Student Name: Badr Alshehry Professor Name: Dr. Ehab S. AlShaer Class : TDC 477 Network Security I D - PowerPoint PPT Presentation

1 / 6
About This Presentation
Title:

Student Name: Badr Alshehry Professor Name: Dr. Ehab S. AlShaer Class : TDC 477 Network Security I D

Description:

Student Name: Badr Alshehry. Professor Name: Dr. Ehab S. Al-Shaer ... Cyber Crime is on the rise. ... Refrain from using software like Kazaa, Morpheus and Bearshare. ... – PowerPoint PPT presentation

Number of Views:145
Avg rating:3.0/5.0
Slides: 7
Provided by: Badr
Category:

less

Transcript and Presenter's Notes

Title: Student Name: Badr Alshehry Professor Name: Dr. Ehab S. AlShaer Class : TDC 477 Network Security I D


1
Student Name Badr AlshehryProfessor Name Dr.
Ehab S. Al-ShaerClass TDC 477 Network Security
IDate10/24/2006
  • Computer and Network Infrastructure Attacks

2
  • Introduction
  • With the dawn of the cyber age, cyber crime has
  • also emerged as a major issue. Here are a few
  • facts about cyber crime
  • Cyber Crime is on the rise.
  • Corporations are increasing investing in
    Information Systems Security.
  • Hackers keep developing innovative tools like
    WinNuke.
  • Corporations must ensure proper measures to
    reduce or prevent cyber crime.

3
P2P
  • Description of Attack
  • The software creates new session
  • on different communication ports
  • and can be through IM,P2P or file
  • Sharing.
  • Impact
  • Malicious worms like Swen, Lirva and Fizzen
    propagate through P2P.
  • Difficult to remove all traces of such software
    as they affect registry and configuration files.
  • Cause more damage on uninstalling them.
  • Detection/Solution
  • Block P2P ports on the network.
  • Refrain from using software like Kazaa, Morpheus
    and Bearshare.
  • Implement packet filtering firewalls.

4
Wireless Networking
  • Description of Attack
  • A rogue wireless device is any unauthorized
    wireless device connected to an authorized
    enterprise network or device thereby posing risk
    by giving vital information to the potential
    hacker.
  • Impact
  • Loss of financial data.
  • Loss of reputation.
  • Loss of trade secrets, patents or privacy.
  • Legal implications .
  • Detection/Solution
  • Forensic analysis.
  • Use of appropriate hardware and software to
    detect and combat such intrusion.
  • Study patterns of rogue devices.
  • Detection of network/physical location of such
    devices and their subsequent termination.

5
Mobile Networks
  • Description of Attack
  • Non-network based wireless communication, USB
    storage devices
  • susceptible to such attacks including negligent
    acceptance of end
  • users license agreement. Another method includes
    Access Point
  • hacking wherein fake Wi-Fi spot is created by the
    attacker to steal
  • passwords.
  • Impact
  • Compromise of private/personal/confidential
    information.
  • Consequent financial damages.
  • Loss of business reputation.
  • Detection/Solution
  • Installation of appropriate software on client
    machines to authenticate Wi-Fi genuinity.
  • Set policies and regulations requiring encryption
    .
  • Cautious approach while using unknown Wi-Fi
    networks.

6
Cellular Attacks
  • Description of Attack
  • Mainly spreads through the use of Bluetooth
    technology wherein an
  • unsuspecting user opens an SMS file or image
    which has got
  • malicious code or virus programmed inside it.
  • Impact
  • Loss of control over the phone to some extent in
    that it switches off sometimes .
  • Some applications might fail to initialize .
  • Inability to retrieve data from storage devices
    such as CF, MMC and SD cards.
  • Detection/Solution
  • Mobile phones running operating systems like
    Microsoft/Symbian have antivirus software.
  • Regular update of such software to include latest
    virus threats.
  • Vigilance on part of the user.
Write a Comment
User Comments (0)
About PowerShow.com