP.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Network Standards Layered Architectures.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Network Standards Layered Architectures.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Network Management.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Networked Applications.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Topics Covered(胥正川).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Ethernet LANs.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Wide Area Networks(WANs).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)移动电话通信原理(补充资料).ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)无线局域网补充删节版本.ppt
- 复旦大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)移动商务介绍(概念及其特点、移动商务与电子商务、价值链及商业模式).ppt
- 复旦大学:《数据结构与算法设计》考试样卷_2009-2010年度A卷(试卷).pdf
- 复旦大学:《数据结构与算法设计》考试样卷_2009-2010年度A卷(答案).pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 1. Stack.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 2. Divide and Conquer.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 3. Hash Tables.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 4. Binary Search Trees.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 5. Red-Black Tree.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 6. Greedy Algorithms.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 7. Single-Source Shortest Paths.pdf
- 复旦大学:《数据结构与算法设计》实验设计_Lab 8. String Matching.pdf
- 复旦大学:《数据结构与算法设计》综合项目_Project1. Combining quicksort with insertion sort.pdf
- 复旦大学:《数据结构与算法设计》综合项目_Project2. English-Chinese dictionary based on binary search tree.pdf