• Logic Bombs and Trojan Horses
  • Social Engineering
  • Phishing: Counterfeit Email
  • Security Awareness Primer PowerPoint Presentation




    Download 7,53 Mb.
    bet2/6
    Sana13.05.2024
    Hajmi7,53 Mb.
    #228915
    1   2   3   4   5   6
    Bog'liq
    USG Security Awareness Primer

    Worms

    • Independent program that replicates itself and sends copies from computer to computer across network connections.
    • Upon arrival, the worm may be activated to replicate.

    To Joe
    To Ann
    To Bob
    Email List:
    Joe@gmail.com
    Ann@yahoo.com
    Bob@u.edu

    Logic Bombs and Trojan Horses

    • Logic Bomb: Malware logic executes upon certain conditions. The program is often used for otherwise legitimate reasons.
      • Examples:
      • Software which malfunctions if maintenance fee is not paid.
      • Employee triggers a database erase when he is fired.
    • Trojan Horse: Masquerades as a benign program while quietly destroying data or damaging your system.
      • Download a game: It may be fun but contains hidden code that gathers personal information without your knowledge.

    Social Engineering



    • Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems.

    Phone Call:
    This is John, the System Administrator. What is your password?
    Email:
    ABC Bank has
    noticed a
    problem with
    your account…
    In Person:
    What ethnicity are you? Your mother’s maiden name?
    and have some lovely software patches!
    I have come to repair your machine…

    Phishing: Counterfeit Email

    • Phishing: A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via e-mail.

    Pharming: Counterfeit Web Pages

    • The link provided in the e-mail leads to a counterfeit webpage which collects important information and submits it to the owner.
    • The counterfeit web page looks like the real thing
      • Extracts account information

    Misspelled
    Wiping over, but not clicking the link may reveal a different address.
    With whom?
    Copyright date is old

    Download 7,53 Mb.
    1   2   3   4   5   6




    Download 7,53 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Security Awareness Primer PowerPoint Presentation

    Download 7,53 Mb.