|
Security Awareness Primer PowerPoint Presentation
|
bet | 2/6 | Sana | 13.05.2024 | Hajmi | 7,53 Mb. | | #228915 |
Bog'liq USG Security Awareness PrimerWorms - Independent program that replicates itself and sends copies from computer to computer across network connections.
- Upon arrival, the worm may be activated to replicate.
To Joe
To Ann
To Bob
Email List:
Joe@gmail.com
Ann@yahoo.com
Bob@u.edu
Logic Bombs and Trojan Horses - Logic Bomb: Malware logic executes upon certain conditions. The program is often used for otherwise legitimate reasons.
- Examples:
- Software which malfunctions if maintenance fee is not paid.
- Employee triggers a database erase when he is fired.
- Trojan Horse: Masquerades as a benign program while quietly destroying data or damaging your system.
- Download a game: It may be fun but contains hidden code that gathers personal information without your knowledge.
Social Engineering
- Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems.
Phone Call:
This is John, the System Administrator. What is your password?
Email:
ABC Bank has
noticed a
problem with
your account…
In Person:
What ethnicity are you? Your mother’s maiden name?
and have some lovely software patches!
I have come to repair your machine…
Phishing: Counterfeit Email - Phishing: A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via e-mail.
Pharming: Counterfeit Web Pages - The link provided in the e-mail leads to a counterfeit webpage which collects important information and submits it to the owner.
- The counterfeit web page looks like the real thing
- Extracts account information
Misspelled
Wiping over, but not clicking the link may reveal a different address.
With whom?
Copyright date is old
|
| |